E- SAFETY GROUP MEMBERS: MALINI A/P KUMAR PREMA A/P PARAMASIVAN
MANAGING COMPUTER - VIRUSES Boot-sector virus Macro- viruses Worms attachment viruses Hoax viruses Trojan viruses
Do not switch off machines when the floppy disk is still in the drive. PCs can also can be configured so that do not boot off the floppy drive Do not open attachment to s from people you do not know Download software only from the official source, and always check for viruses before installing the software Disable or turn off macros in World or Excel unless you use them regularly Back-up important files daily if its function is not performed by a system administrator. Instruction to reduce the risk of virus infection and transmission
A PPROACHES TO DEVELOPING SECURE SYSTEM Virtual private network – private network created using the public network infrastructure of the internet Digital signatures – a method of identifying individuals or companies using public-key encryption Asymmetric encryption – Both parties use a related but different key to encode and decode messages Symmetric encryption- both parties to a transaction use the same key to encode and decode messages
F ULL RANGE OF TECHNIQUES THAT CAN BE USED IN COMBINATION TO COMBAT SPAM INCLUDE : Avoid harvesting of addresses- spammers harvest e- mails from addresses published on web pages Educate staff not to reply to spam- can do on receiving spam is to reply to it to complain Use filter, filtering - software used to identify spam according to its characteristics such keywords Use ‘peer to peer’ blocking services- take advantage of human being good at identifying spam and then notifying a central server Use blacklist services- a compilation of known sources of spam that are used to block e- mail Use whitelist services – a compilation of trusted sources of that is permitted to enter an inbox
DEVELOP POLICIES WHICH EXPLAIN BEST PRACTICE- GUIDELINES > ONLY SEND THE E - MAIL TO EMPLOYEES FOR WHICH IT IS ESSENTIAL TO INFORM. > B ANNING CERTAIN TYPES OF E - MAILS > AVOID FLAMING > A VOID ‘ TROLLS ’ > COMBINE ITEMS FROM SEPARATE E - MAILS DURING THE DAY > WRITE CLEAR SUBJECT LINES > STRUCTURE E - MAILS SO THAT THEY CAN BE SCANNED QUICKLY USING SUB - HEADS > MAKE FOLLOW - UP ACTIONS CLEAR > WHEN READING E - MAIL, USE FOLDERS TO CATEGORIZE E - MAILS ACCORDING TO CONTENT >P ERFORM E - MAIL READING AND CHECKING IN BATCHES > DELETE E - MAILS WHICH ARE NOT REQUIRED FOR FUTURE FEFERENCE