© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.

Slides:



Advertisements
Similar presentations
1 Back Up Your Computer. 2 Back up your files  Avoid losing photos, files, data  Schedule backups – store backups away from home in case of fire, flood,
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Explanations Of Software Utilities By Tim Wong.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Lesson 10 Operating System Customization
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Security for Seniors SeniorNet Help Desk
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Staying Safe Online Keep your Information Secure.
Internet Security facilities for secure communication.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Computer Concepts – Illustrated 8th edition
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Robert Crawford, MBA West Middle School.  Explain how to prevent data loss  Describe how to use antivirus programs  Discuss ways of backing up data.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Networking Network Classification, by there: 3 Security And Communications software.
Physical security By Ola Abd el-latif Abbass Hassan.
Any criminal action perpetrated primarily through the use of a computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kaspersky Small Office Security INTRODUCING New for 2014!
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 6 Protecting Your Files
Joseph J. Malone Security for Seniors Joseph J. Malone
Section II Terms Emily Stepp.
Ways to protect yourself against hackers
Secure Software Confidentiality Integrity Data Security Authentication
Your Computer Wants To Ruin Your Life
Lecture-16(B) Taking Protective Measures
Information Security Session November 11, 2004
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Level 2 Diploma Unit 11 IT Security
Information Security Session October 24, 2005
© 2009 Prentice-Hall, Inc..
Chapter 3: Protecting Your Data and Privacy
G061 - Network Security.
INTERNET SECURITY.
Presentation transcript:

© 2009 Prentice-Hall, Inc.1

2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2009 Prentice-Hall, Inc.3 Physically Protecting Your Computer Environmental factorsEnvironmental factors –Sudden movements/falls –Excessive heat or cold –Dust and other particles Power surgesPower surges –Surge protectors Power outagesPower outages –Uninterruptible power supply (UPS)

© 2009 Prentice-Hall, Inc.4 Deterring Theft Motion alarmsMotion alarms LocksLocks Surrounds (cages)Surrounds (cages) “Phone home” computers“Phone home” computers Surround Motion alarm Lock

© 2009 Prentice-Hall, Inc.5 Keeping Handheld Devices Safe Bomb SoftwareBomb Software –Thief steals handheld device –Thief launches a brute force attack on device to get access –Handheld device senses attack and erases data Bluetooth VulnerabilityBluetooth Vulnerability –Bluesnarfing Exploits an access flaw in Bluetooth software making data vulnerableExploits an access flaw in Bluetooth software making data vulnerable –Bluebugging Hacker takes actual control of the Bluetooth deviceHacker takes actual control of the Bluetooth device

© 2009 Prentice-Hall, Inc.6 Protecting Your Computer from Unauthorized Access Access privilegesAccess privileges Password protectionPassword protection –Passwords should Contain at least 14 charactersContain at least 14 characters Not be a word found in a dictionaryNot be a word found in a dictionary Use a combination of several words with strategically placed uppercase charactersUse a combination of several words with strategically placed uppercase characters Not be easily associated with youNot be easily associated with you –Use a different password for each system or Web site you need to access –Never tell anyone your password or write it down –Change your password if you think someone may know it

© 2009 Prentice-Hall, Inc.7 Good and Bad Passwords

© 2009 Prentice-Hall, Inc.8 Managing Passwords Firefox browser has password featureFirefox browser has password feature

© 2009 Prentice-Hall, Inc.9 Keep Prying Eyes from Surfing Habits StealthSurferStealthSurfer –Protects surfing sessions –Plugs into USB port Preloaded with software, that shields your IP address from prying eyesPreloaded with software, that shields your IP address from prying eyes Have password management toolsHave password management tools

© 2009 Prentice-Hall, Inc.10 Keeping IM Sessions Safe Allow connections only from the Buddy ListAllow connections only from the Buddy List Disable file sharing, file transfer, and Direct IMDisable file sharing, file transfer, and Direct IM

© 2009 Prentice-Hall, Inc.11 Keeping Windows Up to Date Microsoft frequently issues updates to patch security holesMicrosoft frequently issues updates to patch security holes In Vista, updates can be automatically loadedIn Vista, updates can be automatically loaded

© 2009 Prentice-Hall, Inc.12 Biometric Authentication Devices Read unique personal characteristicsRead unique personal characteristics –Fingerprint –Iris patterns –Voice patterns –Face patterns Mouse fingerprint reader

© 2009 Prentice-Hall, Inc.13 Firewalls Prevent unauthorized access when connected to the InternetPrevent unauthorized access when connected to the Internet Popular comprehensive security programs include firewallsPopular comprehensive security programs include firewalls –Norton Internet Security –McAfee Internet Security Suite

© 2009 Prentice-Hall, Inc.14 Protection from Phishing Phishing attacks lure you to Web sites that look legitimate Internet Explorer 7 has a built-in phishing filter Major Internet security packages, such as McAfee and Norton, offer phishing protection tools

© 2009 Prentice-Hall, Inc.15 Backing Up Your Data BackupBackup –A copy of a file that can be used to replace the original Types of files to backupTypes of files to backup –Program –Data Backup routineBackup routine –Frequency –Changed files

© 2009 Prentice-Hall, Inc.16 Backing Up Your Data Software programs for easy backupSoftware programs for easy backup –Schedule automatic backups –Can backup files, folders, or entire drives –Back up to USB device, CD, or DVD Entire system backup softwareEntire system backup software –Takes an image of the entire system –Stores on a separate hard drive –In case of failure, new drive is inserted

© 2009 Prentice-Hall, Inc.17 Backing Up Your Data Online backupsOnline backups –Store backup files on Internet servers –Fees for the service