Presentation Outline What is computer security and why it matters Threats How computers become insecure Precautions to take Recommendations What about Macs Conclusion Summary Questions Works Cited ID: 671341
Download Presentation The PPT/PDF document "Computer security Information Systems &a..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Computer security
Information Systems & Literacy
PresentationSlide2
Outline
What is computer security and why it matters
Threats
How computers become insecure
Precautions to take
Recommendations
What about Macs?
Conclusion
Summary
Questions
Works CitedSlide3
Computer Security
P
rocess
of preventing and detecting unauthorized use of your
computer
Prevention helps you stop intruders
Detection helps you determine if someone attempted to access your information and whether it was successfulSlide4
Why It Matters
We use computers for everything
Banking
Entertainment
Work
School
Productivity
Shopping
Communication
Responsibility – you could put others at riskSlide5
Threats
Malware
– A generic name for all malicious programs
Adware
– designed to show advertisements. It often reports personal information back to its owners – privacy can be violated
Spyware
– installed on your computer without your consent to monitor or control your computer use
Rogue
– disguised as a trustworthy program (ex.
a
nti-spyware)
Virus
– multiplies and is capable to attach itself to other programs after being executed
Trojan
–
pretends to have a particular function, but that only shows its real purpose after
execution (often destructive) -
c
an’t multiplySlide6
Threats (continued)
Phishing
– a scam where Internet fraudsters send or pop-up messages to lure personal and financial information from unsuspecting victims
.
Ignorance – significant part
Less than 50% of Americans even know what phishing isSlide7
Threats – Phishing ExampleSlide8
Facebook ConversationSlide9
Facebook Conversation (cont.)Slide10
How Computers Become Insecure
Computers are made secure
Firewall – keeps the unwanted out while allowing appropriate traffic in and out of the computer
Recent updates
No viruses,
s
pyware or malware
The user and operator
Visiting unknown/ dangerous websites
Don’t update or patch system and software
Open links and attachments in emails from unknown sendersSlide11
Action Steps
Essential programs to have installed
Anti-virus software
Firewall program
Anti-spyware and/or malware software
Frequent Updates
Operating system and software
Automatic Updates
Wary of emails from unknown senders
Attachments & Links – Don’t left click or open
Known sender – if unsure, just ask them before openingSlide12
Action Steps (continued)
Backup
What, When, Where and Where?
Backup any files that you can’t replicate
Backup as frequently as possible
Backup on whatever you have – CD-ROMs, external hard drives, Internet, flash drives, SD cards
Store the media in a safe, known placeSlide13
Action Steps (continued)
Secure Your Passwords
The Strong Test – Is it strong enough ( length & content)
The Unique Test: Is it unique & unrelated?
The Practical Test: Can you remember it ?
The Recent Test: Have you changed it recently?
Use passwords on your home computer and services used on the Internet
Combine upper & lowercase
Numbers & punctuation
Can’t be found in the dictionarySlide14
Action Steps (continued)
Use caution when downloading & installing programs
Shareware – Paid for software (Microsoft Office)
Freeware – Free software (Adobe Reader)
Open Source – Free and “Open” Software (Firefox)
Questions to ask:
What is it?
What does it do
?
Do I need it?
Where is it coming from?
Is it worth it?Slide15
Recommendations
Anti-virus Software
Avast
Free Antivirus
Avira
AntiVir
Personal – Free Antivirus
Microsoft Security Essentials
Spyware removal
Malwarebytes
Anti-Malware Free
Firewall
Comodo
Internet Security
Provided Windows/Mac firewall
Backup
Windows Backup & Restore Center – Default (backup on External HDD/ CD-ROM)
SyncBack
– Freeware (backup on External HDD/ CD-ROM)
SugarSync
– Online
Backup
Live Mesh – Online Backup
Web Browser Add-ons/Plug-ins
Web of Trust for Firefox, Internet Explorer and Chrome
LastPass
Password Manager for Firefox, IE and
Chrome
www.download.comSlide16
Macintosh Computers
Who feels Macs are more secure than PCs?
More than half of Americans believe that PCs are very or extremely vulnerable to cybercrime attacks, while only 20% say the same about Macs
The survey of more than 1,000 people found that while both PC & Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.Slide17
Mac Computers (continued)
It isn’t the operating system or computer – it’s the user
Don’t fall for the marketing techniques Apple uses to entice consumers to buy their product.
Macs can get viruses too
At the 2009
CanSec
-West conference a security researcher broke into a mac within 10 seconds through flaw in the Mac internet browser, Safari (Discover Mag)
It is up to the user and operator of the computer to stay safe onlineSlide18
Conclusion
Be aware
Research
Know the risks
Don’t trust everything you see on the Internet
Be prepared
Have updated software and operating system
Use an anti-virus and protect yourself
Backup your files
Use the web and its services responsiblySlide19
Summary
C
omputer security prevents and detects unauthorized use of your computer
Computer security matters because your information matters
Users’ lack of knowledge or care is what truly causes security issues in computers
Have a plan and action steps to ensure safe use of your computer
Macs are great, but don’t buy one for security reasons, buy it because its what you want
There are several types of threats out there, but you can beat them all with one stick – awareness and preparationSlide20
QuestionsSlide21
Works Cited
Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT COMPUTER HACKING."
Discover
30.10 (2009): 80.
Academic Search Elite
. EBSCO. Web. 16 Feb. 2010
.
"Home Computer Security."
http://www.cert.org/homeusers/HomeComputerSecurity/
. November 22, 2002 . Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/homeusers/HomeComputerSecurity
/>.
"Home Network Security."
CERT
. 27 Feb 2006. Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/tech_tips/home_networks.html>.
Mills,
Elinor
. "In their words: Experts weigh in on Mac vs. PC security."
InSecurity
Complex
(2010): 1. Web. 16 Feb 2010. <http://news.cnet.com/8301-27080_3-10444561-245.html
>.
Abrams, Randy. "Once Upon a Cybercrime."
ESET Threat Blog
(2009): 1. Web. 16 Feb 2010. <http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6
>.
"Description of Malware."
Malwarebytes
. 2010.
Malwarebytes
Corporation, Web. 16 Feb 2010. <http://www.malwarebytes.org/malwarenet.php?name=Adware.MyWebSearch
>.
"Phishing."
OnGuard
Online
. Feb 2008.
OnGuard
Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/phishing.aspx
>.
"Spyware."
OnGuard
Online
. Feb 2008.
OnGuard
Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/spyware.aspx
>.
"Security Starter Kit."
CNET Download.com
. Jan 2010. CNET, Web. 16 Feb 2010. <http://download.cnet.com/2701-2023_4-6-1.html?tag=page;page
>.
"Confused man about a virus alert ."
Shutterstock
Images
. Web. 16 Feb 2010
.
"Recognizing and Avoiding Scams."
Howstuffworks
. Web. 17 Feb 2010. <http://computer.howstuffworks.com/5-internet-security-videos1.htm>.