Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Quiz Review.
Viruses & Destructive Programs
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Security for Seniors SeniorNet Help Desk
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Introduction-Cyber Safety
Presentation transcript:

Safe Computing

Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use available hard drive space more efficiently  Restore Utility  Periodically creates a restore point  Manually create a restore point before making any major changes to your system

Viruses  Computer viruses are malicious codes or programs that are usually installed on your computer without your knowledge and against your wishes.  Virus severity varies  Just a nuisance  Corrupt or erase files  Shut down the computer  Erase the entire hard drive

How does your computer get a virus?  Through an attachment  Don’t open attachments without scanning with anti-virus software  Don’t open attachments unless you know the sender and why they are sending the attachment  Through files you download

Worms  Worms are malicious programs that spread from computer to computer without human interaction.  Burrow into your address book and then send themselves out to your contacts  Open a “back door” to your system, which enables hackers access to it and the ability to control it with remote access  Replicate themselves and eventually fill up your hard drive or network drive

Trojan Horses  Not truly viruses because they do not duplicate themselves or infect other files.  Appear as legitimate programs (free screensaver, animated cursors)

Spyware and Adware  Spyware is software designed to capture personal and confidential information that resides on your system and send it elsewhere.  Primary threat to your privacy and confidentiality – passwords, IP Address  Doesn’t usually harm your system  Adware is spyware that tracks your Internet browsing and can install malicious cookies on your computer.  Cookies are small text files that contain information that can identify you to a Web site.  Cause an increase in the number of pop-up ads sometimes even when you’re not online.  Hijack your browser and direct you to undesirable Web pages.

Key loggers  Key loggers record every keystroke made on the computer.  Capture passwords, credit card numbers, bank account numbers, etc.  Hardware key loggers attached between keyboard and computer  Trojan horses can be used to distribute key loggers.

Avoiding Spyware  Don’t use free file-sharing services – Kazaa, Morpheus, Share Bear  Don’t click on buttons on pop-up ads – use the close X in the right corner of the window  Use pop-up blocking software – already enabled in IE and Firefox

Protecting Your Computer  Update your Operating System and Web browser  Install and update Antivirus software  AVG Free – type AVG free in Search boxwww.download.com  Personal firewalls – prevent unauthorized access to your computer, prevent it from becoming a zombie  Hardware - router  Software – Windows XP and Vista have software firewall included

Protecting Yourself  Avoid phishing attempts by never giving out personal information unless it is for legitimate purposes. Legitimate organizations will never ask for passwords, bank account numbers or credit card details through .  Be aware of pharming. Pharming is the practice where fraudulent Web sites are created to look like an official Web site, so that unknowing clients and customers conduct business and reveal personal information.  Create strong passwords that include combo of numbers and letters  Never give out your passwords

Phishing example

Secure Web sites  When using a web site for shopping or banking transactions, you want the Web site to be secure.  In the address bar the URL should have the protocol rather than just