Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Intermediate 1 Internet Safety Section 1: Viruses Section 2: Malware Section 3: Other Internet Threats Section 4: Internet Defences Section5: Legal Aspects.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 Computer Security: Protect your PC and Protect Yourself.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Issues: Phishing, Pharming, and Spam
Our Digital World Second Edition
Security for Seniors SeniorNet Help Desk
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Lecture Computer Security Ports, Firewalls, Passwords, and Malware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET: The Good, The Bad and The Ugly
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Keeping your computer safe
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Topic 6: Issues Press F5 to view!
Protect Your Computer Against Harmful Attacks!
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Security 1 Keeping your computer safe

Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security and privacy  Lesson 2: Protecting your computer and your data

Lesson 1 Objectives After completing this lesson, you will be able to:  Explain what the terms security and privacy mean as they apply to computing.  Identify the various threats prevalent in the world of computers and the corresponding solutions.

Definitions  Computer threat: Any factor that can damage your computer or the data on it.  floods and hurricanes  accidental or intentional loss and tampering  Computer security: Deals with the measures that you can take to avoid such damage to the computer and its data.  Installing computers in secure locations  Backing up data  Data Storage in Safe Locations

Definitions  Computer privacy means that your data, such as personal files and messages, is not accessible by anyone without your permission.  Computer privacy deals with the measures that you can take to restrict access to your data.

Natural Threats Categories  Natural Disasters  Fire  Extreme Hot or Cold  Voltage Problems Solutions  Backing up Data  Install Computer in Secure Location  Controlling Operating Environment  Surge Protection  Uninterruptible Power Supply

Human Threats Categories  Hackers  Virtual Theft  Viruses, Worms & Trojan Horses  Spyware  Internet Scams  Online Predators Solutions  Data Storage in Safe Locations  Virus and Spyware Protection  Firewall

Questions??

Lesson 2 Objectives  After completing this lesson, you will be able to:  Identify several common methods for protecting the operating system, software, and data on your computer.  Identify the various means of securing online and network transactions.  Identify the common measures for securing e- mail and instant messaging transactions.

Protecting Your Computer 1.Implement user identification 2.Set a username and password 3.Keep passwords secure 4.Lock your computer 5.Install protective software 6.Encrypt data 7.Back up data 8.Keep your computer up to date

Protecting Your Computer Implement user identification

Protecting Your Computer Set a username

Protecting Your Computer Set a password (cont.)

Click here after filling this form

Protecting Your Computer Lock your computer Press: Ctrl Alt Delete keys at the same time Click here to change your password Click here to lock your computer

Install protective software Antivirus AVG free AVAST free McAfee Symantec

Install protective software AntiSpyware  Windows Defender free ult.mspx ult.mspx  Ad-Aware free  McAfee  Symantec

Install protective software Firewall

Encrypt data Right click file

Back up data

Back up data (cont.)

Restore data

Secure online and network transactions 1.Use strong passwords 2.Protect against hacking and spyware 3.Clear history and cache periodically 4.Delete cookies periodically 5.Avoid sharing personal information 6.Make online transactions on secure sites 7.Configure security components 8.Disable active content 9.Use security help from your ISP

Ensure and instant messaging security 1.Avoid opening with attachments 2.Do not respond to junk mail 3.Do not respond to unsolicited commercial mail 4.Protect yourself from phishing 5.Chat with known people only 6.Do not open attachments received over instant messenger

Questions??