presented by: luke speed computer security. why is computer security important! intruders hack into...

Click here to load reader

Upload: sharon-lloyd

Post on 18-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

  • Slide 1
  • Presented by: Luke Speed Computer Security
  • Slide 2
  • Why is computer security important! Intruders hack into computers to steal personal information that the user has stored on it, such as; Credit Card Numbers Bank Accounts Anything that can be used get to the users money.
  • Slide 3
  • Computer Terms Attack- An attempt to gain control over another's computer. Vulnerability- This is the weak point of a computer system that allows hackers to gain control. Virus- A software that attaches itself to a file or files into the computer. Worm- Attaches to a running program or operating system and increases vulnerability.
  • Slide 4
  • More Computer Terms Trojan- A program that is usually hidden within free programs. Hacker- Someone who deliberately attempts to gain control over anothers computer. Spyware- Lets hackers know how the users is using the computer. Firewall- A program that limits the hackers ability to gain control over a computer. Backdoor- A program that allows hackers to access another users computer.
  • Slide 5
  • 9 Steps to Protect Your Computer 1) Install and properly use Anti-Virus Software 2) Keep your system Patched 3) Use precaution when opening emails with attachments 4) Install and properly use Firewall Software 5) Back-Up any important files and folders 6) Create strong passwords 7) Use precaution when installing or downloading programs 8) Install and use Hardware Firewall 9) Install and Use a File Encryption Program and Access Control http://www.cert.org/homeuser/HomeComputerSecurity/
  • Slide 6
  • Install and Properly Use Anti-Virus Software When installing a Anti-Virus program, there is a simple test that will help with thee process. These test are called the DURCH tests. Demand Update Respond Check Heuristics
  • Slide 7
  • Demand Can you check a file at any time needed? Before downloading an attachment or program are you capable of checking it for virus before you install it? If you download a suspicious file are you capable of checking it for viruses right at that moment?
  • Slide 8
  • Update Are you able to update virus databases at any time? How often will it update? A daily update would be best. Can you control when the update occurs? Are you able to schedule the update to occur when the computer is not in use?
  • Slide 9
  • Respond How can you respond to an infected file? Is the program able to remove or clean infected files? Can the program quarantine the file and keep it from infecting your computer? How well does it clean the file?
  • Slide 10
  • Check Can all your files be check on your home computer? Is it possible to have daily automatic scans? How often will it scan? Can you control when it scans your computer?
  • Slide 11
  • Heuristics Does the program do a heuristics test? Does it use common sense when determining rules for dealing with threats?
  • Slide 12
  • Keep your System Patched Keeping your system patched is a way of making sure all of your software is up to date and running properly. Before installing a patch ask your self these questions.
  • Slide 13
  • Does it Affect My System? Will the patch affect my computer and cause any problems with it?
  • Slide 14
  • Will it Break Another Program? Will the new patch break any programs I already have on my computer? Will it cause a problem with the old system?
  • Slide 15
  • Is it Reversible? If the patch does cause problems, can you reverse it and uninstall it?
  • Slide 16
  • Use Precaution When Opening Emails with Attachments Be careful before opening an E-mail attachment be sure to ask your questions like: Do I know who sent this? Can I trust what they sent me? Is it worth the risk to download it?
  • Slide 17
  • Install and properly use Firewall Software Install a security firewall to keep hackers out of your computer and keep your information private. These Steps will help make sure your firewall is properly installed and used. The Connection Test: make sure you know which programs need to connect to internet and avoid general rules of letting all programs connect. The location Test: Make sure you regulate the paths and locations the programs choose to use to connect to the internet. The Allowed Test: What programs are you allowing to connect to the internet? The Temporary Test: is the connection going to be an often one? If not make sure you add it as a temporary connection.
  • Slide 18
