Download presentation
Presentation is loading. Please wait.
Published byGilbert Long Modified over 9 years ago
1
PLUG IT IN SIX Protecting Your Information Assets
2
OUTLINE PI6.1 How to Protect Your Assets: The Basics PI6.2 Behavioral Actions to Protect Your Information Assets PI6.3 Computer-Based Actions to Protect Your Information Assets
3
LEARNING OBJECTIVES 1.Explain why it is critical that you protect your information assets 2.Identify the various behavioral actions you can take to protect your information assets 3.Identify the various computer-based actions you can take to protect your information assets
4
How to Protect Your Assets: The Basics Two types of actions to protect your information assets – Behavioral actions – Computer-based actions
5
Behavioral Actions to Protect Your Information Assets Never provide personal information to strangers in any format (physical, verbal, or electronic) Securing your credit cards Pay attention to credit card billing cycles Limit debit card usage Do not use a personal mailbox at home or apartment for anything other than catalogs and magazines Cross-cut or confetti-shred mails and old records Sign up with a company that protects personal information
6
Computer-Based Actions to Protect Your Information Assets Determining where people have visited on the internet using your computer The dangers of social networking sites Determining if your computer is infected with malicious software (malware)
7
Computer Actions to Prevent Malware Infections Never… – Open unrequested attachments to e-mail files – Open attachments or web links in e-mails from unknown people – Accept files from chat or instant messaging – Download files/software over the internet from unknown web sites – Download unrequested files/software Test your system to evaluate how well your system is protected from a variety of attacks
8
Computer Actions to Prevent Malware Infections Install… – Security suite – Anti-malware product – Antispyware product – Monitoring software – Content-filtering software – Antispam software – Proactive intrusion detection and prevention software Manage patches Use a browser other than internet explorer Use an operating system other than windows
9
Protecting Your Portable Devices and Information Prevent the theft Use two-factor authentication Encrypt your data
10
Safety Features in Internet Explorer 9 Protected Mode ActiveX Opt-In Fix My Settings Widows Defender Personal Data Safeguards Phishing Filter Delete Browsing History
11
Safety Features in Internet Explorer 9 InPrivate Domain Highlighting SmartScreen Filter Add-on Manager Cross-site Scripting Filter A 128-Bit Secure Connection for Using Secure Web Sites
12
Other Actions That You Can Take on Your Computer Detecting worms and Trojan horses Detecting spoofed (fake) web sites Turning off peer-to-peer file sharing Looking for new and unusual files Preparing for personal disasters Restoring backup files
13
Protecting Your Privacy Use strong passwords Adjusting the privacy settings on your computer Surf the web anonymously E-mail anonymously Erasing your Google search history
14
Wireless Security Hide your Service Set Identifier (SSID) Use encryption Filter out Media Access Control (MAC) addresses Limit Internet Protocol (IP) addresses Sniff out intruders Using a public hotspot Test your wireless network Wireless security software
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.