Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2009 Prentice-Hall, Inc..

Similar presentations


Presentation on theme: "© 2009 Prentice-Hall, Inc.."— Presentation transcript:

1 © 2009 Prentice-Hall, Inc.

2 Technology in Focus: Protecting Your Computer and Backing Up Your Data
Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data This Technology in Focus discusses what you can do to protect your computer from theft and keep it in working order. © 2009 Prentice-Hall, Inc.

3 Physically Protecting Your Computer
Environmental factors Sudden movements/falls Excessive heat or cold Dust and other particles Power surges Surge protectors Power outages Uninterruptible power supply (UPS) It’s essential to select and ensure a safe environment for your computer. This includes protecting it from environmental factors, power surges, and power outages. There are a number of environmental factors you need to consider to protect your computer. Sudden movements can damage the internal components. Electronic components do not like excessive heat or cold. Naturally, a fan drawing air into a computer also draws in dust and other particles, which can wreak havoc on your system. Power surges can also harm your computer. Surge protectors protect your computer against power surges. Like power surges, power outages can wreak havoc on a system. An uninterruptible power supply (UPS) is a device that contains surge protection equipment and a large battery. When power is interrupted, the UPS sends power to the computer from its battery so that you have time to save your work and shut down your computer properly. © 2009 Prentice-Hall, Inc.

4 Deterring Theft Motion alarms Locks Surrounds (cages)
“Phone home” computers Surround In addition to not leaving your laptop unattended or in places where it can be easily stolen, the following additional approaches will help you avoid getting your computer stolen: Alarms: To prevent your laptop from being stolen, you can attach a motion alarm to it. If your laptop is moved while the alarm is activated, it emits a very loud sound. Locks and Surrounds: One way to prevent theft is to lock your laptop to your desk using a special lock. For desktop computers, a surround is a box that encloses the system unit and makes it impossible to remove the case, while still allowing access to ports and drive bays. In addition, if you want to be able to track your computer if it’s stolen, you can purchase systems that enable your computer to alert authorities as to its location if it is stolen. Lock Motion alarm © 2009 Prentice-Hall, Inc.

5 Keeping Handheld Devices Safe
Bomb Software Thief steals handheld device Thief launches a brute force attack on device to get access Handheld device senses attack and erases data Bluetooth Vulnerability Bluesnarfing Exploits an access flaw in Bluetooth software making data vulnerable Bluebugging Hacker takes actual control of the Bluetooth device Handheld devices present their own unique hazards. Handheld devices can be vulnerable to unauthorized access if they are left unattended or are stolen. Bomb software features data and password protection for your handheld device. A thief who steals your handheld device is forced to crack your password to gain access. A brute force attack (repetitive tries to guess a password) on the handheld device kicks in the bomb software that erases all data contained on the device. Preventing Bluetooth Attacks Bluetooth is a transmission medium for exchanging data wirelessly over short distances. Many cell phones and PDAs are Bluetooth-enabled. Unfortunately, Bluetooth hardware and software is riddled with security holes, especially on cell phones. If you have a Bluetooth-enabled device, you are susceptible to two types of mischief: 1. Bluesnarfing: To steal the information contained on a Bluetooth device, Bluesnarfing exploits a flaw in the access software. Bluesnarfing is relatively easy (and cheap) to do as there is a lot of Bluesnarfing software available on the Internet. 2. Bluebugging: Although much more difficult and expensive to execute, Bluebugging is more serious. Bluebugging involves a hacker actually taking over control of a Bluetooth-enabled device. The hacker can then: * Make phone calls * Send, receive, or read SMS messages * Establish Internet connections * Write phonebook entries * Set call forwarding As vulnerabilities are discovered, handheld device manufacturers will issue software patches. You must ensure that you update the software in your phone (or PDA) just as you do for your computer operating system. Unfortunately, the only 100 percent foolproof way to protect your phone is to disable Bluetooth altogether. © 2009 Prentice-Hall, Inc.

