Computer security - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Computer security

Description:

Avast Free Antivirus. Avira AntiVir Personal Free Antivirus. Microsoft Security Essentials. ... Computer security prevents and detects unauthorized use of your ... – PowerPoint PPT presentation

Number of Views:127
Avg rating:3.0/5.0
Slides: 22
Provided by: 123se145
Category:

less

Transcript and Presenter's Notes

Title: Computer security


1
Computer security
  • Information Systems Literacy Presentation

2
Outline
  • What is computer security and why it matters
  • Threats
  • How computers become insecure
  • Precautions to take
  • Recommendations
  • What about Macs?
  • Conclusion
  • Summary
  • Questions
  • Works Cited

3
Computer Security
  • Process of preventing and detecting unauthorized
    use of your computer
  • Prevention helps you stop intruders
  • Detection helps you determine if someone
    attempted to access your information and whether
    it was successful

4
Why It Matters
  • We use computers for everything
  • Banking
  • Entertainment
  • Work
  • School
  • Productivity
  • Shopping
  • Communication
  • Responsibility you could put others at risk

5
Threats
  • Malware A generic name for all malicious
    programs
  • Adware designed to show advertisements. It
    often reports personal information back to its
    owners privacy can be violated
  • Spyware installed on your computer without your
    consent to monitor or control your computer use
  • Rogue disguised as a trustworthy program (ex.
    anti-spyware)
  • Virus multiplies and is capable to attach
    itself to other programs after being executed
  • Trojan pretends to have a particular function,
    but that only shows its real purpose after
    execution (often destructive) - cant multiply

6
Threats (continued)
  • Phishing a scam where Internet fraudsters send
    or pop-up messages to lure personal and financial
    information from unsuspecting victims.
  • Ignorance significant part
  • Less than 50 of Americans even know what
    phishing is

7
Threats Phishing Example
8
Facebook Conversation
9
Facebook Conversation (cont.)
10
How Computers Become Insecure
  • Computers are made secure
  • Firewall keeps the unwanted out while allowing
    appropriate traffic in and out of the computer
  • Recent updates
  • No viruses, spyware or malware
  • The user and operator
  • Visiting unknown/ dangerous websites
  • Dont update or patch system and software
  • Open links and attachments in emails from unknown
    senders

11
Action Steps
  • Essential programs to have installed
  • Anti-virus software
  • Firewall program
  • Anti-spyware and/or malware software
  • Frequent Updates
  • Operating system and software
  • Automatic Updates
  • Wary of emails from unknown senders
  • Attachments Links Dont left click or open
  • Known sender if unsure, just ask them before
    opening

12
Action Steps (continued)
  • Backup
  • What, When, Where and Where?
  • Backup any files that you cant replicate
  • Backup as frequently as possible
  • Backup on whatever you have CD-ROMs, external
    hard drives, Internet, flash drives, SD cards
  • Store the media in a safe, known place

13
Action Steps (continued)
  • Secure Your Passwords
  • The Strong Test Is it strong enough ( length
    content)
  • The Unique Test Is it unique unrelated?
  • The Practical Test Can you remember it ?
  • The Recent Test Have you changed it recently?
  • Use passwords on your home computer and services
    used on the Internet
  • Combine upper lowercase
  • Numbers punctuation
  • Cant be found in the dictionary

14
Action Steps (continued)
  • Use caution when downloading installing
    programs
  • Shareware Paid for software (Microsoft Office)
  • Freeware Free software (Adobe Reader)
  • Open Source Free and Open Software (Firefox)
  • Questions to ask
  • What is it?
  • What does it do?
  • Do I need it?
  • Where is it coming from?
  • Is it worth it?

