With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
With Microsoft Excel 2010 © 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2010.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Lesson 9 Computer Troubleshooting
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
With Microsoft ® Office 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Office.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Chapter 9 Security Malware Defenses. Malware Can be used for a form of blackmail. Example: Encrypts files on victim disk, then displays message.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Chapter Nine Maintaining a Computer Part III: Malware.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Ch 11 Managing System Reliability and Availability 1.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
eScan Total Security Suite with Cloud Security
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
With Windows 7 Comprehensive© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Windows 7 Comprehensive.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
With Windows 7 Getting Started© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Windows 7 Getting.
Data Security.
Hands-On Microsoft Windows Server 2008
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Using Windows Firewall and Windows Defender
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 3 Introduction to Microsoft Office 2013 Features Copyright © 2015 Pearson.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 11 Committed to Shaping the Next Generation of IT Experts. Windows Vista Robert Grauer, Lynn.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Tutorial 1: Browser Basics.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Return to the PC Security web page Lesson 5: Dealing with Malware.
Module 5: Configuring Internet Explorer and Supporting Applications.
Lesson 11: Configuring and Maintaining Network Security
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
W elcome to our Presentation. Presentation Topic Virus.
© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 with Microsoft ® Office for Mac 2011 Common Features Using the Common Features of Microsoft.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
1Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall. Exploring Microsoft Office 2010 Fundamentals by Robert Grauer, Lynn Hogan, and Mary.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Tutorial 5 Protecting Your Computer
System Software Chapter 5
Managing Windows Security
Chapter Objectives In this chapter, you will learn:
Discovering Computers 2012: Chapter 8
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Windows Vista Inside Out
Presentation transcript:

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7 Chapter 10 Controlling Computer Security and Troubleshooting Your Computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall2 Objectives Protect Your Computer from Viruses and Spyware Secure Internet Explorer Set Parental Controls Encrypt Files with Encryption File System

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall3 Objectives Troubleshoot Computer Problems Find and Use Help from Others Manage Hardware Devices Remove Malware from Your Computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall4 Protect Your Computer from Viruses and Spyware Malware –Shortened term for malicious software –Computer software that intentionally harms your computer Infected –A computer that has had malware run on it

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall5 Protect Your Computer from Viruses and Spyware Viruses –Malware that spreads from computer to computer Spyware –Malware that collects personal information, displays advertisements, or changes browser settings

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall6 Protect Your Computer from Viruses and Spyware Worm –Malware that spreads to every computer on a network Trojan Horse –Malware that hides inside legitimate programs

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall7 Protect Your Computer from Viruses and Spyware Poisoned Web Site –A Web site that spreads a virus Security Holes –Vulnerabilities in an operating system or program that allow malware to infect a computer without your knowledge

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall8 Protect Your Computer from Viruses and Spyware Patch –A small repair to an operating system or program that closes a security hole Antivirus Program (Virus Checker) –Scans your computer for known viruses –Attempts to disable and remove viruses from your computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall9 Protect Your Computer from Viruses and Spyware Virus Definition –Information needed by the antivirus program to find and remove a virus Zero-day Exploit –Attack launched shortly after a security hole is publicized

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall10 Protect Your Computer from Viruses and Spyware Peer-to-peer file sharing sites –Allows users to share music, video, and software –Often contain viruses on these sites Windows Defender –Antispyware included with all versions of Windows 7

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall11 Protect Your Computer from Viruses and Spyware Microsoft Security Essentials (MSE) –Guards against viruses, spyware, Trojans, rootkits, and other malware –Free download Rootkits –Malware that establishes administrator- level access to a computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall12 Protect Your Computer from Viruses and Spyware

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall13 Protect Your Computer from Viruses and Spyware Keystroke Logger –Records your keystrokes and sends them to someone else Adware –Tracks visited Web sites and delivers advertising matched to your interests

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall14 Protect Your Computer from Viruses and Spyware Antispyware program (spyware checker) –Scans for and attempts to remove spyware

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall15 Protect Your Computer from Viruses and Spyware Installing and Configuring Microsoft Security Essentials to Protect Your Computer from Malware –Microsoft Security Essentials Free download Runs by default once installed on a computer running Windows 7 Protects your computer from spyware, adware, rootkits, Trojans, and viruses Prevents certain Web sites from performing dangerous actions

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall16 Protect Your Computer from Viruses and Spyware Installing and Configuring Microsoft Security Essentials to Protect your Computer from Malware –By default, downloads definitions and runs a quick scan daily Quick Scan –Checks hard disk areas most likely to contain malware

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall17 Protect Your Computer from Viruses and Spyware

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall18 Protect Your Computer from Viruses and Spyware Full Scan –Checks every file on your hard disk(s) Custom Scan –Searches only drives and or folders that you select

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall19 Protect Your Computer from Viruses and Spyware Quarantine Area –A location on your computer from which a program can not run –If malware is detected, it is placed here and can later be deleted Microsoft SpyNet –Online community that collects information about decisions you and others make concerning spyware

