Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Explanations Of Software Utilities By Tim Wong.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Security Advice Georgie Pepper Campsmount Acadamy.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Managing Windows Security
3.6 Fundamentals of cyber security
Unit 4 IT Security.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Overview: Online Risks. Understanding the Risks. Keeping Safe. Understanding security and safe computing

Internet shopping is booming – every 20th pound is spent online. Internet card fraud accounts for 80 per cent of all losses where the card is not physically present. Overview : Online Risks

Simple, common sense precautions can keep you safe when you’re in cyberspace. Don’t panic its not as bad as it sounds. Overview : Online Risks

Understanding the Risks Viruses and worms can wreck your data and shut down your machine. –Purchase recognised anti-viral and anti-spyware programs and set them to auto-update regularly. –Free software is also available, and works well but carries no warranty. –Set your browser preferences only to accept cookies from sites you recognise and actively wish to install.

Understanding the Risks Do other users access your PC while you’re connected to the Internet. –Use a personal firewall. –If your operating system already includes a firewall, make sure it is switched on.

Understanding the Risks Update your Operating System! –Regularly install any operating system patches and fixes to keep your system security in place. –Instruct your computer to check regularly. Cyber crooks target those who don’t bother.

Understanding the Risks Eavesdroppers can tune in to insecure wireless networks. –Many wireless networks are not encrypted, so anyone with a little knowledge could eavesdrop. –Keep your device in non-discoverable mode when you are not using Wi-Fi. –Do not connect to non-secure access points in public places.

Understanding the Risks s from unknown people. –If you receive mail from people or organisations you do not know, delete them and, if possible, inform your supplier that they are spam. –Do not open any unknown attachments – these may carry viruses. –Never reply because that alerts spammers that the address is valid and you will be bombarded with more messages from more senders.

Please Update Your Account Dear valued PayPal member: It has come to out attention that your PayPal account information needs to be updated as part of our continuing commitment to protect your account and to reduce the instance of fraud on our website. However, failure to update your records will result in account suspension. Please update your records on or before February 27, Once you have updated your account records, your PayPal session will not be interrupted and will continue as normal. To update your PayPal records click on the following link: PayPal, Inc. P.O. Box Omaha, NE Sincerely, PayPal Understanding the Risks – Sample - A

Firewall Gold Message Centre: You may need to update your Firewall security settings as soon as possible: Press here to update your Firewall security settings or read below for more information: There is a high possibility that your PC's Firewall security settings may become exploited by malicious websites without your knowledge. This could easily lead to the following attacks on your PC's hard drive: - Unwanted Virus Downloads - Uncontrollable Trojan horse attacks - The running of unwanted script programs - The installation of malicious spyware Understanding the Risks – Sample - B

Understanding the Risks Password forgetfulness. –The average person now has 15 different passwords and codes to access online accounts and more than ten per cent use an astonishing 50 or more online accounts. –Many use the same password for several accounts & a quarter of us keep a password list in our purse or wallet - DON’T DO IT. –Use as many different passwords as possible and try word association techniques to remember them. –Never, ever give your password to anyone else – treat it like a PIN.

Understanding the Risks File Delete is not enough. –Information does not disappear when you place it in your computer’s waste basket or recycle bin. –Buy and use a clean-up utility to overwrite the disk space occupied by discarded information or use a free eraser such as “Eraser 5.86a from (VNUNET). –Delete sensitive and personal information if you need to send your PC to a supplier for a health check or upgrade. –When replacing your computer, the only real way of preventing others from recovering the data from your hard disk is physical destruction.

Understanding the Risks Portable storage devices. –Portable storage devices, such as USB key rings, are not secure. –keep them as safe as you would your passport or credit cards.

Understanding the Risks Back up important documents! –Most of us are dependant on our PCs now, so it makes sense to copy important documents on to a CD and keep it somewhere secure. –And of course……Don’t, if possible, record your passwords!

` So What to Do? Keeping Safe

Check your security status with Windows Security Centre.

Keeping Safe Use a firewall.

Keeping Safe Security alerts. If Windows detects that your computer might need enhanced security in any one of the security areas— firewall, automatic updating, malware protection, or other security settings — until the problem is fixed, you will see a notification every time you log on. Notifications are displayed in the notification area of the taskbar.

Keeping Safe Destructive viruses, etc can erase information from your hard disk, completely disable your computer or worsen its performance and stability. –Antivirus programs scan and other files on your computer for viruses, worms, and Trojan horses – even the free ones. –If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files. –If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers. Use and update regularly your Virus Protection.

Keeping Safe Spyware/ Adware is software that can display advertisements, collect information about you, or change settings on your computer, generally without obtaining your consent. Most spyware is installed through free downloaded software, but in some cases simply visiting a website can results in an infection. –Windows has a built-in antispyware program called Windows Defender, turned on by default. Defender alerts you when spyware tries to install itself. It also scans for existing spyware and then remove it. –A number of free programs are also available but require manual updating/scanning (SpyBot / Ad-aware). Use and update regularly your Spyware Protection.

Keeping Safe Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating. Update Windows automatically.

Safe Surfing Keep Safe Bob