Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.

Similar presentations


Presentation on theme: "Security. Physical security Protection from fire/water Protection from dust and extremes of temperature."— Presentation transcript:

1 Security

2 Physical security Protection from fire/water Protection from dust and extremes of temperature

3 Computer theft

4 Record the serial number of your computer and the peripherals All staff should be made aware of security All should wear ID badge Daily/Weekly/ Monthly Backup Daily/Weekly/ Monthly Backup Never keep backup disks near the computer Archiving (placing important computer files in a safe place)

5 Disk failure Encryption Recovery software

6 Data Integrity and Security Data integrity is concerned with the data correctness. Validation and verification checks are used to ensure data integrity. Data security is concerned with keeping data safe from various hazards that could destroy it. Transaction logs: recording change and movement of the data, where data, date time and person who made them in the interest of security.

7 Software Security OS level Application level

8 Protect Myself Against Computer Viruses

9 What Is A Computer Virus? Small software programs that are designed to spread from one computer to another and to interfere with computer operation. Corrupt/ delete data on your computer. Destroy hardware Most viruses spread by reproducing themselves when the attachment that contains them is opened. Finds your address book and sends messages with an infected attachment to all the addresses listed there. Disable printing, others can cause your computer to fail completely, or destroy the data on your hard-drive. Spread by attachments in e-mail messages or instant messaging messages. Viruses can be spread as attachments of funny images, greeting cards, or audio and video files.

10 spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Viruses can attack system vulnerabilities when your computer is connected to a network such as a campus network or a dial up Internet service.

11 To avoid viruses Prevention is better than treatment It's essential that you keep your computer current with the latest updates Latest antivirus tools, Stay informed about recent threats, Follow a few basic rules when you surf the Internet, download files, and open attachments.

12 Are You Infected? Sorry your system Here are a few primary indicators ( symptoms )that your computer might be infected: – Your computer runs more slowly than normal – Your computer stops responding or locks up often – Your computer crashes and restarts every few minutes – Your computer restarts on its own and then fails to run normally – Applications on your computer don't work correctly – Disks or disk drives are inaccessible – You can't print correctly – You see unusual error messages – You see distorted menus and dialog boxes That was the common signs of infection.

13 How to Remove A Computer Virus Some viruses and other unwanted software (including spyware) are even designed to reinstall themselves after they have been detected and removed.

14 By updating your computer and using free, trial-period, or low-cost antivirus tools, you can permanently remove (and prevent ) unwanted software.

15 Steps to help remove a virus: Visit Microsoft Update and install the latest updates.Microsoft Update Visit the antivirus Web site, update your software, and then perform a thorough scan of your computer. If you don't use antivirus software, use a free online scanning tool and scan your computer immediately. Like – Trend Micro's Housecall Trend Micro's Housecall – Microsoft's Windows Live OneCare Microsoft's Windows Live OneCare – Kaspersky - This site is a very good scanner. However, it does not remove viruses, it just shows you where they are located. You have to delete them manually, including any registry entries. Kaspersky Download, install, and run Adaware 2007Adaware 2007 Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it helps to remove existing viruses.Malicious Software Removal Tool

16 Start your computer in Safe Mode Follow the instructions below to Start Safe Mode : – Turn the computer on or Restart the computer. – Start tapping the F8 key. The Windows Advanced Boot Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again. – Ensure that the Safe mode with Networking option is selected. – Press Enter. The computer then begins to start in Safe mode. – Follow the steps listed above to remove the virus. – When you are finished with troubleshooting, close all programs and restart the computer as you normally would.

17 How to Prevent Computer Viruses Some steps to help avoid viruses: – Use an Internet firewall (Note: Windows XP with SP2 and Windows Vista has a firewall already built-in and turned on by default). – Visit Microsoft Update and turn on automatic updating. – Subscribe to industry standard antivirus software keep it current.antivirus software – Never open an e-mail attachment from someone you don't know. – Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

18 Use Best Browser Mozilla Firefox is a fast, and secure more than internet explorer. pop-up blocking Use WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. Use McAfee SiteAdvisor software that tests Web sites for spyware Multi-Angle Protection * Prevent the installation of ActiveX-based spyware and other potentially unwanted programs. * Block spying / tracking via cookies. * Restrict the actions of potentially unwanted or dangerous web sites.

19 The first step Backup your data periodically The original file that's become infected or was destroyed can be restored if you have it backed up.

20 Update Your Knowledge Google is there to increase your knowledge to update your information about the new viruses and it effects and its suitable antivirus

21 Assignment: test yourself on page 134-136


Download ppt "Security. Physical security Protection from fire/water Protection from dust and extremes of temperature."

Similar presentations


Ads by Google