Download presentation
Presentation is loading. Please wait.
Published byJob Hampton Modified over 9 years ago
2
Physical protection and Simple measures Passwords Firewalls Anti-Virus, Spyware and Malware Web browsers Email Patches Wireless Encryption Software
3
Laptops: Multi-Purpose Hard-Shell Backpack Tracking software STOP Security plate Desktops: Lock your computer, i.e. ctrl+alt+del -> lock Lock the door Password protect everything Password protected screensaver
4
Things not to do: Don’t choose a simple password like your pets name 123 Don’t include your name or anyone in your families name Don’t include your birthday Don’t use common words Don’t keep the same password for a long period of time Don’t use the same password for every single thing that requires one.
5
Over 7 characters Upper/Lowercase + Digits e.g. AhJtKthr207 Anny helped John take Kate to her recital Add a date or number on the end e.g. 20 th of the 7 th Make up words e.g. BloopShmear2000 or JuckNanYuck160 Different language
6
The SUPR tests The Strong test: Is the password as strong (meaning length and content) as the rules allow? The Unique test: Is the password unique and unrelated to any of your other passwords? The Practical test: Can you remember it without having to write it down? The Recent test: Have you changed it recently? Keep them guessing!
7
What is a firewall? Hardware = Router Software = Windows XP ect Differences Up to you to decide!
8
What is a virus? What is spyware? What is malware?
9
Crucial for securing your PC! Why?
10
Anti-Virus examples: AVG Norton Kapersky BitDefender Avast!
11
Anti-Spyware examples: Spybot Search and Destroy SUPERAntiSpyware Spy Sweeper Ad-Aware Pro Macafee Virus Scan and Anti Spyware ..and many more. Choose which ever you prefer Update your AV(Anti-Virus) and Anti- Spyware!
12
Major weakness in computers defences Choose a safe and reliable browser Stay away from Internet Explorer! Mozilla Firefox Firefox add-ons No-Script WOT(Web of Trust) ... and many more! Google “Firefox add-ons”
13
Email Clients Google Mail Mozilla Thunderbird
14
KRESV tests; The Know test: Is the email from someone that you know? The Received test: Have you received email from this sender before? The Expect test: Were you expecting email with an attachment from this sender? The Sense test: Does the email from the sender make sense. Does the subject line and attachment add up? The Virus test: Does this email contain a virus? Scan the email for a virus
15
What is a patch? Importance of fixing vulnerabilities Update your OS Web browsers Anti-virus ect Any internet dependant application Do it regularly !
16
Protect your wireless network Drive by hackers Change your networks name Wi-Fi network encryption WEP = NO! WPA2 ect = YES!! Hide your SSID
17
Honeypots: Probably to good to be true If you must use them: Don’t sign into your financial accounts! Type as little private information as possible
18
What is it? Examples of software Windows Bitlocker/Bitlocker to go Truecrypt How can it help? Windows Bitlocker; Good for USB storage devices Truecrypt; Good for hidden volumes
19
Hidden volumes = hidden locked container Create a file Choose how big you want the “container” to be Name the file Give it a password Put it where you want Mount it with Truecrypt Now becomes like an extra hard drive Put stuff in it Unmount it
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.