Presentation is loading. Please wait.

Presentation is loading. Please wait.

E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.

Similar presentations


Presentation on theme: "E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN."— Presentation transcript:

1 E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN

2 MANAGING COMPUTER - VIRUSES Boot-sector virus Macro- viruses Worms Email attachment viruses Hoax e-mail viruses Trojan viruses

3  Do not switch off machines when the floppy disk is still in the drive. PCs can also can be configured so that do not boot off the floppy drive  Do not open attachment to emails from people you do not know  Download software only from the official source, and always check for viruses before installing the software  Disable or turn off macros in World or Excel unless you use them regularly  Back-up important files daily if its function is not performed by a system administrator. Instruction to reduce the risk of virus infection and transmission

4 A PPROACHES TO DEVELOPING SECURE SYSTEM Virtual private network – private network created using the public network infrastructure of the internet Digital signatures – a method of identifying individuals or companies using public-key encryption Asymmetric encryption – Both parties use a related but different key to encode and decode messages Symmetric encryption- both parties to a transaction use the same key to encode and decode messages

5 F ULL RANGE OF TECHNIQUES THAT CAN BE USED IN COMBINATION TO COMBAT SPAM INCLUDE : Avoid harvesting of addresses- spammers harvest e- mails from e-mail addresses published on web pages Educate staff not to reply to spam- can do on receiving spam is to reply to it to complain Use filter, filtering - software used to identify spam according to its characteristics such keywords Use ‘peer to peer’ blocking services- take advantage of human being good at identifying spam and then notifying a central server Use blacklist services- a compilation of known sources of spam that are used to block e- mail Use whitelist services – a compilation of trusted sources of e-mail that is permitted to enter an inbox

6 DEVELOP E-MAIL POLICIES WHICH EXPLAIN BEST PRACTICE- GUIDELINES > ONLY SEND THE E - MAIL TO EMPLOYEES FOR WHICH IT IS ESSENTIAL TO INFORM. > B ANNING CERTAIN TYPES OF E - MAILS > AVOID FLAMING > A VOID ‘ TROLLS ’ > COMBINE ITEMS FROM SEPARATE E - MAILS DURING THE DAY > WRITE CLEAR SUBJECT LINES > STRUCTURE E - MAILS SO THAT THEY CAN BE SCANNED QUICKLY USING SUB - HEADS > MAKE FOLLOW - UP ACTIONS CLEAR > WHEN READING E - MAIL, USE FOLDERS TO CATEGORIZE E - MAILS ACCORDING TO CONTENT >P ERFORM E - MAIL READING AND CHECKING IN BATCHES > DELETE E - MAILS WHICH ARE NOT REQUIRED FOR FUTURE FEFERENCE

7

8


Download ppt "E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN."

Similar presentations


Ads by Google