Download presentation
Presentation is loading. Please wait.
Published byBrooke Jennings Modified over 9 years ago
1
© 2009 Prentice-Hall, Inc.1
2
2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data
3
© 2009 Prentice-Hall, Inc.3 Physically Protecting Your Computer Environmental factorsEnvironmental factors –Sudden movements/falls –Excessive heat or cold –Dust and other particles Power surgesPower surges –Surge protectors Power outagesPower outages –Uninterruptible power supply (UPS)
4
© 2009 Prentice-Hall, Inc.4 Deterring Theft Motion alarmsMotion alarms LocksLocks Surrounds (cages)Surrounds (cages) “Phone home” computers“Phone home” computers Surround Motion alarm Lock
5
© 2009 Prentice-Hall, Inc.5 Keeping Handheld Devices Safe Bomb SoftwareBomb Software –Thief steals handheld device –Thief launches a brute force attack on device to get access –Handheld device senses attack and erases data Bluetooth VulnerabilityBluetooth Vulnerability –Bluesnarfing Exploits an access flaw in Bluetooth software making data vulnerableExploits an access flaw in Bluetooth software making data vulnerable –Bluebugging Hacker takes actual control of the Bluetooth deviceHacker takes actual control of the Bluetooth device
6
© 2009 Prentice-Hall, Inc.6 Protecting Your Computer from Unauthorized Access Access privilegesAccess privileges Password protectionPassword protection –Passwords should Contain at least 14 charactersContain at least 14 characters Not be a word found in a dictionaryNot be a word found in a dictionary Use a combination of several words with strategically placed uppercase charactersUse a combination of several words with strategically placed uppercase characters Not be easily associated with youNot be easily associated with you –Use a different password for each system or Web site you need to access –Never tell anyone your password or write it down –Change your password if you think someone may know it
7
© 2009 Prentice-Hall, Inc.7 Good and Bad Passwords
8
© 2009 Prentice-Hall, Inc.8 Managing Passwords Firefox browser has password featureFirefox browser has password feature
9
© 2009 Prentice-Hall, Inc.9 Keep Prying Eyes from Surfing Habits StealthSurferStealthSurfer –Protects surfing sessions –Plugs into USB port Preloaded with software, that shields your IP address from prying eyesPreloaded with software, that shields your IP address from prying eyes Have password management toolsHave password management tools
10
© 2009 Prentice-Hall, Inc.10 Keeping IM Sessions Safe Allow connections only from the Buddy ListAllow connections only from the Buddy List Disable file sharing, file transfer, and Direct IMDisable file sharing, file transfer, and Direct IM
11
© 2009 Prentice-Hall, Inc.11 Keeping Windows Up to Date Microsoft frequently issues updates to patch security holesMicrosoft frequently issues updates to patch security holes In Vista, updates can be automatically loadedIn Vista, updates can be automatically loaded
12
© 2009 Prentice-Hall, Inc.12 Biometric Authentication Devices Read unique personal characteristicsRead unique personal characteristics –Fingerprint –Iris patterns –Voice patterns –Face patterns Mouse fingerprint reader
13
© 2009 Prentice-Hall, Inc.13 Firewalls Prevent unauthorized access when connected to the InternetPrevent unauthorized access when connected to the Internet Popular comprehensive security programs include firewallsPopular comprehensive security programs include firewalls –Norton Internet Security –McAfee Internet Security Suite
14
© 2009 Prentice-Hall, Inc.14 Protection from Phishing Phishing attacks lure you to Web sites that look legitimate Internet Explorer 7 has a built-in phishing filter Major Internet security packages, such as McAfee and Norton, offer phishing protection tools
15
© 2009 Prentice-Hall, Inc.15 Backing Up Your Data BackupBackup –A copy of a file that can be used to replace the original Types of files to backupTypes of files to backup –Program –Data Backup routineBackup routine –Frequency –Changed files
16
© 2009 Prentice-Hall, Inc.16 Backing Up Your Data Software programs for easy backupSoftware programs for easy backup –Schedule automatic backups –Can backup files, folders, or entire drives –Back up to USB device, CD, or DVD Entire system backup softwareEntire system backup software –Takes an image of the entire system –Stores on a separate hard drive –In case of failure, new drive is inserted
17
© 2009 Prentice-Hall, Inc.17 Backing Up Your Data Online backupsOnline backups –Store backup files on Internet servers –Fees for the service
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.