Download presentation
Presentation is loading. Please wait.
Published byReginald Spencer Modified over 8 years ago
1
E- SAFETY GROUP MEMBERS: MALINI A/P KUMAR PREMA A/P PARAMASIVAN
2
MANAGING COMPUTER - VIRUSES Boot-sector virus Macro- viruses Worms Email attachment viruses Hoax e-mail viruses Trojan viruses
3
Do not switch off machines when the floppy disk is still in the drive. PCs can also can be configured so that do not boot off the floppy drive Do not open attachment to emails from people you do not know Download software only from the official source, and always check for viruses before installing the software Disable or turn off macros in World or Excel unless you use them regularly Back-up important files daily if its function is not performed by a system administrator. Instruction to reduce the risk of virus infection and transmission
4
A PPROACHES TO DEVELOPING SECURE SYSTEM Virtual private network – private network created using the public network infrastructure of the internet Digital signatures – a method of identifying individuals or companies using public-key encryption Asymmetric encryption – Both parties use a related but different key to encode and decode messages Symmetric encryption- both parties to a transaction use the same key to encode and decode messages
5
F ULL RANGE OF TECHNIQUES THAT CAN BE USED IN COMBINATION TO COMBAT SPAM INCLUDE : Avoid harvesting of addresses- spammers harvest e- mails from e-mail addresses published on web pages Educate staff not to reply to spam- can do on receiving spam is to reply to it to complain Use filter, filtering - software used to identify spam according to its characteristics such keywords Use ‘peer to peer’ blocking services- take advantage of human being good at identifying spam and then notifying a central server Use blacklist services- a compilation of known sources of spam that are used to block e- mail Use whitelist services – a compilation of trusted sources of e-mail that is permitted to enter an inbox
6
DEVELOP E-MAIL POLICIES WHICH EXPLAIN BEST PRACTICE- GUIDELINES > ONLY SEND THE E - MAIL TO EMPLOYEES FOR WHICH IT IS ESSENTIAL TO INFORM. > B ANNING CERTAIN TYPES OF E - MAILS > AVOID FLAMING > A VOID ‘ TROLLS ’ > COMBINE ITEMS FROM SEPARATE E - MAILS DURING THE DAY > WRITE CLEAR SUBJECT LINES > STRUCTURE E - MAILS SO THAT THEY CAN BE SCANNED QUICKLY USING SUB - HEADS > MAKE FOLLOW - UP ACTIONS CLEAR > WHEN READING E - MAIL, USE FOLDERS TO CATEGORIZE E - MAILS ACCORDING TO CONTENT >P ERFORM E - MAIL READING AND CHECKING IN BATCHES > DELETE E - MAILS WHICH ARE NOT REQUIRED FOR FUTURE FEFERENCE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.