6 Protecting Your Computer from Unauthorized Access
Access privileges Password protection Passwords should Contain at least 14 characters Not be a word found in a dictionary Use a combination of several words with strategically placed uppercase characters Not be easily associated with you Use a different password for each system or Web site you need to access Never tell anyone your password or write it down Change your password if you think someone may know it To protect yourself even further, you may want to restrict access to the sensitive data on your computer. Windows Vista has built-in password protection of files as well as the entire desktop. If your computer has been set up for multiple users with password protection, the Windows logon screen requires users to enter a password to gain access to the desktop. The computer can be set to default back to the Welcome screen after it is idle for a set period of time. This forces users to reenter a password to regain access to the computer. If someone attempts to log on to your computer without your password, that person won’t be able to gain access. Creating a secure password is therefore very important. Your password should contain at least 14 characters and include numbers, symbols, and upper- and lowercase letters. Your password should not be a single word or any word found in the dictionary. Ideally, use a combination of several words with strategically placed uppercase characters. Your password should not be easily associated with you (such as your birth date, the name of your pet, or your nickname). Use a different password for each system or Web site you need to access. This prevents access to every account you maintain, if one of your passwords is discovered. You should never tell anyone your password or write it down in a place where others might see it. You should change your password if you think someone may know it. © 2009 Prentice-Hall, Inc.

7 Good and Bad Passwords © 2009 Prentice-Hall, Inc.
This table shows some possible passwords and explains why they make good or bad candidates © 2009 Prentice-Hall, Inc.

8 Managing Passwords Firefox browser has password feature
The Firefox browser from Mozilla ( makes it easy to keep track of passwords. From the Tools menu, select Options, and then click the Security icon (the closed padlock). In the Passwords section, check Remember passwords for sites to have Firefox remember passwords when you log onto Web sites. Check Use a master password, click the Change Master Password button (which will say Set Master Password the first time you use it), and enter a well-designed, secure password. The next time you go to a Web site that requires a login, Firefox will display a dialog box prompting you to have Firefox remember the login name and password for this site. The next time you return to the site and select a login option, just enter the Master Password and the Firefox Password Manager fills in the login and password information for you. © 2009 Prentice-Hall, Inc.

9 Keep Prying Eyes from Surfing Habits
StealthSurfer Protects surfing sessions Plugs into USB port Preloaded with software, that shields your IP address from prying eyes Have password management tools Portable privacy devices, such as the StealthSurfer III are available to protect your surfing sessions. Simply plug the device into an available USB port on the machine on which you will be working. All sensitive Internet files, such as cookies, Internet history, and browser caches, are stored on the privacy device, not the computer you are using. These devices come preloaded with software, such as Anonymizer ( which shields your IP address from prying eyes, making it difficult (if not impossible) for hackers to tell where you are surfing on the Internet. These privacy devices also have password management tools that store all of your logon information and encrypt it in the event your privacy device falls into someone else’s hands. © 2009 Prentice-Hall, Inc.

10 Keeping IM Sessions Safe
Allow connections only from the Buddy List Disable file sharing, file transfer, and Direct IM Virus attacks and other forms of hacking are being perpetrated at an alarming rate via instant messenger programs. To keep your IM sessions safe, follow these precautions: 1. Allow connections only from users on your Buddy List. This prevents you from being annoyed by unknown parties. On the preferences screen for your IM program, select “Don’t Allow” in the “For users not on my Buddy List” section. 2. Disable potentially dangerous IM options such as file sharing, file transfer, and Direct IM (another file-sharing option). Although these options are potentially useful for swapping files over IM, they are a common way of receiving malicious files, which can then infect your computer with viruses. © 2009 Prentice-Hall, Inc.

11 Keeping Windows Up to Date
Microsoft frequently issues updates to patch security holes In Vista, updates can be automatically loaded Microsoft frequently issues updates to patch security holes. Loading these updates is essential for keeping a Windows-based computer secure. In Windows Vista, updates can be automatically loaded: - From the Start menu in Windows, select Control Panel, and then click on the Windows Update icon to display the Windows Update window. Click the Change settings option to display the Chose how Windows can install updates dialog box. Pick the best option for your situation (the first two options are good for broadband connections; the third option is better for dial-up). © 2009 Prentice-Hall, Inc.

12 Biometric Authentication Devices
Read unique personal characteristics Fingerprint Iris patterns Voice patterns Face patterns Mouse fingerprint reader Biometric authentication devices are devices you can attach to your computer that read a unique personal characteristic, such as a fingerprint or the iris pattern in your eye, and convert that pattern to a digital code. When you use the device, your pattern is read and compared to the one stored on the computer. Only users having an exact fingerprint or iris pattern match are allowed to access the computer. © 2009 Prentice-Hall, Inc.

