/
Computer security Information Systems & Literacy Computer security Information Systems & Literacy

Computer security Information Systems & Literacy - PowerPoint Presentation

liane-varnes
liane-varnes . @liane-varnes
Follow
350 views
Uploaded On 2018-09-19

Computer security Information Systems & Literacy - PPT Presentation

Presentation Outline What is computer security and why it matters Threats How computers become insecure Precautions to take Recommendations What about Macs Conclusion Summary Questions Works Cited ID: 671341

security computer 2010 feb computer security feb 2010 web backup http amp software mac www internet online computers spyware

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Computer security Information Systems &a..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Computer security

Information Systems & Literacy

PresentationSlide2

Outline

What is computer security and why it matters

Threats

How computers become insecure

Precautions to take

Recommendations

What about Macs?

Conclusion

Summary

Questions

Works CitedSlide3

Computer Security

P

rocess

of preventing and detecting unauthorized use of your

computer

Prevention helps you stop intruders

Detection helps you determine if someone attempted to access your information and whether it was successfulSlide4

Why It Matters

We use computers for everything

Banking

Entertainment

Work

School

Productivity

Shopping

Communication

Responsibility – you could put others at riskSlide5

Threats

Malware

– A generic name for all malicious programs

Adware

– designed to show advertisements. It often reports personal information back to its owners – privacy can be violated

Spyware

– installed on your computer without your consent to monitor or control your computer use

Rogue

– disguised as a trustworthy program (ex.

a

nti-spyware)

Virus

– multiplies and is capable to attach itself to other programs after being executed

Trojan

pretends to have a particular function, but that only shows its real purpose after

execution (often destructive) -

c

an’t multiplySlide6

Threats (continued)

Phishing

– a scam where Internet fraudsters send or pop-up messages to lure personal and financial information from unsuspecting victims

.

Ignorance – significant part

Less than 50% of Americans even know what phishing isSlide7

Threats – Phishing ExampleSlide8

Facebook ConversationSlide9

Facebook Conversation (cont.)Slide10

How Computers Become Insecure

Computers are made secure

Firewall – keeps the unwanted out while allowing appropriate traffic in and out of the computer

Recent updates

No viruses,

s

pyware or malware

The user and operator

Visiting unknown/ dangerous websites

Don’t update or patch system and software

Open links and attachments in emails from unknown sendersSlide11

Action Steps

Essential programs to have installed

Anti-virus software

Firewall program

Anti-spyware and/or malware software

Frequent Updates

Operating system and software

Automatic Updates

Wary of emails from unknown senders

Attachments & Links – Don’t left click or open

Known sender – if unsure, just ask them before openingSlide12

Action Steps (continued)

Backup

What, When, Where and Where?

Backup any files that you can’t replicate

Backup as frequently as possible

Backup on whatever you have – CD-ROMs, external hard drives, Internet, flash drives, SD cards

Store the media in a safe, known placeSlide13

Action Steps (continued)

Secure Your Passwords

The Strong Test – Is it strong enough ( length & content)

The Unique Test: Is it unique & unrelated?

The Practical Test: Can you remember it ?

The Recent Test: Have you changed it recently?

Use passwords on your home computer and services used on the Internet

Combine upper & lowercase

Numbers & punctuation

Can’t be found in the dictionarySlide14

Action Steps (continued)

Use caution when downloading & installing programs

Shareware – Paid for software (Microsoft Office)

Freeware – Free software (Adobe Reader)

Open Source – Free and “Open” Software (Firefox)

Questions to ask:

What is it?

What does it do

?

Do I need it?

Where is it coming from?

Is it worth it?Slide15

Recommendations

Anti-virus Software

Avast

Free Antivirus

Avira

AntiVir

Personal – Free Antivirus

Microsoft Security Essentials

Spyware removal

Malwarebytes

Anti-Malware Free

Firewall

Comodo

Internet Security

Provided Windows/Mac firewall

Backup

Windows Backup & Restore Center – Default (backup on External HDD/ CD-ROM)

SyncBack

– Freeware (backup on External HDD/ CD-ROM)

SugarSync

– Online

Backup

Live Mesh – Online Backup

Web Browser Add-ons/Plug-ins

Web of Trust for Firefox, Internet Explorer and Chrome

LastPass

Password Manager for Firefox, IE and

Chrome

www.download.comSlide16

Macintosh Computers

Who feels Macs are more secure than PCs?

More than half of Americans believe that PCs are very or extremely vulnerable to cybercrime attacks, while only 20% say the same about Macs

The survey of more than 1,000 people found that while both PC & Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.Slide17

Mac Computers (continued)

It isn’t the operating system or computer – it’s the user

Don’t fall for the marketing techniques Apple uses to entice consumers to buy their product.

Macs can get viruses too

At the 2009

CanSec

-West conference a security researcher broke into a mac within 10 seconds through flaw in the Mac internet browser, Safari (Discover Mag)

It is up to the user and operator of the computer to stay safe onlineSlide18

Conclusion

Be aware

Research

Know the risks

Don’t trust everything you see on the Internet

Be prepared

Have updated software and operating system

Use an anti-virus and protect yourself

Backup your files

Use the web and its services responsiblySlide19

Summary

C

omputer security prevents and detects unauthorized use of your computer

Computer security matters because your information matters

Users’ lack of knowledge or care is what truly causes security issues in computers

Have a plan and action steps to ensure safe use of your computer

Macs are great, but don’t buy one for security reasons, buy it because its what you want

There are several types of threats out there, but you can beat them all with one stick – awareness and preparationSlide20

QuestionsSlide21

Works Cited

Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT COMPUTER HACKING."

Discover

30.10 (2009): 80.

Academic Search Elite

. EBSCO. Web. 16 Feb. 2010

.

"Home Computer Security."

http://www.cert.org/homeusers/HomeComputerSecurity/

. November 22, 2002 . Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/homeusers/HomeComputerSecurity

/>.

"Home Network Security."

CERT

. 27 Feb 2006. Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/tech_tips/home_networks.html>.

Mills,

Elinor

. "In their words: Experts weigh in on Mac vs. PC security."

InSecurity

Complex

(2010): 1. Web. 16 Feb 2010. <http://news.cnet.com/8301-27080_3-10444561-245.html

>.

Abrams, Randy. "Once Upon a Cybercrime."

ESET Threat Blog

(2009): 1. Web. 16 Feb 2010. <http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6

>.

"Description of Malware."

Malwarebytes

. 2010.

Malwarebytes

Corporation, Web. 16 Feb 2010. <http://www.malwarebytes.org/malwarenet.php?name=Adware.MyWebSearch

>.

"Phishing."

OnGuard

Online

. Feb 2008.

OnGuard

Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/phishing.aspx

>.

"Spyware."

OnGuard

Online

. Feb 2008.

OnGuard

Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/spyware.aspx

>.

"Security Starter Kit."

CNET Download.com

. Jan 2010. CNET, Web. 16 Feb 2010. <http://download.cnet.com/2701-2023_4-6-1.html?tag=page;page

>.

"Confused man about a virus alert ."

Shutterstock

Images

. Web. 16 Feb 2010

.

"Recognizing and Avoiding Scams."

Howstuffworks

. Web. 17 Feb 2010. <http://computer.howstuffworks.com/5-internet-security-videos1.htm>.