Presentation is loading. Please wait.

Presentation is loading. Please wait.

Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.

Similar presentations


Presentation on theme: "Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References."— Presentation transcript:

1 Safe Computing Practices

2 Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References

3 Objective To provide familiarity with the concept of safe computing and some of the methods employed.

4 Safe Computing Definition Common practices and procedures to improve the chances of avoiding information security problems. Following these suggestions will reduce the probability that you will become infected, have your system broken into, have important information stolen, lose critical information, etc.

5 Safe Computing Methods Keep your operating system and application programs patched Install, use and update anti-virus and anti-spyware software Use a strong password When using public facilities, be sure to log out of applications Use two or more email accounts Use one for family/friends Another for other uses; can be changed if/when start to receive spam Be cautious when reading email with attachments and downloading files from untrusted locations Don’t open unexpected attachments http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/

6 Safe Computing Methods Be very careful with any private data Social Security Numbers, Account Numbers, Passwords, etc. Don’t put personal information on web sites Watch out for phishing or social engineering scams Install and use a firewall Back up your system frequently Avoid filesharing programs Log in as User not Administrator Log out and use a screen saver password Disable Java, JavaScript, VBScript and ActiveX if possible http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/

7 Safe Computing Methods Be careful when shopping on-line Look for a secure connection Know who you are buying from Be careful what you post on social networking sites Data on the Internet can last forever Personal information is harvested from places like Facebook Review the privacy policy

8 Summary We have introduced the concept of safe computing for information systems and described some of the methods employed.

9 List of References http://en.wikipedia.org/wiki/Physical_security http://safecomputing.uchicago.edu/practices/ http://www.cert.org/homeusers/HomeComputerSecurity/ http://www.microsoft.com/protect/default.mspx http://www.techspot.com/tweaks/windows_security/ http://www.nsa.gov/snac/support/I33-011R-2006.pdf http://www.internetsecurityguide.com/ http://www.itsecurity.com/features/20-minute-guide-pc-security- 021307/

10 List of References http://www.schneier.com/blog/archives/2004/12/safe_personal_c. html http://users.iafrica.com/c/cq/cquirke/safe2000.htm http://us.trendmicro.com/us/threats/home-user/preventing- intrusions/safe-computing-guide/Windows-xp/index.html CyberPatriot wants to thank and acknowledge the CyberWatch program which developed the original version of these slides and who has graciously allowed their use for training in this competition.


Download ppt "Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References."

Similar presentations


Ads by Google