  • Back-Up any important files and folders Ask your self these questions when trying to figure out which files to back up: How easy is it to recreate the files? Back up files that you can not easily recreate with a CD-ROM or download from the internet. How often do I back up my files? Make sure when you change a file or update it that you also back it up. What media source do I have to save my files to? Use what you feel is the most convenient, if you have a CD-ROM or external hard drive, use it.
  • Slide 19
  • Create strong passwords A strong password will help secure your online accounts and information, ask yourself these questions to maximize your security. Is my password the as strong as it can be? Is it as long as it can be? Is it something unique and unrelated to you or your other passwords? Do I change it often?
  • Slide 20
  • Use precaution when installing or downloading programs Before buying and installing a program make sure you go over these questions. Do I know what this program does? Who wrote the program? Are they trustworthy? Can I buy the program from a local store instead of downloading it? Does it change my system in any way? Has anybody else I know used the program? What is their opinion?
  • Slide 21
  • Install and use Hardware Firewall Make sure you buy an additional firewall program to compliment the one that comes with your computer. Make sure these programs are able to work together and not conflict with one another.
  • Slide 22
  • Install and Use a File Encryption Program and Access Control If you have any files that are sensitive, files that are personal or contain information that is important, you should encrypt it to ensure that only you have access to it. Make sure you encrypt it to allow other users who need to use it the access to view it. Make sure you encrypt your files and folders that need to be encrypted are given rules according to their priority.
  • Slide 23
  • Additional Security Tips There are many more security tips that you can follow that will better equip your home computer to cope with malicious attacks from hackers and virus Encrypted Wi-Fi connection Limited guest user privileges Limit the number of different computers you connect your thumb drive to Be cautious when you choose to pirate music and movies Be cautious about the information you store on your computer Run daily virus scans
  • Slide 24
  • Encrypt Your Wi-Fi Connection If you choose to go with a wireless home network be sure you have a router that is capable of encryting your internet connection. Leaving your connection unprotected is the same as leaving your door unlocked when you are not home, an unencrypted network is an open invitation to hackers everywhere, so be cautious when picking a router.
  • Slide 25
  • Limited guest Privileges If you allow friends and family to use your computer be sure to set up a guest account on your computer to limit their access to your files as well as administrative actions, such as installing and uninstalling programs. Also, make sure your account is password protected with a strong password in the event that your laptop is stolen or left unattended.
  • Slide 26
  • Limit the use of your thumb drive Thumb drives are great for transferring larger files between computers but it is also great for picking up virus from an already infected computer, be sure to scan your thumb drive for virus after each use to make the probability of a virus attack unlikely.
  • Slide 27
  • Do Not Pirate Music Peer-to-peer sharing is one the fasting growing trends amongst computer users. Its the way most people get the newest songs and movies for free, but it also how most people get virus infections in their computer, causing them to either spend hundreds getting it repaired or buying a new computer.
  • Slide 28
  • Be Aware Be aware of the information you store on your computer, if it can easily be written down and stored some where else and is of important value, it would be best to store it the old-fashioned way with pen and paper in a safe location in your home than on a computer that is liable to get compromised by a virus or hacker.
  • Slide 29
  • Use the precautions you have learned It is no use to have all the tools to protect your computer if you do not use them. Make sure you change your passwords frequently and update and run your virus scans daily.
  • Slide 30
  • Recourses http://www.cert.org/homeusers/HomeComputerSec urity/ http://www.cert.org/homeusers/HomeComputerSec urity/ http://www.comptech.org/docs/etdp/homesec/ http://www.comptech.org/docs/etdp/homesec/ http://compnetworking.about.com/od/wirelesssecur ity/tp/wifisecurity.htm http://compnetworking.about.com/od/wirelesssecur ity/tp/wifisecurity.htm http://www.onguardonline.gov/topics/computers- security.aspx http://www.onguardonline.gov/topics/computers- security.aspx http://www.securityfocus.com/infocus/1746 http://www.securityfocus.com/infocus/1746