Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Chapter Nine Maintaining a Computer Part III: Malware.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
eScan Total Security Suite with Cloud Security
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Computer Care.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Protecting Your Information Assets
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
2.00 Understand Computer Fundamentals
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Protecting Students on the School Computer Network Enfield High School.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Understanding the Need for Security Measures
Lecture-16(B) Taking Protective Measures
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Chapter 14B Taking Protective Measures

14B-3 Avoiding Identity Theft Guard your papers –Shred unneeded papers –Pick up you mail quickly –Check statements immediately –Keep records for 3 years

14B-4 Avoiding Identity Theft Guard your personal information –Be wary giving out information –Avoid giving account numbers –Never give personal information in –Ensure online shopping is secure

14B-5 Avoiding Identity Theft Look at the big picture –Review your credit report yearly –Develop an efficient filing system –Know your liability limits

14B-6 Protecting Your Privacy Keep marketers at bay –Be wary filling out forms –Guard your primary address Have a ‘spam account’ for forms

14B-7 Protecting Your Privacy Know your legal rights –1966 Freedom of Information Act –1970 Fair Credit Reporting Act –Privacy Act of 1974 –1986 Electronic Communications Act –Financial Modernization Act of 1999 –2001 USA Patriot Act

14B-8 Managing Cookies and Spyware Dealing with cookies –Browsers provide settings to block cookies –No cookies to all cookies allowed –Without cookies some sites crash –Cookies can be deleted Browsers Spyware programs

14B-9 Managing Cookies and Spyware Cookie types –Session cookies Cookies for the current site –Persistent cookies Stored on hard drive until deleted –First-party cookies Installed by the current site –Third-party cookies Installed by an ad

14B-10 Deleting Cookies

14B-11 Managing Cookies and Spyware Removing web bugs and spyware –Install a spyware removal program None are 100% effective, use two –Install a pop-up blocker Are extremely effective

14B-12 Managing Cookies and Spyware Evading spam –Contact your ISP –Use mail program’s filters –Use an anti-spam program –Use an online account for purchasing

14B-13 Protection From Malware Viruses and worms –Purchase a good anti-virus product –Keep the product updated –Keep your OS up to date

14B-14 Protecting Your System Limit physical access –Easiest way to harm or steal data –Build an account for each user –Require a password for access Software and hardware password

14B-15 Protecting Your System Use a firewall –Protects from unauthorized remote use –Makes your computer invisible –Cost between $0 and $80

14B-16 Protecting Your System Backup often –Backup is a copy of a file –Restore replaces a file on disk –Organizations backup at least daily –Home users should backup weekly

14B-17 System Events OS generates messages for events Provides clues about computer health Can alert to potential problems Windows includes the Event Viewer

14B-18 Event Viewer

14B-19 Handling Storage Media Store media in the proper container –Floppy disks in a hard case –CD should be in a sleeve –Thumb disks should be closed

14B-20 Handling Storage Media Avoid magnetism –Magnets erase the contents of disks –Magnets found in Speakers Televisions and CRT monitors Radios

14B-21 Handling Storage Media Heat and cold –Avoid extreme temperatures Heat expands media Cold contracts media –Floppies and CD-ROMs are susceptible

14B-22 Handling Storage Media Moisture –Do not use wet media –CDs can be wiped off –Floppy disks must dry for days

14B-23 Handling Storage Media Dust, dirt, and fingerprints –Dirty or scratched media will fail –Handle media by the edge –Clean CDs with gentle strokes

14B-24 Storing Computer Equipment Never store near large electronics Store in dry, climate controlled rooms Plan for natural disasters Stack equipment safely

14B-25 Keeping Your Computer Clean Computers should be spotless Avoid eating or smoking at computer Clean the dust from inside the system Change the filters if present

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14B End of Chapter