150 likes | 400 Views
Computer Network Security. February 15-16 , 2013, Kompot , Cambodia. About Me:. Name: Leangchea Gouv Company: WiCam co,.ltd Position: Network Engineering E-mail: leangchea2222@gmail.com Mobile: 088 875 2222. Content:. Computer Security Computer Security risks to home users
E N D
Computer Network Security February 15-16, 2013, Kompot, Cambodia
About Me: • Name: LeangcheaGouv • Company: WiCamco,.ltd • Position: Network Engineering • E-mail: leangchea2222@gmail.com • Mobile: 088 875 2222
Content: • Computer Security • Computer Security risks to home users • What is at risk? • Intentional misuse of your computer • Accidents and other risks • Action home users can take to protect their computer systems • Question?
Computer Security • What is computer security?
Computer Security • What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer.
Computer Security • Why should I care about computer security?
Computer Security • Why should I care about computer security? We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).
Computer Security • Who would want to break into my computer?
Computer Security • Who would want to break into my computer? • Hackers • Attackers • Crackers • etc..
Computer security risks to users • What is at risks? Information security is concerned with three main area: • Confidentiality: information should be available only to those who rightfully to access it. • Integrity: information should be modified by those who are authorized • Availability: information should be accessible to those who need it
Computer security risks to users • Intentional misuse of your computer The most common methods used by intruders to gain control of computers are described below: • Trojan horse programs • Back door and remote administration programs • Denial of service • Being an intermediary for another attack • Unprotected windows shares • Mobile code • Cross-site scripting • Email spoofing • Email-borne viruses • Hidden file extensions • Chat clients • Packet sniffing
Computer security risks to users • Accidents and other risks • Disk Failure • Power failure and surges • Physical theft
Actions users can take to protect their computer The recommends the following practices to users: • Consult your system support • Secure your Username & Password • Use virus protection software • Use a firewall • Don’t open unknown email attachments • Don’t run programs of unknown • Disable hidden filename extensions • Keep all application (including your operating system) patched • Turn off your computer or disconnect from the network when not use • Disable scripting features in email programs • Disable Java, Javascript, and activeX if possible • Make regular backups of critical data • Make a external disk in case your computer is damaged or compromised