Title: Understanding security and safe computing'
1Understanding security and safe computing.
Bob Penn presents
2Understanding security and safe computing
- Overview Online Risks.
- Understanding the Risks.
- Keeping Safe.
3Overview Online Risks
- Internet shopping is booming every 20th pound
is spent online.
Internet card fraud accounts for 80 per cent of
all losses where the card is not physically
present.
4Overview Online Risks
Dont panic its not as bad as it sounds.
- Simple, common sense precautions can keep you
safe when youre in cyberspace.
5Understanding the Risks
- Viruses and worms can wreck your data and shut
down your machine. - Purchase recognised anti-viral and anti-spyware
programs and set them to auto-update regularly. - Free software is also available, and works well
but carries no warranty. - Set your browser preferences only to accept
cookies from sites you recognise and actively
wish to install.
6Understanding the Risks
- Do other users access your PC while youre
connected to the Internet. - Use a personal firewall.
- If your operating system already includes a
firewall, make sure it is switched on.
7Understanding the Risks
- Update your Operating System!
- Regularly install any operating system patches
and fixes to keep your system security in place. - Instruct your computer to check regularly. Cyber
crooks target those who dont bother.
8Understanding the Risks
- Eavesdroppers can tune in to insecure wireless
networks. - Many wireless networks are not encrypted, so
anyone with a little knowledge could eavesdrop. - Keep your device in non-discoverable mode when
you are not using Wi-Fi. - Do not connect to non-secure access points in
public places.
9Understanding the Risks
- E-mails from unknown people.
- If you receive mail from people or organisations
you do not know, delete them and, if possible,
inform your e-mail supplier that they are spam. - Do not open any unknown attachments these may
carry viruses. - Never reply because that alerts spammers that the
e-mail address is valid and you will be bombarded
with more messages from more senders.
10Understanding the Risks Sample - A
11Understanding the Risks Sample - B
12Understanding the Risks
- Password forgetfulness.
- The average person now has 15 different passwords
and codes to access online accounts and more than
ten per cent use an astonishing 50 or more online
accounts. - Many use the same password for several accounts
a quarter of us keep a password list in our purse
or wallet - DONT DO IT. - Use as many different passwords as possible and
try word association techniques to remember them.
- Never, ever give your password to anyone else
treat it like a PIN.
13Understanding the Risks
- File Delete is not enough.
- Information does not disappear when you place it
in your computers waste basket or recycle bin. - Buy and use a clean-up utility to overwrite the
disk space occupied by discarded information or
use a free eraser such as Eraser 5.86a from
(VNUNET). - Delete sensitive and personal information if you
need to send your PC to a supplier for a health
check or upgrade. - When replacing your computer, the only real way
of preventing others from recovering the data
from your hard disk is physical destruction.
14Understanding the Risks
- Portable storage devices.
- Portable storage devices, such as USB key rings,
are not secure. - keep them as safe as you would your passport or
credit cards.
15Understanding the Risks
- Back up important documents!
- Most of us are dependant on our PCs now, so it
makes sense to copy important documents on to a
CD and keep it somewhere secure. - And of courseDont, if possible, record your
passwords!
16Keeping Safe
17Keeping Safe
- Check your security status with Windows Security
Centre.
18Keeping Safe
19Keeping Safe
If Windows detects that your computer might need
enhanced security in any one of the security
areas firewall, automatic updating, malware
protection, or other security settings until
the problem is fixed, you will see a notification
every time you log on. Notifications are
displayed in the notification area of the
taskbar.
20Keeping Safe
Use and update regularly your Virus Protection.
- Destructive viruses, etc can erase information
from your hard disk, completely disable your
computer or worsen its performance and stability.
- Antivirus programs scan e-mail and other files on
your computer for viruses, worms, and Trojan
horses even the free ones. - If one is found, the antivirus program either
quarantines (isolates) it or deletes it entirely
before it damages your computer and files. - If you do not use antivirus software, you expose
your computer to damage from malicious software.
You also run the risk of spreading viruses to
other computers.
21Keeping Safe
Use and update regularly your Spyware Protection.
- Spyware/ Adware is software that can display
advertisements, collect information about you, or
change settings on your computer, generally
without obtaining your consent. - Most spyware is installed through free downloaded
software, but in some cases simply visiting a
website can results in an infection. - Windows has a built-in antispyware program called
Windows Defender, turned on by default. Defender
alerts you when spyware tries to install itself.
It also scans for existing spyware and then
remove it. - A number of free programs are also available but
require manual updating/scanning (SpyBot /
Ad-aware).
22Keeping Safe
Update Windows automatically.
- Microsoft regularly offers important updates to
Windows that can help protect your computer
against new viruses and other security threats.
To ensure that you receive these updates as
quickly as possible, turn on automatic updating.
23Safe Surfing
Bob