Computer Security 2 Keeping your computer safe
Computer Security 2 Computer Security 2 includes two lessons: Lesson 3: Protecting yourself and your family from security threats Lesson 4: Keeping your computer secure and updated
Protect yourself and your family from security threats
Lesson 3 Objectives After completing this lesson, you will be able to: Identify the common measures used to protect privacy. Explain how online predators operate. Identify the guidelines to protect your children from online predators.
Protecting Privacy 1.Shield your identity 2.Make regular backups of your data 3.Check current system security regularly 4.Run virus scans daily 5.Use antispyware 6.Perform online transactions on secure websites with reputable vendors 7.Report abuse to the ISP 8.Filter messages
Online Predators Guidelines Know how predators behave Be suspicious of gifts offered over the Internet Educate your family about online safety Do not give out personal information Guide children when they visit web sites Be aware of web sites that your children visit Block access to inappropriate websites Monitor chat activities on your computer Instruct children to leave unpleasant sites
Questions??
Lesson 4 Objectives After completing this lesson, you will be able to: Explain the purpose of different security settings on your computer. Identify the options available for keeping your computer up-to-date.
Configuring the computer security settings
Configuring the computer security settings Control Panel
Configuring the computer security settings Security Center
Internet Options
Internet Options (cont.)
Windows Firewall
Windows Firewall (cont.)
Questions?
Automatic Updates
Keeping the computer up-to-date
Questions?
Intellectual Property
Copyright Violation and Prevention Plagiarism Misuse of Copyrighted Material Copying Music Using software without license/permission Copying logo
Legal uses of copyrighted information For educational purposes Sharing links instead of downloaded material Using copyrighted material with the copyright owner’s permission
Legal concerns with information exchange Defaming someone’s reputation Visiting inappropriate websites
Questions?