Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Implications and Security Issues of the Internet By Neelesh Patel.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses & Destructive Programs
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Internet Safety.
Unit 4 IT Security.
Home Computer Security
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Presented by: Luke Speed Computer Security

Why is computer security important! Intruders hack into computers to steal personal information that the user has stored on it, such as;  Credit Card Numbers  Bank Accounts  Anything that can be used get to the users money.

Computer Terms  Attack- An attempt to gain control over another's computer.  Vulnerability- This is the weak point of a computer system that allows hackers to gain control.  Virus- A software that attaches itself to a file or files into the computer.  Worm- Attaches to a running program or operating system and increases vulnerability.

More Computer Terms  Trojan- A program that is usually hidden within free programs.  Hacker- Someone who deliberately attempts to gain control over another’s computer.  Spyware- Lets hackers know how the users is using the computer.  Firewall- A program that limits the hacker’s ability to gain control over a computer.  Backdoor- A program that allows hackers to access another user’s computer.

9 Steps to Protect Your Computer 1) Install and properly use Anti-Virus Software 2) Keep your system Patched 3) Use precaution when opening s with attachments 4) Install and properly use Firewall Software 5) Back-Up any important files and folders 6) Create strong passwords 7) Use precaution when installing or downloading programs 8) Install and use Hardware Firewall 9) Install and Use a File Encryption Program and Access Control

Install and Properly Use Anti-Virus Software When installing a Anti-Virus program, there is a simple test that will help with thee process. These test are called the DURCH tests.  Demand  Update  Respond  Check  Heuristics

Demand  Can you check a file at any time needed?  Before downloading an attachment or program are you capable of checking it for virus before you install it?  If you download a suspicious file are you capable of checking it for viruses right at that moment?

Update  Are you able to update virus databases at any time?  How often will it update? A daily update would be best.  Can you control when the update occurs? Are you able to schedule the update to occur when the computer is not in use?

Respond  How can you respond to an infected file?  Is the program able to remove or clean infected files?  Can the program quarantine the file and keep it from infecting your computer?  How well does it clean the file?

Check  Can all your files be check on your home computer?  Is it possible to have daily automatic scans?  How often will it scan?  Can you control when it scans your computer?

Heuristics  Does the program do a heuristics test?  Does it use common sense when determining rules for dealing with threats?

Keep your System Patched  Keeping your system patched is a way of making sure all of your software is up to date and running properly. Before installing a patch ask your self these questions.

Does it Affect My System?  Will the patch affect my computer and cause any problems with it?

Will it Break Another Program?  Will the new patch break any programs I already have on my computer?  Will it cause a problem with the old system?

Is it Reversible?  If the patch does cause problems, can you reverse it and uninstall it?

Use Precaution When Opening s with Attachments  Be careful before opening an attachment be sure to ask your questions like:  Do I know who sent this?  Can I trust what they sent me?  Is it worth the risk to download it?

Install and properly use Firewall Software  Install a security firewall to keep hackers out of your computer and keep your information private. These Steps will help make sure your firewall is properly installed and used.  The Connection Test: make sure you know which programs need to connect to internet and avoid general rules of letting all programs connect.  The location Test: Make sure you regulate the paths and locations the programs choose to use to connect to the internet.  The Allowed Test: What programs are you allowing to connect to the internet?  The Temporary Test: is the connection going to be an often one? If not make sure you add it as a temporary connection.

Back-Up any important files and folders  Ask your self these questions when trying to figure out which files to back up:  How easy is it to recreate the files? Back up files that you can not easily recreate with a CD-ROM or download from the internet.  How often do I back up my files? Make sure when you change a file or update it that you also back it up.  What media source do I have to save my files to? Use what you feel is the most convenient, if you have a CD-ROM or external hard drive, use it.

Create strong passwords  A strong password will help secure your online accounts and information, ask yourself these questions to maximize your security.  Is my password the as strong as it can be?  Is it as long as it can be?  Is it something unique and unrelated to you or your other passwords?  Do I change it often?

Use precaution when installing or downloading programs  Before buying and installing a program make sure you go over these questions.  Do I know what this program does?  Who wrote the program? Are they trustworthy?  Can I buy the program from a local store instead of downloading it?  Does it change my system in any way?  Has anybody else I know used the program? What is their opinion?

Install and use Hardware Firewall  Make sure you buy an additional firewall program to compliment the one that comes with your computer. Make sure these programs are able to work together and not conflict with one another.

Install and Use a File Encryption Program and Access Control  If you have any files that are sensitive, files that are personal or contain information that is important, you should encrypt it to ensure that only you have access to it.  Make sure you encrypt it to allow other users who need to use it the access to view it.  Make sure you encrypt your files and folders that need to be encrypted are given rules according to their priority.

Additional Security Tips  There are many more security tips that you can follow that will better equip your home computer to cope with malicious attacks from hackers and virus  Encrypted Wi-Fi connection  Limited guest user privileges  Limit the number of different computers you connect your thumb drive to  Be cautious when you choose to pirate music and movies  Be cautious about the information you store on your computer  Run daily virus scans

Encrypt Your Wi-Fi Connection  If you choose to go with a wireless home network be sure you have a router that is capable of encryting your internet connection. Leaving your connection unprotected is the same as leaving your door unlocked when you are not home, an unencrypted network is an open invitation to hackers everywhere, so be cautious when picking a router.

Limited guest Privileges  If you allow friends and family to use your computer be sure to set up a guest account on your computer to limit their access to your files as well as administrative actions, such as installing and uninstalling programs. Also, make sure your account is password protected with a strong password in the event that your laptop is stolen or left unattended.

Limit the use of your thumb drive  Thumb drives are great for transferring larger files between computers but it is also great for picking up virus from an already infected computer, be sure to scan your thumb drive for virus after each use to make the probability of a virus attack unlikely.

Do Not Pirate Music  Peer-to-peer sharing is one the fasting growing trends amongst computer users. It’s the way most people get the newest songs and movies for free, but it also how most people get virus infections in their computer, causing them to either spend hundreds getting it repaired or buying a new computer.

Be Aware  Be aware of the information you store on your computer, if it can easily be written down and stored some where else and is of important value, it would be best to store it the old-fashioned way with pen and paper in a safe location in your home than on a computer that is liable to get compromised by a virus or hacker.

Use the precautions you have learned  It is no use to have all the tools to protect your computer if you do not use them. Make sure you change your passwords frequently and update and run your virus scans daily.

Recourses  urity/ urity/   ity/tp/wifisecurity.htm ity/tp/wifisecurity.htm  security.aspx security.aspx 