Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 4 IT Security.

Similar presentations


Presentation on theme: "Unit 4 IT Security."— Presentation transcript:

1 Unit 4 IT Security

2 Security issues that threaten systems
Viruses-A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. Spyware-Software designed to collect information about what you are doing on the computer. For example a 'key logger' is a type of spyware that monitors and stores a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. Used to harvest passwords. Spam-Spam means sending massive amounts of electronic junk mail that people haven't asked for. In legal terms it means to send 'unsolicited commercial ' This term is used because the vast majority of spam is sent in order to try and persuade you to buy something.

3 Security precautions to protect systems
Viruses-Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. Spyware - Programs such as Web root Spy Sweeper and entrust Pest Patrol are offered for a small yearly subscription fee. These programs can help you prevent future attacks, scan for suspicious programs, and remove spyware and malware from your computer. Spam - Try to avoid opening spam s and clicking on links in spam messages. Don’t buy anything from a spammer. Not only do you risk comprising your security and infecting your computer with malware - viruses and so on - you also reward and encourage the spammers. Don’t be tempted to reply. The mailbox is probably unread. Don’t threaten the spammer. Some mails will be seen and spammers have rights too. Threatening messages could expose you to legal action. Avoid ‘unsubscribe’ options. Cynically, spammers often include an ‘unsubscribe’ link. Far from removing the menace, clicking it will confirm that your address is active and probably attract even more spam.

4 How to protect yourself
Firewall-A firewall is a program or device that acts as a barrier to keep destructive elements out of a network or specific computer. Firewalls are configured (in hardware, software, or both) with specific criteria to block or prevent unauthorized access to a network. They work as filters for your network traffic by blocking incoming packets of information that are seen as unsafe. In large corporations, if a firewall is not in place, thousands of computers could be vulnerable to malicious attacks. Firewalls should be placed at every connection to the internet and are also used to control outgoing web traffic as well in large organizations. Passwords-Passwords help protect your privacy and identity. The strength of your password is an important factor to consider. If passwords are guessed or stolen, someone logging in under your identity could cause problems with your credit, reputation, or with MIT's resources. If you have a hard time remembering all of your passwords, Last Pass Enterprise is a password management system that removes the inconvenience of remembering all of your passwords and increases security. Securing hardware -Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as key logging), passwords, and other valuable data.

5 Backing up data Most businesses use computers to store very important data (customer records, financial information, designs for products, etc.) If this data is lost, the business could possibly have to close. Backing-up business data is essential. information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup. Backups have two distinct purposes. How to securely back up data Organize your data. If your files are in more places than you can remember, spend a weekend or two organizing your file structure. Think of it as Spring cleaning, except digital. Get some hard drives for on-site backups. While we all know backing up is important, most of us don't do it for some reason or another. Well, actually, we can probably name those reasons: time, money, and TIME. With terabytes dropping down in prices every single day, the money factor should be no longer an issue. Now there's just the time part.

6 Being Safe online How can we be safe online? Know the scams. Read articles and blogs, follow the news, and share this so you can learn about different kinds of scams and what you can do to avoid them and also help your friends. Think before you click. Never click on links in messages from people you don’t know or vaguely know. These phishing s have links that lead to websites that can lure you into giving personal information or download malware to your computer. You should even be wary with s from people you do know if it looks or sounds suspicious. Hackers can create a malicious that looks like it came from your best friend’s account. Safely peruse. Beware of phony websites. These sites may have an address that’s very similar to a legitimate site, but the page can have misspellings, bad grammar or low resolution images. However, scammers are getting better at replicating sites so make sure. If a site asks for personal information, that you double check the URL and make sure it’s not asking for information it shouldn’t. McAfee Site Advisor is a free download and protects you from going to risky sites Shop safely. Don’t shop on a site unless it has the “https” and a padlock icon to the left or right of the URL. Also, protect yourself and use a credit card instead of a debit card while shopping online a credit card company is more likely to reimburse you for fraudulent charges. If you lose information in school you can get it back by asking the school technicians they keep safe of the information on their computer.


Download ppt "Unit 4 IT Security."

Similar presentations


Ads by Google