Docstoc

Computer Security

Document Sample
Computer Security Powered By Docstoc
					Computer Security 1


   Keeping your computer safe
          Computer Security 1

Computer Security 1 includes two lessons:

 Lesson 1: An overview of computer security and privacy
 Lesson 2: Protecting your computer and your data
                     Lesson 1
                     Objectives
After completing this lesson, you will be able to:

 Explain what the terms security and privacy mean as
  they apply to computing.

 Identify the various threats prevalent in the world of
  computers and the corresponding solutions.
                    Definitions
 Computer threat: Any factor that can damage your
  computer or the data on it.
    floods and hurricanes
    accidental or intentional loss and tampering

 Computer security: Deals with the measures that you can
  take to avoid such damage to the computer and its data.
    Installing computers in secure locations
    Backing up data
    Data Storage in Safe Locations
                    Definitions

 Computer privacy means that your data, such as
  personal files and e-mail messages, is not accessible by
  anyone without your permission.

 Computer privacy deals with the measures that you can
  take to restrict access to your data.
               Natural Threats
         Categories           Solutions

 Natural Disasters      Backing up Data
                         Install Computer in
 Fire                    Secure Location
                         Controlling Operating
 Extreme Hot or Cold     Environment
                         Surge Protection
 Voltage Problems       Uninterruptible Power
                          Supply
              Human Threats
         Categories          Solutions
   Hackers             Data Storage in Safe
   Virtual Theft        Locations
   Viruses, Worms &
    Trojan Horses       Virus and Spyware
   Spyware              Protection
   Internet Scams
   Online Predators    Firewall
Questions??
                   Lesson 2
                   Objectives

 After completing this lesson, you will be able to:
 Identify several common methods for protecting
  the operating system, software, and data on
  your computer.
 Identify the various means of securing online
  and network transactions.
 Identify the common measures for securing e-
  mail and instant messaging transactions.
      Protecting Your Computer
1.   Implement user identification
2.   Set a username and password
3.   Keep passwords secure
4.   Lock your computer
5.   Install protective software
6.   Encrypt data
7.   Back up data
8.   Keep your computer up to date
 Protecting Your Computer
Implement user identification
Protecting Your Computer
     Set a username
Protecting Your Computer
    Set a password (cont.)
Protecting Your Computer
   Set a password (cont.)
Protecting Your Computer
    Set a password (cont.)
Protecting Your Computer
    Set a password (cont.)




              Click here after filling
              this form
         Protecting Your Computer
             Lock your computer
Press: Ctrl Alt Delete keys at the same time




   Click here to change   Click here to lock
   your password          your computer
     Install protective software
               Antivirus

AVG free       http://free.avg.com/

AVAST free   http://www.avast.com/eng/avast_4_home.html


McAfee

Symantec
       Install protective software
               AntiSpyware
 Windows Defender free
  http://www.microsoft.com/windows/products/winfamily/defender/defa
  ult.mspx

 Ad-Aware free      http://www.lavasoft.com/

 McAfee

 Symantec
Install protective software
          Firewall
                   Encrypt data
Right click file
Back up data
Back up data (cont.)
Back up data (cont.)
Back up data (cont.)
Restore data
Restore data
      Secure online and network
            transactions
1.   Use strong passwords
2.   Protect against hacking and spyware
3.   Clear history and cache periodically
4.   Delete cookies periodically
5.   Avoid sharing personal information
6.   Make online transactions on secure sites
7.   Configure security components
8.   Disable active content
9.   Use security help from your ISP
       Ensure e-mail and instant
         messaging security
1.   Avoid opening e-mail with attachments
2.   Do not respond to junk mail
3.   Do not respond to unsolicited commercial mail
4.   Protect yourself from phishing
5.   Chat with known people only
6.   Do not open attachments received over instant
     messenger
Questions??

				
DOCUMENT INFO