Download presentation
Presentation is loading. Please wait.
Published byJames Berry Modified over 9 years ago
1
Computer Security 2 Keeping your computer safe
2
Computer Security 2 Computer Security 2 includes two lessons: Lesson 3: Protecting yourself and your family from security threats Lesson 4: Keeping your computer secure and updated
3
Protect yourself and your family from security threats
4
Lesson 3 Objectives After completing this lesson, you will be able to: Identify the common measures used to protect privacy. Explain how online predators operate. Identify the guidelines to protect your children from online predators.
5
Protecting Privacy 1.Shield your identity 2.Make regular backups of your data 3.Check current system security regularly 4.Run virus scans daily 5.Use antispyware 6.Perform online transactions on secure websites with reputable vendors 7.Report abuse to the ISP 8.Filter e-mail messages
6
Online Predators Guidelines Know how predators behave Be suspicious of gifts offered over the Internet Educate your family about online safety Do not give out personal information Guide children when they visit web sites Be aware of web sites that your children visit Block access to inappropriate websites Monitor chat activities on your computer Instruct children to leave unpleasant sites
7
Questions??
8
Lesson 4 Objectives After completing this lesson, you will be able to: Explain the purpose of different security settings on your computer. Identify the options available for keeping your computer up-to-date.
9
Configuring the computer security settings
10
Configuring the computer security settings Control Panel
11
Configuring the computer security settings Security Center
12
Internet Options
13
Internet Options (cont.)
16
Windows Firewall
17
Windows Firewall (cont.)
18
Questions?
19
Automatic Updates
20
Keeping the computer up-to-date
21
Questions?
22
Intellectual Property
23
Copyright Violation and Prevention Plagiarism Misuse of Copyrighted Material Copying Music Using software without license/permission Copying logo
24
Legal uses of copyrighted information For educational purposes Sharing links instead of downloaded material Using copyrighted material with the copyright owner’s permission
25
Legal concerns with information exchange Defaming someone’s reputation Visiting inappropriate websites
26
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.