Download presentation
Presentation is loading. Please wait.
Published byWalter Webb Modified over 9 years ago
1
Computer Security Presented By : Ebtihal Mohammed AL-Amro
2
Introduction IIn this presentation I’ll explain to you The Principal Threats that affect on your computer and how can protect our computers from these threats, and how can we deal with it.
3
Computer Security CComputer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system.
4
The Principal Threats Hacking 1 Viruses 2 Spam 3 Spyware 4
5
Hacking ““Illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems”
6
Hacking Examples Worm worms are programs which reproduce by copying themselves over and over, using up resources and sometimes slowing down the systems Logic Bomb Code which will trigger a particular form of 'attack' when a designated condition is met. For instance, a logic bomb could delete all files on Dec. it does not make copies of itself It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than what it claims to do, usually something malicious Trojan Horse
7
Viruses SS oftware programs capable of reproducing themselves and usually capable of causing great harm to files or other programs on the same computer.
8
Spam IIs an unsolicited mail message offering goods or services often with immoral content.
9
Spyware CComputer programs that gathers and reports information about a computer user without the user's knowledge or consent.
10
7 Tips to Protect your computer 7 Tips Use an Internet “firewall” Keep your operating system up to date Install and maintain antivirus software Install and maintain antispyware software Back up your important files and information Use hard to guess Password Think before you click
11
Use an Internet firewall AA firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network.
13
Keep your operating system up to date IInstall all security updates as soon as they are available. AAutomatic updates provide the best protection.
14
Install and maintain antivirus software AAntivirus software can detect and destroy computer viruses before they can cause damage yyou should to keep the antivirus software up to date to be effective Don’t let it expire
15
Some Antivirus programs
16
Install and maintain antispyware software UUse antispyware software so unknown people cannot lurk on your computer and potentially steal your information.
17
Back up your important files and information YYou can use the backup utility in Windows to copy the important files and data on your hard drive and archive it on another hard drive, a disk, a CD, a DVD, or another computer. If your hard drive is erased or damaged, you can easily restore the data from the archived copy.
18
Use hard to guess Password SS implest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network. VV irtually ineffective if people do not protect their passwords. TT he golden rules, or policies for passwords are: MMake passwords as meaningless as possible CChange passwords regularly DDon’t let any one knows your password
19
Think before you click DD on’t open e-mail attachments unless you know what they contain and who sent them. OO nly download files from websites you trust. AA lways use the red “X” in the corner of a pop-up screen. Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC.
20
References Six steps to computer security HP.com 10 tips to computer security By Cheryl Allebrand Bankrate.com Simple Steps to Protect Your Computer By Rick Hellewell DigitalChoke.com Internet Security Threats Lexicon By xtra Tiny
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.