Personal Computer Security - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Personal Computer Security

Description:

Screen Saver Passwords. Solutions Data. Data Security. What data should be stored on the computer? ... Use your screensaver. Remember to log off. Make sure you ... – PowerPoint PPT presentation

Number of Views:73
Avg rating:3.0/5.0
Slides: 19
Provided by: chris878
Category:

less

Transcript and Presenter's Notes

Title: Personal Computer Security


1
Personal Computer Security
  • Chris Jenkins MCSE CCNA

2
Why Bother?
  • Risk of losing your data
  • Risk of losing client data
  • Financial liability of your computer harming
    other businesses
  • And more
  • The importance of personal computer security is
    based on the owners definition of acceptable
    risk. Depending on the information stored,
    equipment, your connectivity options and your
    personal level of acceptable risk you may find
    you need very little or quite a bit of security
    tweaking.

3
Simple Risks
  • Computer Equipment
  • Laptop
  • Desktop
  • Printers
  • Floppy Drive
  • CD Burners
  • Data
  • Personal
  • Client
  • Network
  • Corporate Networks
  • Home Networks
  • ISPs

4
Computer Equipment
  • Laptop
  • Stolen??
  • Desktop
  • Stolen??
  • Printers
  • Used to make hard copies of documents or images??
  • Floppy Drives
  • Used to copy data
  • Used to insert viruses
  • Used to insert data capturing programs
  • CD Burners
  • Used to copy mass data

5
Data
  • Personal Data
  • Bill Payment
  • Financials
  • Access to websites
  • E-mail
  • Client
  • Financials
  • Confidential Materials

6
Network
  • Corporate Networks
  • Most Hacks come from internal staff
  • You could become a threat to other users
  • Home Networks
  • Wi-Fi
  • Unauthorized Use
  • ISP (Internet Service Providers)
  • Crackers
  • Viruses
  • Trojans

7
What Risks Affect you
  • Once you have determined what security risks
    could potentially be an issue for your particular
    situation what can you do about it?
  • Research
  • http//www.google.com
  • PC Security
  • Internet Security
  • File Encryption
  • Laptop Security
  • Security Presentations
  • This one
  • MS Events

8
Solutions Hardware
  • Laptop Desktop
  • BIOS Security
  • Password Protect your Computer at the BIOS level
  • Normally two levels
  • Master
  • User
  • Lock down or turn off unneeded access to
    peripherals
  • Floppy Drives
  • Printers
  • CD-ROMs

9
Solutions Hardware
  • Laptop Desktops
  • Physical Location
  • Dont leave Laptops where they can be stolen
  • Dont assume your car is safe
  • Watch at airports and events
  • Use security lock down devices is required
  • Dont leave Desktops on and accessible
  • Log-off
  • Screen Saver Passwords

10
Solutions Data
  • Data Security
  • What data should be stored on the computer?
  • Some data just shouldnt belong.
  • Password Storage
  • Use USB Keys
  • Use high encryption software packages

11
Solutions Data
  • What is data Encryption?
  • A method of scrambling or encoding data to
    prevent unauthorized users from reading or
    tampering with the data. Only individuals with
    access to a password or key can decrypt and use
    the data. The data can include messages, files,
    folders, or disks.
  • What data should be encrypted?
  • Tools
  • www.snapfiles.com/Freeware/security/fwencrypt.html
  • www.spychecker.com/software/encrypt.html

12
Solutions Data
  • Be sure deleted data is actually gone.
  • Tools
  • www.spychecker.com/software/erase.html
  • www.pcworld.com/downloads/collection/0,collid,1231
    ,00.asp
  • Hide your Tracks
  • Delete Internet Cache
  • Delete Internet History
  • Delete Recently Viewed Documents

13
Network Office
  • Corporate Networks
  • Use your screensaver
  • Remember to log off
  • Make sure you have an up to date virus scanner
  • Use best practices to secure your data
  • Make sure youre not sharing your computer
  • Watch your logs

14
Network Home
  • Home Networks
  • Always log-off and shut down when you arent
    using the PC.
  • Set IM clients to not show away or idle times.
  • Have multiple log-ins for multiple people
  • Have a good firewall
  • Have a good and up to date virus scanner
  • Use WEP encryption on wireless devices
  • No system should ever auto log-on

15
Network External
  • ISP
  • Use a good Firewall
  • Use up to date virus scanners
  • Use Spyware detectors
  • Always watch your logs
  • Apply OS updates regularly
  • Disable Internet when not in use

16
Network Security tools for all users
  • Firewalls
  • www.spychecker.com/software/firewall.html
  • www.symantec.com/sabu/nis/npf/
  • us.mcafee.com/root/package.asp?pkgid103cid9902
  • Road Runner Home users have access to free tools.
  • Anti Virus
  • www.spychecker.com/software/virus.html
  • us.mcafee.com/root/package.asp?pkgid100cid9901
  • www.symantec.com/nav/nav_9xnt/
  • Spyware
  • www.lavasoftusa.com
  • us.mcafee.com/root/package.asp?pkgid182cid9904
  • Updates
  • windowsupdate.microsoft.com

17
Conclusion
  • Depending on how and where you use your PC, you
    have several decisions to make about computer
    security.
  • Identifying risks
  • Defining acceptable risk
  • Protection
  • Protecting yourself isnt always easy but it is
    necessary and possible.

18
Questions
  • Questions and comments are welcome
  • E-mail cjenkins_at_ohio-cpa.com
Write a Comment
User Comments (0)
About PowerShow.com