Computer security
description
Transcript of Computer security
![Page 1: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/1.jpg)
COMPUTER SECURITYInformation Systems & Literacy Presentation
![Page 2: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/2.jpg)
Outline
What is computer security and why it matters Threats How computers become insecure
Precautions to take Recommendations
What about Macs? Conclusion Summary Questions Works Cited
![Page 3: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/3.jpg)
Computer Security
Process of preventing and detecting unauthorized use of your computer Prevention helps you stop intruders Detection helps you determine if someone
attempted to access your information and whether it was successful
![Page 4: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/4.jpg)
Why It Matters
We use computers for everything Banking Entertainment Work School Productivity Shopping Communication
Responsibility – you could put others at risk
![Page 5: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/5.jpg)
Threats
Malware – A generic name for all malicious programs Adware – designed to show advertisements. It often
reports personal information back to its owners – privacy can be violated
Spyware – installed on your computer without your consent to monitor or control your computer use
Rogue – disguised as a trustworthy program (ex. anti-spyware)
Virus – multiplies and is capable to attach itself to other programs after being executed
Trojan – pretends to have a particular function, but that only shows its real purpose after execution (often destructive) - can’t multiply
![Page 6: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/6.jpg)
Threats (continued) Phishing – a scam
where Internet fraudsters send or pop-up messages to lure personal and financial information from unsuspecting victims. Ignorance –
significant part Less than 50% of
Americans even know what phishing is
![Page 7: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/7.jpg)
Threats – Phishing Example
![Page 8: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/8.jpg)
Facebook Conversation
![Page 9: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/9.jpg)
Facebook Conversation (cont.)
![Page 10: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/10.jpg)
How Computers Become Insecure Computers are made secure
Firewall – keeps the unwanted out while allowing appropriate traffic in and out of the computer
Recent updates No viruses, spyware or malware
The user and operator Visiting unknown/ dangerous websites Don’t update or patch system and software Open links and attachments in emails from
unknown senders
![Page 11: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/11.jpg)
Action Steps
Essential programs to have installed Anti-virus software Firewall program Anti-spyware and/or malware software
Frequent Updates Operating system and software Automatic Updates
Wary of emails from unknown senders Attachments & Links – Don’t left click or open Known sender – if unsure, just ask them before
opening
![Page 12: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/12.jpg)
Action Steps (continued)
Backup What, When, Where and Where?
Backup any files that you can’t replicate Backup as frequently as possible Backup on whatever you have – CD-ROMs,
external hard drives, Internet, flash drives, SD cards
Store the media in a safe, known place
![Page 13: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/13.jpg)
Action Steps (continued)
Secure Your Passwords The Strong Test – Is it strong enough ( length &
content) The Unique Test: Is it unique & unrelated? The Practical Test: Can you remember it ? The Recent Test: Have you changed it recently? Use passwords on your home computer and
services used on the Internet Combine upper & lowercase Numbers & punctuation Can’t be found in the dictionary
![Page 14: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/14.jpg)
Action Steps (continued)
Use caution when downloading & installing programs Shareware – Paid for software (Microsoft Office) Freeware – Free software (Adobe Reader) Open Source – Free and “Open” Software
(Firefox) Questions to ask:
What is it? What does it do? Do I need it? Where is it coming from? Is it worth it?
![Page 15: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/15.jpg)
Recommendations
Anti-virus Software Avast Free Antivirus Avira AntiVir Personal – Free Antivirus Microsoft Security Essentials
Spyware removal Malwarebytes Anti-Malware Free
Firewall Comodo Internet Security Provided Windows/Mac firewall
Backup Windows Backup & Restore Center – Default (backup on External HDD/ CD-ROM) SyncBack – Freeware (backup on External HDD/ CD-ROM) SugarSync – Online Backup Live Mesh – Online Backup
Web Browser Add-ons/Plug-ins Web of Trust for Firefox, Internet Explorer and Chrome LastPass Password Manager for Firefox, IE and Chrome
www.download.com
![Page 16: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/16.jpg)
Macintosh Computers Who feels Macs are more secure than PCs? More than half of Americans believe that PCs are very or
extremely vulnerable to cybercrime attacks, while only 20% say the same about Macs
The survey of more than 1,000 people found that while both PC & Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.
![Page 17: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/17.jpg)
Mac Computers (continued)
It isn’t the operating system or computer – it’s the user
Don’t fall for the marketing techniques Apple uses to entice consumers to buy their product. Macs can get viruses too At the 2009 CanSec-West conference a security
researcher broke into a mac within 10 seconds through flaw in the Mac internet browser, Safari (Discover Mag)
It is up to the user and operator of the computer to stay safe online
![Page 18: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/18.jpg)
Conclusion
Be aware Research Know the risks Don’t trust everything you see on the
Internet Be prepared
Have updated software and operating system Use an anti-virus and protect yourself Backup your files Use the web and its services responsibly
![Page 19: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/19.jpg)
Summary
Computer security prevents and detects unauthorized use of your computer
Computer security matters because your information matters
Users’ lack of knowledge or care is what truly causes security issues in computers
Have a plan and action steps to ensure safe use of your computer
Macs are great, but don’t buy one for security reasons, buy it because its what you want
There are several types of threats out there, but you can beat them all with one stick – awareness and preparation
![Page 20: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/20.jpg)
Questions
![Page 21: Computer security](https://reader035.fdocuments.in/reader035/viewer/2022062814/5681686a550346895dded8aa/html5/thumbnails/21.jpg)
Works Cited Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT COMPUTER HACKING." Discover
30.10 (2009): 80. Academic Search Elite. EBSCO. Web. 16 Feb. 2010. "Home Computer Security." http://www.cert.org/homeusers/HomeComputerSecurity/.
November 22, 2002 . Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/homeusers/HomeComputerSecurity/>.
"Home Network Security." CERT. 27 Feb 2006. Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/tech_tips/home_networks.html>.
Mills, Elinor. "In their words: Experts weigh in on Mac vs. PC security." InSecurity Complex (2010): 1. Web. 16 Feb 2010. <http://news.cnet.com/8301-27080_3-10444561-245.html>.
Abrams, Randy. "Once Upon a Cybercrime." ESET Threat Blog (2009): 1. Web. 16 Feb 2010. <http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6>.
"Description of Malware." Malwarebytes. 2010. Malwarebytes Corporation, Web. 16 Feb 2010. <http://www.malwarebytes.org/malwarenet.php?name=Adware.MyWebSearch>.
"Phishing." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/phishing.aspx>.
"Spyware." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/spyware.aspx>.
"Security Starter Kit." CNET Download.com. Jan 2010. CNET, Web. 16 Feb 2010. <http://download.cnet.com/2701-2023_4-6-1.html?tag=page;page>.
"Confused man about a virus alert ." Shutterstock Images. Web. 16 Feb 2010. "Recognizing and Avoiding Scams." Howstuffworks. Web. 17 Feb 2010.
<http://computer.howstuffworks.com/5-internet-security-videos1.htm>.