13 Firewalls Prevent unauthorized access when connected to the Internet
Popular comprehensive security programs include firewalls Norton Internet Security McAfee Internet Security Suite Unauthorized access often occurs when your computer is connected to the Internet. You can best prevent such cases of unauthorized access by using either hardware or software firewalls. Hardware firewalls are often built into a router. Many popular comprehensive security programs,such as Norton Internet Security and McAfee Internet Security Suite, include firewalls as part of their protection packages. Setting up either a hardware or software firewall should be an integral part of your security arsenal when connected to the Internet. © 2009 Prentice-Hall, Inc.

14 Protection from Phishing
Phishing attacks lure you to Web sites that look legitimate Internet Explorer 7 has a built-in phishing filter Major Internet security packages, such as McAfee and Norton, offer phishing protection tools Phishing attacks are attempts to lure you to Web sites that look legitimate (such as banking sites) and then trick you into revealing information that can be used in identity thefts. Since phishing has become such a problem, Internet Explorer 7 has a built-in phishing filter that examines Web sites to see if they are known or suspected fraudulent sites. The major Internet security packages, such as McAfee and Norton, now offer phishing protection tools. When you have the Norton Fraud Toolbar displayed in your browser, you are constantly informed about the legitimacy of the site. In fact, if you have an Internet security package installed, you can turn off the phishing filter in Internet Explorer to speed up the loading of pages in your browser. Another security measure is to never use your credit card number. Credit card providers such as Citibank are offering services like “Virtual Account Numbers” for their customers. You are assigned a new virtual account number each time you visit. © 2009 Prentice-Hall, Inc.

15 Backing Up Your Data Backup Types of files to backup Backup routine
A copy of a file that can be used to replace the original Types of files to backup Program Data Backup routine Frequency Changed files Making file backups—copies of files that you can use to replace the originals if they are lost or damaged—is important. When you backup your files, remember to store the copy in a different place than the original. Removable storage media such as DVDs, CDs, and flash drives are popular choices for backing up files because they hold a lot of data and can be easily transported. Two types of files need backups, program files and data files:  Program files are files you use to install software. They should be on the CDs or DVDs that they originally came on. If any programs came preinstalled in your computer, you should still have received a CD or DVD that contains them. As long as you have the original media in a safe place, you shouldn’t need to back up these files.  Data files are files you create (such as Word files), as well as contact lists, address books, archives, and your Favorites list from your browser. You should back up your data files frequently, depending on how much work you can afford to lose. You should always back up data files when you make changes to them, especially if those changes involve hours of work. To make backups easier, store all your data files in one folder on your hard drive. Then, to back up your files, you simply copy the Data Files folder onto an alternate storage media. If you have a DVD/CD-RW drive in your computer, open Windows Explorer and right-click the Data Files folder. You can then copy the contents of the folder to the appropriate media. © 2009 Prentice-Hall, Inc.

16 Backing Up Your Data Software programs for easy backup
Schedule automatic backups Can backup files, folders, or entire drives Back up to USB device, CD, or DVD Entire system backup software Takes an image of the entire system Stores on a separate hard drive In case of failure, new drive is inserted There are plenty of software programs designed for easy file backup. Backup software such as Norton Ghost or BackUp MyPC allows you to schedule regular backups that occur automatically, with no intervention on your part. These products can back up individual files, folders, or an entire hard drive to another hard drive, such as an external drive connected to your computer by a USB port, or to a CD/DVD in the CD/DVD drive. For complete protection, you should use backup software, such as Norton Ghost, that is designed to save an image of your entire system. © 2009 Prentice-Hall, Inc.

17 Backing Up Your Data Online backups
Store backup files on Internet servers Fees for the service A final backup solution is to store backups of your files online. For a fee, companies can provide you with such online storage. If you store a backup of your entire system on the Internet, you don’t need to buy an additional hard drive for backups. This method also takes the worry out of keeping your backups in a safe place because they’re always stored in an area far away from your computer. However, if you’d like to store your backups online, make sure you have high-speed Internet access; otherwise, your computer could be tied up as you transfer files. © 2009 Prentice-Hall, Inc.


Download ppt "© 2009 Prentice-Hall, Inc.."

Similar presentations


Ads by Google