Part 3.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By Mr. Abdalla A. Shaame 1. Uses of Computer PC at Home Common uses for the computer within the home  Computer games  Working from Home  Banking from.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Section 6 Theory Software Copyright, Viruses and Hacking.
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Types of Electronic Infection
Course ILT Routine maintenance Unit objectives Discuss the necessity of applying software patches and fixes Discuss viruses and anti-virus strategy.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Configuring Data Protection Chapter 12 powered by dj.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
How to protect your computer By: Emily, Jackie and Kathleen.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Ryhooooma1 Main Frame. Ryhooooma2 Mouse Monitor System Case Hard disk Drag each graphic to the box contains its description.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
PC Support & Repair Chapter 5 Operating Systems Part 2.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Internet Safety.
2.4 Cyber-Safety.
Chapter 6 Protecting Your Files
Security Issues in Information Technology
Managing Windows Security
Three steps to prevent Malware infection
Malware and Computer Maintenance
Common Methods Used to Commit Computer Crimes
Handling Personal Data
Pre-Computer Skills Internet.
How to build a good reputation online
UNIT 19 Data Security 2.
Webroot Product Key code for Serial Key Activation
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Tips to Fix the Issue of Norton 360 Slow Downs Computer.
Protect Your Computer Against Harmful Attacks!
Kaspersky Total Security for Mac Kaspersky Total Security for Mac,
Call AVG Antivirus Support | Fix Your PC
Norton customer support Number
Computer Ethics.
GSBS IT Resources and Security
2.4 Cyber-Safety.
PART 2.
Information Security Awareness
King Saud University- College OF Applied Studies
Cybersecurity Am I concerned?
Unit 4 IT Security Kerris Davies.
Lesson 2: Epic Security Considerations
What is Information Security?
King Saud University- College OF Applied Studies
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Part 3

Information security We must protect data against Lose data Hackers Are intended to protect a company intellectual property. Some files contain sensitive data like ( research for new product , management accounts ) so we should protect it We must protect data against Lose data Hackers viruses

Lose data

The Importance of shutting down your Computer When you are using a windows , its important to remember that switching off the computer or losing power (power cut) can cause lose data , to protect against this you should save your work regularly When you shutdown your computer you data will save automatically

UPS ( Un – interruptible power supply ) Its device which you can attached to your computer which will guard against power cuts It contains a batteries which will keep your computer alive along enough for you to use the shutdown

Back up The most important thing that you store on your computer is information. Often the contents of a hard disk can represent years of work. If the hard disk stops working one day you could lose all those years of work. For this reason it is VITAL that you take regular backups of the information that is stored on the computer.

Organize your computer for more efficient backups Complete vs. incremental backups Use 'off-site' storage Beware of 'open files‘

Hackers

Access right Determine which files individuals can read or change on the network You can access to the network by using User name and Password

User ID and Password A user ID is normally use to log in to a computer or computer network Use a password which is only known to you The password guarantees that no one can access network and impersonate you The idea of access rights is that you only have the ability to connect to or share devices which you have authority to use

Using a secure password Is important to chose a password which can not be easily guessed by other people It should be at least 8 characters and contain mixture of number and word You should to change your password regularly

What if your laptop stolen You must have a back up to your important file to restore it You must make a password to your laptop to prevent misuse the confidential data

Virus

Computer Virus What are computer viruses? How infect your computer How do you protect computers from attacks Anti virus update

Poor Anti virus Practice Good Anti virus Practice Updating anti virus once a year Scheduling virus check to run once a day Opening unknown e-mail from unknown source Deleting e-mail from unknown source Ensuring that no updates made to antivirus software Regular visiting the web site of your anti virus software suppliers Running software that you have received by e-mail Running a virus check on an e-mail attachment Only coping applications from close friend Scanning un familiar disks with anti-virus software Rebooting you PC if you find a file that is infected Write protection all copies of application disks once they have been checked Virus scanning all applications before loading them on to your hard disk

Data protection legislation Safeguard the privacy of personal data You can result in litigation if personal data is not adequately protected Obliges organizations to protect confidential data with their control

Software Copy Right you must not copy programs which you purchase are copy righted Make sure that have a license which enable you to copy the software If you have not software license , you can not copy the software to other authorized in your network

Copy right Publishing digital work on disk require permission from the copy right holder Copy right provide control over how other people make disk copies of some one works You can make a backup of software bought for own use Scanned image are subject to copy right Audio files are subject to copy right Graphic are subject to copy right

Types of software license Free ware This software which can be copied or downloaded for free Shareware This is where you can use software for a free trial period User license It s allow you to make copies and install software in each It also define how many copies of the software you determine to use