LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Policies and Security for Internet Access
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Keeping your computer safe
Digital Security Identity theft Copyright Laws Plagiarism, and More.
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Computer Security.
Unit 4 IT Security Kerris Davies.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing and Instant Messaging

Lesson Introduction You need to provide your identification to access your bank locker or your safe deposit box. This identification is to ensure that no one else is able to access your items. Similarly, you can implement various security measures to minimize the threat to your computer and the data on it. This lesson introduces you to some common best practices that will help you protect your operating system, software, and data on your computer.

Protecting Your Computer You need to protect your computer and the data stored on it from various security and privacy threats. Take the following measures to protect the operating system, software, and data on your computer: Implement user identification. Set username and password. Keep passwords secure. Use lock combination. Encrypt data to prevent unauthorized access. Back up data in another storage device. Update system and vulnerable software.

The computers connected to a network or to the Internet require some more security measures than standalone computers. For computers connected to a network, some good practices are: Use updated security software. Protect your computer against hacking and spyware. Clear history and cache periodically. Delete cookies periodically. Perform online transactions only on secure sites. Never give out your personal history to a Web site.

attachments can be carriers of viruses or worms. Some security measures that you should follow while using or chat are: Use updated security software. Avoid opening messages that have attachments. Delete junk messages or spam messages. Delete unsolicited commercial messages. Protect yourself from phishing. Limit chat activity to the people you know.

Lesson Takeaway Your computer and its data are always prone to security risks. The Internet leaves your computer vulnerable to many online threats. Hackers, online predators, and the people who create worms and viruses use and IM for malicious purposes. For all these reasons, it becomes necessary that you adopt security measures. The following table describes the measures that you can employ to safeguard data on your computer.

MeasureDescription Implement user identification. You can set up accounts or authorized users on the basis of which each user gets an appropriate level of access to the computer. This helps to keep unauthorized individuals from accessing your computer and its data. Set username and password. You can increase security and limit unauthorized access to your computer by setting up a username and password. Ensure that you use strong passwords that cannot be easily guessed by others. Encrypt data. You can encrypt your data and protect it from unauthorized access. BitLocker Drive Encryption and BitLocker To Go features in Windows 7 Ultimate helps protect sensitive data from being accessed by unauthorized users who come into possession of lost or stolen computers and portable storage devices. Install and update protective software. You can protect your computer by installing and regularly updating protective software such as antivirus, antispyware, and firewall. These would protect your computer and its data from malicious virus and hacker attacks. Clear browsing history periodically. You need to remove the temporary Internet files that accumulate when you visit Web sites and Web pages to prevent hackers from accessing your personal information. These temporary files often contain personal information, such as your username and password. Perform online transactions only on secure sites. While shopping online, you usually need to provide sensitive information such as your bank account number or credit card details. Therefore, it is important to ensure that you perform online transactions only on secure Web sites. A Web site is secure if its name has the prefix https. Exercise caution when opening e- mail or instant messenger attachments. You need to be cautious while opening any mail or instant message containing an attachment unless you are absolutely sure about its origin because it is the most common pathway for the spread of viruses. Do not respond to unsolicited commercial mail. Avoid replying to junk mail. Unsolicited messages, known as spam or junk mail, can often include content that is harmful for your computer. In addition, junk mail is often used for stealing identities, and you might accidentally share sensitive information while responding to such messages. Lock your computer. Remember to always lock your computer while you are away. When a computer is locked, it immediately hides the content of the screen and does not allow any operation until the computer is unlocked with the correct username and password combination.