Download presentation
Presentation is loading. Please wait.
Published byAdele Stephens Modified over 9 years ago
1
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse
2
Malicious Software Malware ◦ Viruses: Programs attached to a file usually by e-mail ◦ Worm: Not attached necessarily, spread and run by itself ◦ Hackers use spyware to gather your computer’s information 9/17/20152Instructor: Shilpa Phanse
3
Security features in Vista Security Center: Under Control Panel Windows Defender User Account Control Back up and restore 9/17/20153Instructor: Shilpa Phanse
4
Security Features Windows Firewall ◦ Monitored and restricted communication with Internet Windows Update ◦ Checks latest Windows Update on Microsoft Web Site Malware Protection ◦ Antivirus software Other Security Settings ◦ Setting like user account 9/17/20154Instructor: Shilpa Phanse
5
WINDOWS FIREWALL 9/17/20155Instructor: Shilpa Phanse
6
AUTOMATIC UPDATES 9/17/20156Instructor: Shilpa Phanse
7
SECURITY CENTER 9/17/20157Instructor: Shilpa Phanse
8
Defending against Spyware Spyware is a software that can install itself Monitors your computing actions Change System settings, interrupt programs, and slow computer performance Common websites where spyware is found like search engines and screen saver downloads Adware: Pop up advertisements 9/17/20158Instructor: Shilpa Phanse
9
Windows Defender Vista Feature ◦ Prevents spyware from installing ◦ Provides access to Microsoft SpyNet community ◦ Control panel- Windows Security Center Windows Defender ◦ Scanned items Quarantined items Setting Windows Defender options 9/17/20159Instructor: Shilpa Phanse
10
E-mail viruses with Windows Mail Spam or junk mail Windows mail security options ◦ Digital IDs ◦ Encrypt contents Junk e-mail options ◦ Low ◦ High Safe Senders tab Blocked Senders 9/17/201510Instructor: Shilpa Phanse
11
Phishing Attempt to deceive you in revealing personal or financial information Chose Phishing tab ◦ Set the options Phishing filters: ◦ Phishing filter icons on web sites ◦ Internet Explorer can help detect the fraudulent sites ◦ Internet Explorer Tools Phishing filter 9/17/201511Instructor: Shilpa Phanse
12
Blocking Malware Hackers use scripts and ActiveX controls Digital signature files can be detected by Vista 9/17/201512Instructor: Shilpa Phanse
13
IE SECURITY Internet Explorer Security Zone Pop up blocker 9/17/201513Instructor: Shilpa Phanse
14
Add-Ons On IE 9/17/201514Instructor: Shilpa Phanse
15
Privacy Settings Cookie: Small file recording your information like what e-mail address you use, your web site preference Block the “cookies” Clear browsing history ◦ IE Tools Delete browsing history User also can change advanced settings on Internet Explorer 9/17/201515Instructor: Shilpa Phanse
16
Setting up user accounts 9/17/201516Instructor: Shilpa Phanse
17
Securing and Sharing Folders Exercise: Page WIN 255 9/17/201517Instructor: Shilpa Phanse
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.