15
Recommendations
  • Anti-virus Software
  • Avast Free Antivirus
  • Avira AntiVir Personal Free Antivirus
  • Microsoft Security Essentials
  • Spyware removal
  • Malwarebytes Anti-Malware Free
  • Firewall
  • Comodo Internet Security
  • Provided Windows/Mac firewall
  • Backup
  • Windows Backup Restore Center Default (backup
    on External HDD/ CD-ROM)
  • SyncBack Freeware (backup on External HDD/
    CD-ROM)
  • SugarSync Online Backup
  • Live Mesh Online Backup
  • Web Browser Add-ons/Plug-ins
  • Web of Trust for Firefox, Internet Explorer and
    Chrome
  • LastPass Password Manager for Firefox, IE and
    Chrome
  • www.download.com

16
Macintosh Computers
  • Who feels Macs are more secure than PCs?
  • More than half of Americans believe that PCs are
    very or extremely vulnerable to cybercrime
    attacks, while only 20 say the same about Macs
  • The survey of more than 1,000 people found that
    while both PC Mac users perceive the Mac as
    being safer, Mac users are victims of cybercrime
    just as frequently as PC users.

17
Mac Computers (continued)
  • It isnt the operating system or computer its
    the user
  • Dont fall for the marketing techniques Apple
    uses to entice consumers to buy their product.
  • Macs can get viruses too
  • At the 2009 CanSec-West conference a security
    researcher broke into a mac within 10 seconds
    through flaw in the Mac internet browser, Safari
    (Discover Mag)
  • It is up to the user and operator of the computer
    to stay safe online

18
Conclusion
  • Be aware
  • Research
  • Know the risks
  • Dont trust everything you see on the Internet
  • Be prepared
  • Have updated software and operating system
  • Use an anti-virus and protect yourself
  • Backup your files
  • Use the web and its services responsibly

19
Summary
  • Computer security prevents and detects
    unauthorized use of your computer
  • Computer security matters because your
    information matters
  • Users lack of knowledge or care is what truly
    causes security issues in computers
  • Have a plan and action steps to ensure safe use
    of your computer
  • Macs are great, but dont buy one for security
    reasons, buy it because its what you want
  • There are several types of threats out there, but
    you can beat them all with one stick awareness
    and preparation

20
Questions
21
Works Cited
  • Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT
    COMPUTER HACKING." Discover 30.10 (2009) 80.
    Academic Search Elite. EBSCO. Web. 16 Feb. 2010.
  • "Home Computer Security." http//www.cert.org/home
    users/HomeComputerSecurity/. November 22, 2002 .
    Carnegie Mellon University, Web. 16 Feb 2010.
    lthttp//www.cert.org/homeusers/HomeComputerSecurit
    y/gt.
  • "Home Network Security." CERT. 27 Feb 2006.
    Carnegie Mellon University, Web. 16 Feb 2010.
    lthttp//www.cert.org/tech_tips/home_networks.htmlgt
    .
  • Mills, Elinor. "In their words Experts weigh in
    on Mac vs. PC security." InSecurity Complex
    (2010) 1. Web. 16 Feb 2010. lthttp//news.cnet.com
    /8301-27080_3-10444561-245.htmlgt.
  • Abrams, Randy. "Once Upon a Cybercrime." ESET
    Threat Blog (2009) 1. Web. 16 Feb 2010.
    lthttp//www.eset.com/threat-center/blog/2009/11/16
    /once-upon-a-cybercrimeE280A6gt.
  • "Description of Malware." Malwarebytes. 2010.
    Malwarebytes Corporation, Web. 16 Feb 2010.
    lthttp//www.malwarebytes.org/malwarenet.php?nameA
    dware.MyWebSearchgt.
  • "Phishing." OnGuard Online. Feb 2008. OnGuard
    Online, Web. 16 Feb 2010. lthttp//www.onguardonlin
    e.gov/topics/phishing.aspxgt.
  • "Spyware." OnGuard Online. Feb 2008. OnGuard
    Online, Web. 16 Feb 2010. lthttp//www.onguardonlin
    e.gov/topics/spyware.aspxgt.
  • "Security Starter Kit." CNET Download.com. Jan
    2010. CNET, Web. 16 Feb 2010. lthttp//download.cne
    t.com/2701-2023_4-6-1.html?tagpagepagegt.
  • "Confused man about a virus alert ." Shutterstock
    Images. Web. 16 Feb 2010.
  • "Recognizing and Avoiding Scams." Howstuffworks.
    Web. 17 Feb 2010. lthttp//computer.howstuffworks.c
    om/5-internet-security-videos1.htmgt.
Write a Comment
User Comments (0)
About PowerShow.com