© 2009 prentice-hall, inc.1. 2 technology in action technology in focus: protecting your computer...

17
© 2009 Prentice-Hall, Inc. 1

Upload: brooke-jennings

Post on 28-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

© 2009 Prentice-Hall, Inc. 1

© 2009 Prentice-Hall, Inc. 2

Technology in ActionTechnology in Action

Technology in Focus: Technology in Focus: Protecting Your Computer and Protecting Your Computer and

Backing Up Your Data Backing Up Your Data

© 2009 Prentice-Hall, Inc. 3

Physically Protecting Your Physically Protecting Your ComputerComputer

• Environmental factorsEnvironmental factors– Sudden Sudden

movements/fallsmovements/falls– Excessive heat or coldExcessive heat or cold– Dust and other Dust and other

particlesparticles

• Power surgesPower surges– Surge protectorsSurge protectors

• Power outagesPower outages– Uninterruptible power Uninterruptible power

supply (UPS)supply (UPS)

© 2009 Prentice-Hall, Inc. 4

Deterring TheftDeterring Theft

• Motion alarms Motion alarms • Locks Locks • Surrounds (cages)Surrounds (cages)• ““Phone home” computersPhone home” computers

Surround

Motion alarmLock

© 2009 Prentice-Hall, Inc. 5

Keeping Handheld Devices SafeKeeping Handheld Devices Safe

• Bomb SoftwareBomb Software– Thief steals handheld deviceThief steals handheld device– Thief launches a brute force attack Thief launches a brute force attack

on device to get accesson device to get access– Handheld device senses attack Handheld device senses attack

and erases dataand erases data• Bluetooth VulnerabilityBluetooth Vulnerability

– BluesnarfingBluesnarfing• Exploits an access flaw in Bluetooth Exploits an access flaw in Bluetooth

software making data vulnerablesoftware making data vulnerable– BluebuggingBluebugging

• Hacker takes actual control of the Hacker takes actual control of the Bluetooth deviceBluetooth device

© 2009 Prentice-Hall, Inc. 6

Protecting Your Computer from Protecting Your Computer from Unauthorized AccessUnauthorized Access

• Access privilegesAccess privileges• Password protection Password protection

– Passwords shouldPasswords should• Contain at least 14 charactersContain at least 14 characters• Not be a word found in a dictionaryNot be a word found in a dictionary• Use a combination of several words with strategically Use a combination of several words with strategically

placed uppercase charactersplaced uppercase characters• Not be easily associated with youNot be easily associated with you

– Use a different password for each system or Web site Use a different password for each system or Web site you need to access you need to access

– Never tell anyone your password or write it downNever tell anyone your password or write it down– Change your password if you think someone may Change your password if you think someone may

know itknow it

© 2009 Prentice-Hall, Inc. 7

Good and Bad PasswordsGood and Bad Passwords

© 2009 Prentice-Hall, Inc. 8

Managing PasswordsManaging Passwords• Firefox Firefox

browser has browser has password password featurefeature

© 2009 Prentice-Hall, Inc. 9

Keep Prying Eyes from Keep Prying Eyes from Surfing HabitsSurfing Habits

• StealthSurferStealthSurfer– Protects surfing sessionsProtects surfing sessions– Plugs into USB portPlugs into USB port

• Preloaded with software, that shields your IP Preloaded with software, that shields your IP address from prying eyesaddress from prying eyes

• Have password management toolsHave password management tools

© 2009 Prentice-Hall, Inc. 10

Keeping IM Sessions SafeKeeping IM Sessions Safe

• Allow Allow connections connections only from only from the Buddy the Buddy ListList

• Disable file Disable file sharing, file sharing, file transfer, transfer, and Direct and Direct IMIM

© 2009 Prentice-Hall, Inc. 11

Keeping Windows Up to DateKeeping Windows Up to Date• Microsoft Microsoft

frequently frequently issues issues updates to updates to patch security patch security holesholes

• In Vista, In Vista, updates can updates can be be automatically automatically loadedloaded

© 2009 Prentice-Hall, Inc. 12

Biometric Authentication DevicesBiometric Authentication Devices

• Read unique personal characteristicsRead unique personal characteristics– FingerprintFingerprint– Iris patternsIris patterns– Voice patternsVoice patterns– Face patternsFace patterns

Mouse fingerprint reader

© 2009 Prentice-Hall, Inc. 13

FirewallsFirewalls• Prevent unauthorized access when Prevent unauthorized access when

connected to the Internetconnected to the Internet• Popular comprehensive security programs Popular comprehensive security programs

include firewallsinclude firewalls– Norton Internet Security Norton Internet Security – McAfee Internet Security SuiteMcAfee Internet Security Suite

© 2009 Prentice-Hall, Inc. 14

Protection from PhishingProtection from Phishing

• Phishing attacks lure you to Web sites that look legitimate

• Internet Explorer 7 has a built-in phishing filter

• Major Internet security packages, such as McAfee and Norton, offer phishing protection tools

© 2009 Prentice-Hall, Inc. 15

Backing Up Your DataBacking Up Your Data

• BackupBackup– A copy of a file that can be used to replace the A copy of a file that can be used to replace the

originaloriginal

• Types of files to backupTypes of files to backup– ProgramProgram– DataData

• Backup routineBackup routine– FrequencyFrequency– Changed filesChanged files

© 2009 Prentice-Hall, Inc. 16

Backing Up Your DataBacking Up Your Data

• Software programs for easy backupSoftware programs for easy backup– Schedule automatic backupsSchedule automatic backups– Can backup files, folders, or entire drivesCan backup files, folders, or entire drives– Back up to USB device, CD, or DVDBack up to USB device, CD, or DVD

• Entire system backup softwareEntire system backup software– Takes an image of the entire system Takes an image of the entire system – Stores on a separate hard driveStores on a separate hard drive– In case of failure, new drive is insertedIn case of failure, new drive is inserted

© 2009 Prentice-Hall, Inc. 17

Backing Up Your DataBacking Up Your Data

• Online backupsOnline backups– Store backup files on Store backup files on

Internet serversInternet servers– Fees for the serviceFees for the service