© 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Internet Security Passwords.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Do you know how to keep yourself safe?
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Chapter 7 Working with Files.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
CIS 450 – Network Security Chapter 8 – Password Security.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
DIGITAL SECURITY Information Security and data protection Facilitator: Yvonne Oluoch.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking Network Classification, by there: 3 Security And Communications software.
Physical security By Ola Abd el-latif Abbass Hassan.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Mobile Device Security Management Leyna Belinsky.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Chapter 6 Protecting Your Files
Section II Terms Emily Stepp.
System Access Authentication
Authentication Schemes for Session Passwords using Color and Images
Ways to protect yourself against hackers
How to build a good reputation online
UNIT 19 Data Security 2.
Information Security Session November 11, 2004
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
© 2009 Prentice-Hall, Inc..
Technology Mrs. Huddleston
Chapter 3: Protecting Your Data and Privacy
G061 - Network Security.
Keeping your passwords safe
Presentation transcript:

© 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc.2 Physically Protecting Your Computer Environmental factorsEnvironmental factors –Falls –Excessive heat –Dust and other particles Power surgesPower surges –Surge protectors Power outagesPower outages –Uninterruptible power supply (UPS)

© 2008 Prentice-Hall, Inc.3 Deterring Theft Motion alarmsMotion alarms LocksLocks Surrounds (cages)Surrounds (cages) “Phone home” computers“Phone home” computers Surround Motion alarm Lock

© 2008 Prentice-Hall, Inc.4 Keeping PDAs and Cell Phones Safe PDA Bomb SoftwarePDA Bomb Software –Thief steals PDA –Thief launches a brute force attack on device to get access –PDA senses attack and erases data Bluetooth VulnerabilityBluetooth Vulnerability –Bluesnarfing Exploits an access flaw in Bluetooth software making data vulnerableExploits an access flaw in Bluetooth software making data vulnerable –Bluebugging Hacker takes actual control of the Bluetooth deviceHacker takes actual control of the Bluetooth device

© 2008 Prentice-Hall, Inc.5 Protecting Your Computer from Unauthorized Access Access privilegesAccess privileges Password protectionPassword protection –Passwords should Contain 5 to 8 alphanumeric charactersContain 5 to 8 alphanumeric characters Not be a word found in a dictionaryNot be a word found in a dictionary Not be easily associated with youNot be easily associated with you Include special charactersInclude special characters Never be given to anyoneNever be given to anyone

© 2008 Prentice-Hall, Inc.6 Good and Bad Passwords GOOD PASSWORD REASONBAD PASSWORD REASON L8t2meGaNDalf 351 Uses letters and numbers to come up with memorable phrase “Late to me” and adds it to a character name from Lord of the Rings plus a random number JsmithCombination of first initial and last name IwaLR8384GdY First initials of first line of Green Day song I Walk a Lonely Road plus a random number and an abbreviation for Green Day 4smithkidsEven though this has alphanumeric combination, it is too descriptive of a family P1zzA244WAter ShiPDowN Easily remembered word with mix of alphanumeric characters and upper- and lowercase letters, your locker number at your gym, plus the title of a book that you like (with upper- and lowercase letters) Brown5512Last name and last four digits of phone number is easily decoded S0da&ICB3N&J 3RRY Mix of numbers, symbols, and letters. Stands for Soda and Ice Cream and the names of famous ice cream makers with the number 3 instead of the letter E 123MainStYour street address is an easily decoded password

© 2008 Prentice-Hall, Inc.7 Managing Passwords Free password management software takes the worry out of forgetting passwordsFree password management software takes the worry out of forgetting passwords Remembers passwords for you.Remembers passwords for you. Remember just one password to access the password management programRemember just one password to access the password management program

© 2008 Prentice-Hall, Inc.8 Protecting Your Computer from Unauthorized Access Keeping IM sessions safeKeeping IM sessions safe –Allow connections only from the Buddy List –Disable file sharing, file transfer, and Direct IM

© 2008 Prentice-Hall, Inc.9 Protecting Your Computer from Unauthorized Access Biometric authentication devicesBiometric authentication devices –Read unique personal characteristics FingerprintFingerprint Iris patternsIris patterns Voice patternsVoice patterns Face patternsFace patterns Mouse fingerprint reader FirewallsFirewalls –Prevent unauthorized access when connected to the Internet

© 2008 Prentice-Hall, Inc.10 Windows Updates Microsoft frequently issues updates to patch security holesMicrosoft frequently issues updates to patch security holes In Windows XP, updates can be automatically loadedIn Windows XP, updates can be automatically loaded

© 2008 Prentice-Hall, Inc.11 Backing Up Your Data BackupBackup –A copy of a file that can be used to replace the original Types of files to backupTypes of files to backup –Program –Data Backup routineBackup routine –Frequency –Changed files

© 2008 Prentice-Hall, Inc.12 Backup Software Software programs for easy backupSoftware programs for easy backup –Schedule automatic backups –Can backup files, folders, or entire drives –Back up to USB device, CD, or DVD Entire system backup softwareEntire system backup software –Takes an image of the entire system –Stores on a separate hard drive –In case of failure, new drive is inserted

© 2008 Prentice-Hall, Inc.13 Protection from Phishing Phishing attacks lure you to Web sites that look legitimate Free tools identify suspicious sites. Credit card providers offer services like “Virtual Account Numbers” for their customersCredit card providers offer services like “Virtual Account Numbers” for their customers

© 2008 Prentice-Hall, Inc.14 Backing Up Your Data Backup softwareBackup software –Schedule automatic backups Online backupsOnline backups –Store backup files on Internet servers –Fees for the service