P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What you don’t know CAN hurt you!
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
INTERNET SAFETY FOR EVERYONE
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Do you know how to keep yourself safe?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Robert Crawford, MBA West Middle School.  Explain how to prevent data loss  Describe how to use antivirus programs  Discuss ways of backing up data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
By: Asfa Khan and Huda Mukhtar
Keeping Your Computer Safe and Running Efficiently.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
A Quick and Easy Crash Course Internet Safety for Everyone.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Internet Safety.
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
How to build a good reputation online
Cybersecurity Awareness
Internet Safety – Social Media
Presentation transcript:

P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself against cybercrime is very important. Many computer crimes start when an unauthorized user hacks, or gains unauthorized entry, into a computer network. This often happens when the intruder learns the password to access the victim’s computer and the network. Following are ways such criminals learn passwords: Guessing—too often, computer users choose passwords that are easy for them to remember, such as birthdates, names of pets, names of celebrities, and names of family members. These passwords are easy for intruders to guess.

P ROTECTING D ATA CONT. Finding-Sometimes people keep passwords written on pieces of paper near their computer. Other times, criminals simply look over someone’s shoulder as he or she types the password and use it later. An intruder can also search the trash in the hopes of finding user IDs and passwords. Sniffing-Some criminals may use packet sniffers. A packet sniffer is a program that examines data streams on networks to try to find information, such as passwords and credit card numbers. Pretending-Some intruders pretend to be network administrators. They call network users and ask for their passwords, claiming that the passwords are needed to solve a problem in the system.

P ROTECTING D ATA CONT. Modifying-Network software makes the people who administer a system into superusers. Intruders who have superuser access can modify virtually any file on the network. They all may change user passwords to ones they know. The single most important step you can take to defend yourself is to protect your passwords.

P ROTECTING D ATA CONT. Here are some tips to help you keep your passwords safe: Do not use birthdates, personal names, pet names, or other information that is easy to guess. Create passwords that are at least six characters long. Use a combination of letters and numbers, mixing uppercase and lowercase letters. Make your passwords as random as possible. This makes them harder to remember, but it is important for your safety that they be difficult for others to guess.

P ROTECTING D ATA CONT. Change your passwords often, at least once every few weeks. Do not keep a record of your passwords on your computer or written on a piece of paper near your computer. Never give out your passwords to anyone. Never type a password while someone else is watching.

P ROTECTING D ATA CONT. When you go online, surf from sites that protect your identity. Anonymizer and IDZap are two sites offering this service. Although you may not be able to do this at school, on a home computer you can sign up for a free e- mail account from a Web site such as Hotmail or Yahoo! mail. Use that address when you register at Web sites or participate in other public Internet spaces. This will protect you from receiving unwanted mail, or spam, at your primary address.

P ROTECTING D ATA CONT. Be careful of Web sites that require you to register. Do not fill out a registration form unless the site clearly says that the data will not be shared with other people without your approval. Another way to protect yourself is to stay away from computer scams. Make sure you do business only with established companies that you know and trust. Follow a simple rule: If an offer seems too good to be true, it probably is. Read the fine print. If you order something, make sure the item is in stock and that the company promises to deliver it within 30 days. Never reveal financial or other personal information, even if the request sounds legitimate.

P ROTECTING D ATA CONT. Although corporations and government agencies are far more likely to be targeted than an individual or a school, any system is vulnerable. Antivirus programs protect computers from viruses. These programs use a special technique to examine program and data files. Once they find a virus, they delete it or at least quarantine the virus so it can do no harm. Simply installing an antivirus program is not enough to protect your computer. New viruses are created every day. Software publishers update their antivirus programs to defeat each new attack.

P ROTECTING D ATA CONT. You must update your version of the program to take advantage of these changes. Fortunately, the companies generally make it easy to download updates over the Internet. To protect yourself from viruses, follow these simple rules: Install an antivirus program on your computer Be sure to keep this program up-to-date Always check files that you download from the Internet for viruses before saving them to your hard drive. If your antivirus program can do so, set it to monitor incoming messages and to check files. Always check the disks you borrow from someone else before using them on your computer.

P ROTECTING Y OUR C OMPUTER D ATA  A computer contains parts that break, just like any other piece of equipment. It’s important to protect the data on your computer in the event of a power failure.  Just like any other device that runs on electric, a computer can be affected by power fluctuations or outages. These problems can lead to the loss of data.  A power surge, or a sharp increase in the power coming into the system, can destroy a computer’s electrical components.

P ROTECTING Y OUR C OMPUTER D ATA CONT. You can help protect your computer from power problems by attaching an Uninterruptible Power Supply, or UPS, between your computer and the power source. This battery powered device goes to work when it detects an outage or critical voltage drop. It powers the computer for a period of time. A UPS can also protect against power surges by filtering sudden electrical spikes. You can limit the amount of data lost due to a power problem by saving your work regularly.

P ROTECTING D ATA CONT. The only way to completely protect your computer against data loss is to back up your work. This protects your data in case the computer’s hard drive fails. Hard drives are reliable pieces of equipment, but they do sometimes crash, or shut down improperly. When that happens, they can no longer read or write data. If that happens to you, you will be unable to access any of the information stored on your computer.

P ROTECTING D ATA CONT. Backing up is simply creating a copy of the data on your hard drive that is stored separately from the hard drive. To back up data, you can use floppy disks, removable high-capacity media like Iomega Zip or Jaz disks, a second hard drive, a shared network drive, or a recordable CD. You can back up data to different degrees: Full backups copy everything stored on your computer. They should be done at least once a month. Incremental backups copy only those files that have changed since the last full backup. These should be made regularly, such as once a week.