Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.

Similar presentations


Presentation on theme: "Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user."— Presentation transcript:

1 Presented by: Luke Speed Computer Security

2 Why is computer security important! Intruders hack into computers to steal personal information that the user has stored on it, such as;  Credit Card Numbers  Bank Accounts  Anything that can be used get to the users money.

3 Computer Terms  Attack- An attempt to gain control over another's computer.  Vulnerability- This is the weak point of a computer system that allows hackers to gain control.  Virus- A software that attaches itself to a file or files into the computer.  Worm- Attaches to a running program or operating system and increases vulnerability.

4 More Computer Terms  Trojan- A program that is usually hidden within free programs.  Hacker- Someone who deliberately attempts to gain control over another’s computer.  Spyware- Lets hackers know how the users is using the computer.  Firewall- A program that limits the hacker’s ability to gain control over a computer.  Backdoor- A program that allows hackers to access another user’s computer.

5 9 Steps to Protect Your Computer 1) Install and properly use Anti-Virus Software 2) Keep your system Patched 3) Use precaution when opening emails with attachments 4) Install and properly use Firewall Software 5) Back-Up any important files and folders 6) Create strong passwords 7) Use precaution when installing or downloading programs 8) Install and use Hardware Firewall 9) Install and Use a File Encryption Program and Access Control http://www.cert.org/homeuser/HomeComputerSecurity/

6 Install and Properly Use Anti-Virus Software When installing a Anti-Virus program, there is a simple test that will help with thee process. These test are called the DURCH tests.  Demand  Update  Respond  Check  Heuristics

7 Demand  Can you check a file at any time needed?  Before downloading an attachment or program are you capable of checking it for virus before you install it?  If you download a suspicious file are you capable of checking it for viruses right at that moment?

8 Update  Are you able to update virus databases at any time?  How often will it update? A daily update would be best.  Can you control when the update occurs? Are you able to schedule the update to occur when the computer is not in use?

9 Respond  How can you respond to an infected file?  Is the program able to remove or clean infected files?  Can the program quarantine the file and keep it from infecting your computer?  How well does it clean the file?

10 Check  Can all your files be check on your home computer?  Is it possible to have daily automatic scans?  How often will it scan?  Can you control when it scans your computer?

11 Heuristics  Does the program do a heuristics test?  Does it use common sense when determining rules for dealing with threats?

12 Keep your System Patched  Keeping your system patched is a way of making sure all of your software is up to date and running properly. Before installing a patch ask your self these questions.

13 Does it Affect My System?  Will the patch affect my computer and cause any problems with it?

14 Will it Break Another Program?  Will the new patch break any programs I already have on my computer?  Will it cause a problem with the old system?

15 Is it Reversible?  If the patch does cause problems, can you reverse it and uninstall it?

16 Use Precaution When Opening Emails with Attachments  Be careful before opening an E-mail attachment be sure to ask your questions like:  Do I know who sent this?  Can I trust what they sent me?  Is it worth the risk to download it?

17 Install and properly use Firewall Software  Install a security firewall to keep hackers out of your computer and keep your information private. These Steps will help make sure your firewall is properly installed and used.  The Connection Test: make sure you know which programs need to connect to internet and avoid general rules of letting all programs connect.  The location Test: Make sure you regulate the paths and locations the programs choose to use to connect to the internet.  The Allowed Test: What programs are you allowing to connect to the internet?  The Temporary Test: is the connection going to be an often one? If not make sure you add it as a temporary connection.

18 Back-Up any important files and folders  Ask your self these questions when trying to figure out which files to back up:  How easy is it to recreate the files? Back up files that you can not easily recreate with a CD-ROM or download from the internet.  How often do I back up my files? Make sure when you change a file or update it that you also back it up.  What media source do I have to save my files to? Use what you feel is the most convenient, if you have a CD-ROM or external hard drive, use it.

19 Create strong passwords  A strong password will help secure your online accounts and information, ask yourself these questions to maximize your security.  Is my password the as strong as it can be?  Is it as long as it can be?  Is it something unique and unrelated to you or your other passwords?  Do I change it often?

20 Use precaution when installing or downloading programs  Before buying and installing a program make sure you go over these questions.  Do I know what this program does?  Who wrote the program? Are they trustworthy?  Can I buy the program from a local store instead of downloading it?  Does it change my system in any way?  Has anybody else I know used the program? What is their opinion?

21 Install and use Hardware Firewall  Make sure you buy an additional firewall program to compliment the one that comes with your computer. Make sure these programs are able to work together and not conflict with one another.

22 Install and Use a File Encryption Program and Access Control  If you have any files that are sensitive, files that are personal or contain information that is important, you should encrypt it to ensure that only you have access to it.  Make sure you encrypt it to allow other users who need to use it the access to view it.  Make sure you encrypt your files and folders that need to be encrypted are given rules according to their priority.

23 Additional Security Tips  There are many more security tips that you can follow that will better equip your home computer to cope with malicious attacks from hackers and virus  Encrypted Wi-Fi connection  Limited guest user privileges  Limit the number of different computers you connect your thumb drive to  Be cautious when you choose to pirate music and movies  Be cautious about the information you store on your computer  Run daily virus scans

24 Encrypt Your Wi-Fi Connection  If you choose to go with a wireless home network be sure you have a router that is capable of encryting your internet connection. Leaving your connection unprotected is the same as leaving your door unlocked when you are not home, an unencrypted network is an open invitation to hackers everywhere, so be cautious when picking a router.

25 Limited guest Privileges  If you allow friends and family to use your computer be sure to set up a guest account on your computer to limit their access to your files as well as administrative actions, such as installing and uninstalling programs. Also, make sure your account is password protected with a strong password in the event that your laptop is stolen or left unattended.

26 Limit the use of your thumb drive  Thumb drives are great for transferring larger files between computers but it is also great for picking up virus from an already infected computer, be sure to scan your thumb drive for virus after each use to make the probability of a virus attack unlikely.

27 Do Not Pirate Music  Peer-to-peer sharing is one the fasting growing trends amongst computer users. It’s the way most people get the newest songs and movies for free, but it also how most people get virus infections in their computer, causing them to either spend hundreds getting it repaired or buying a new computer.

28 Be Aware  Be aware of the information you store on your computer, if it can easily be written down and stored some where else and is of important value, it would be best to store it the old-fashioned way with pen and paper in a safe location in your home than on a computer that is liable to get compromised by a virus or hacker.

29 Use the precautions you have learned  It is no use to have all the tools to protect your computer if you do not use them. Make sure you change your passwords frequently and update and run your virus scans daily.

30 Recourses  http://www.cert.org/homeusers/HomeComputerSec urity/ http://www.cert.org/homeusers/HomeComputerSec urity/  http://www.comptech.org/docs/etdp/homesec/ http://www.comptech.org/docs/etdp/homesec/  http://compnetworking.about.com/od/wirelesssecur ity/tp/wifisecurity.htm http://compnetworking.about.com/od/wirelesssecur ity/tp/wifisecurity.htm  http://www.onguardonline.gov/topics/computers- security.aspx http://www.onguardonline.gov/topics/computers- security.aspx  http://www.securityfocus.com/infocus/1746 http://www.securityfocus.com/infocus/1746


Download ppt "Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user."

Similar presentations


Ads by Google