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall20 Secure Internet Explorer Web Content –Anything you download and use on a Web page such as an HTML code, pictures, small programs, and animations Script –A program that runs in the browser to add interactive content to the Web page

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall21 Secure Internet Explorer ActiveX Control –Allows another program to run from within the browser –A poisoned Web page may use an ActiveX control to install malware of take control of your computer Unsigned ActiveX Control –Source cannot be verified

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall22 Secure Internet Explorer Intranet –Web site that serves the local network, but is not available to the general Internet user Drive-by download –A program installed from a poisoned Web site, without your knowledge, caused by just visiting the site –Common method to install malware on computers

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall23 Secure Internet Explorer Internet Explorer –Protected mode Displays a message when any program is about to be installed while you are browsing

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall24 Secure Internet Explorer Managing Privacy with Internet Explorer –Cookie Small text file that saves information about you and your preferences –Third-party cookie Cookie created by a Web site other than the one you are viewing –Privacy Summary Displayed in the Privacy Policy dialog box; displays options for allowing cookies

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall25 Secure Internet Explorer Using Pop-up Blockers and SmartScreen Filters to Protect Your Sytems IP Address –Short for Internet Protocol –Address that identifies a computer connected to a network or the Internet

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall26 Secure Internet Explorer SmartScreen Filter –Determines if a Web site is a phishing site Secure http (https) –Encrypts data sent between you and a Web server

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall27 Secure Internet Explorer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall28 Set Parental Controls –Block Web sites –Set times a child can log on –Control which programs a child can open –Provide an activity report of a child’s computer use

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall29 Set Parental Controls

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall30 Encrypt Files with Encryption File System Encryption File System (EFS) –Allows you to store information on your hard disk in an encrypted format –Not included in the Home Premium edition of Windows 7 Decrypted –File is converted back into its original form –Will be encrypted again when it is closed

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall31 Troubleshoot Computer Problems Event Viewer –Displays detailed information about significant events on your computer –Event log Record of important events that have happened on your computer –Control Panel, System and Security, Administrative Tools, View event logs

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall32 Troubleshoot Computer Problems Event Viewer –Five event types Error Warning Information Audit Success Audit Failure

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall33 Find and Use Help from Others Windows Help and Support –Provides information Performing maintenance tasks Solving problems Start Menu, Help and Support

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall34 Find and Use Help from Others Discussion Forums –Individuals with common interests share information Thread –A list of discussion topics Post –Individual message regarding a thread

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall35 Find and Use Help from Others Windows Remote Assistance –Enables two computers to establish a direct connection Remote Assistance Novice –Displays on the screen of the user needing help Remote Assistance Expert –Displays on the screen of the user providing help

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall36 Manage Hardware Devices Plug and Play Device (PnP Device) –Windows 7 recognizes the device as soon as it is connected

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall37 Manage Hardware Devices

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall38 Manage Hardware Devices Installing a Plug and Play Device –Windows 7 looks for correct driver –You may have to choose driver if more than one is found –If no driver is found Install from CD Download from Internet

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall39 Manage Hardware Devices Configuring Devices Using the Control Panel –Change keyboard settings –Configure sound quality of speakers –Change mouse settings –AutoPlay settings for CD/DVD ROM

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall40 Manage Hardware Devices Adding a Local Printer –Local printer Plugged directly into your computer –Add Printer wizard If Plug and Play does not find driver –Default printer Receives all print commands unless you specify otherwise when printing

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall41 Manage Hardware Devices Device Manager –Provides access to all your computer hardware devices –View information about each device –Identify problems –Change settings

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall42 Remove Malware from Your Computer Antivirus or Antispyware programs –Run regular scans –Symptoms that malware has infected your computer Slow performing computer Pop-up ads display while not on the Internet New icons in your Notification Area for programs you have not installed Victim of theft identity Restore System Settings

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall43 Remove Malware from Your Computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall44 Remove Malware from Your Computer Safe Mode –Startup option where only the most basic operating system processes are started –Many malware programs will not start in this mode –Press and hold F8 after turning your computer on Removal Tool –Program that removes a specific malware program

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall45 Remove Malware from Your Computer Bootable CD ROM (Boot Disk) –Contains its own operating system –Computer boots from this disk instead of the hard drive –Useful bootable CD ROM disks include Knoppix and the Ultimate Boot Disk from

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall46 Remove Malware from Your Computer Windows Registry –Stores the settings used by Windows 7 and the applications on your computer –Computer boots from this disk instead of the hard drive

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall47 Remove Malware from Your Computer Registry Editor –Used to view and edit the Windows Registry file Hives –The five major areas of the Registry Keys –Folders within each hive

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall48 Remove Malware from Your Computer Restoring Internet Explorer –Home page –Delete temporary Internet files –Delete cookies –Clear AutoComplete –Delete browsing history

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall49 Remove Malware from Your Computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall50 Covered Objectives Protect Your Computer from Viruses and Spyware Secure Internet Explorer Set Parental Controls Encrypt Files with Encryption File System

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall51 Covered Objectives Troubleshoot Computer Problems Find and Use Help from Others Manage Hardware Devices Remove Malware from Your Computer

with Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall52 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.