. CEO & Engineering of W: T: 012 300 610 / 097 5000 135 / 010 99 10 40. MCSA. MCSE. CCNA Heng Nida.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

How to Keep Your PC Running Like New Bryan Nowak.
Mr C Johnston ICT Teacher
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
EDDS Error Handling QP & Reliability Team. 2 EDDS Error Handling 1. In case of ‘Error code: -1’ (refer below captured error message ) EDDS system need.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Spyware, Viruses and Malware What the fuss is all about.
1 Operating Systems Security. 2 Where Malware hides ? Autoexec.bat or autoexec.nt can start malware before windows start Config.sys, config.nt Autorun.inf.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
8: Basic Security Networking for Home & Small Business.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
© 2014 Pearson IT Certification Computer and Network Security.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Small Business Security Keith Slagle April 24, 2007.
Vlad Mazek Own Web Now Corp CEO, MCSE, MCSA, CISSP (877) Portions reproduced with permission from Dean Calvert.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Technical Support Service. Microsoft Windows Support to Resolve All Issues Windows blue screen error and frequent reboots. Quickbooks Outlook.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Windows Tutorial 5 Protecting Your Computer
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Fix to Quick Heal Update Error 1002 Call
Fix Gmail Temporary Error 500 Call Gmail Helpline.
Introduction:. Vendor : Cisco Certifications : Next-Generation Firewall Express Security Engineer Exam Name : Cisco ASA Express Security Exam Code :
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Chapter Nineteen Security.
Presentation transcript:

. CEO & Engineering of W: T: / / MCSA. MCSE. CCNA Heng Nida

1. PC Security 2. Network System Security Implement Security

1. PC Security 1.1- Introduction PC Security 1.2- User Account 1.3- Introduction Virus and Type of virus

1.1- Introduction PC Security. PC Security: Is prevent owner PC and Data Security from Virus and Hacker Attack What’s problem in PC Every Time and Everyday? How to prevent your PC?

. Windows Startup very Slow. Windows Startup alert some message Error on Desktop. Error some application can’t open or process. Windows Startup Effect with Network System such as:. Can’t access Network. Can’t print Documents. Can’t access Internet, , Chart, … What’s problem in PC Every Time and Everyday?

How to prevent your PC?. Setup / Install New Windows. Backup Data (File, , Accounting, Database) before Install. Setup Windows Complete  Show File & Folder Hidden. Don’t open drive D: or E: in Windows Explorer  Find virus delete it. Setup driver PC. Setup standard Application of departments (don’t use program in PC). Stop some services and some options not Important. Setup USB Security, Antivirus Internet Security, …. Add Printer. Share Folder Sample. Backup File System, IOS ( Acronis True Image, Norton Ghost, …)

1.2- User Account.User Authentication: User Account is ID, Object for login PC and Allow User Account can use Application, Services and Some options in Operating System - Default User Accounts ( Administrator & Guest,… ) - User Name and Password don’t tell to other people - Change User Administrator - Strong Password / Change Password 14 days - Lock Screen ( win+ L )

1.3- Introduction Virus.Virus: Programmer create virus for attack PC and Data - Spyware (System Monitor, Trojans, Adware, Tracking Cookies) - Malware / BotNet / DDos / BackDoor - Show Symbol Virus / How to Open Documents - Stop Service Auto Run / Auto Play USB - Program USB Security / Antivirus Internet Security - Antispam / Antispyware

2- Network Security 2.1- Security - USB / Antivirus Filter / Change Port RDP (3389) - Monitor LAN ( P2P Over, NetCut, PRTG Network Monitor, More ) - Link URL in Website / / More

2.2- Firewall Security - Firewall OS and Firewall Antivirus - Build in Windows - Antivirus Internet Security - Antispam / Antispyware - ISA / IP Cop / IP Fire / Smoothwall / pfsense / ClearOS / MikroTik - Product Firewall - ISA / Juniper / CheckPoint / Watch guard / Cisco ASA / More