1 / 13

Safe Computing

Safe Computing. Computer Maintenance. Back up, Back up, Back up External Hard Drive CDs or DVDs Disk Defragmenter Reallocates files so they use available hard drive space more efficiently Restore Utility Periodically creates a restore point

janna
Download Presentation

Safe Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe Computing

  2. Computer Maintenance • Back up, Back up, Back up • External Hard Drive • CDs or DVDs • Disk Defragmenter • Reallocates files so they use available hard drive space more efficiently • Restore Utility • Periodically creates a restore point • Manually create a restore point before making any major changes to your system

  3. Viruses • Computer viruses are malicious codes or programs that are usually installed on your computer without your knowledge and against your wishes. • Virus severity varies • Just a nuisance • Corrupt or erase files • Shut down the computer • Erase the entire hard drive

  4. How does your computer get a virus? • Through an e-mail attachment • Don’t open attachments without scanning with anti-virus software • Don’t open attachments unless you know the sender and why they are sending the attachment • Through files you download

  5. Worms • Worms are malicious programs that spread from computer to computer without human interaction. • Burrow into your e-mail address book and then send themselves out to your contacts • Open a “back door” to your system, which enables hackers access to it and the ability to control it with remote access • Replicate themselves and eventually fill up your hard drive or network drive

  6. Trojan Horses • Not truly viruses because they do not duplicate themselves or infect other files. • Appear as legitimate programs (free screensaver, animated cursors)

  7. Spyware and Adware • Spyware is software designed to capture personal and confidential information that resides on your system and send it elsewhere. • Primary threat to your privacy and confidentiality – passwords, IP Address • Doesn’t usually harm your system • Adware is spyware that tracks your Internet browsing and can install malicious cookies on your computer. • Cookies are small text files that contain information that can identify you to a Web site. • Cause an increase in the number of pop-up ads sometimes even when you’re not online. • Hijack your browser and direct you to undesirable Web pages.

  8. Key loggers • Key loggers record every keystroke made on the computer. • Capture passwords, credit card numbers, bank account numbers, etc. • Hardware key loggers attached between keyboard and computer • Trojan horses can be used to distribute key loggers.

  9. Avoiding Spyware • Don’t use free file-sharing services – Kazaa, Morpheus, Share Bear • Don’t click on buttons on pop-up ads – use the close X in the right corner of the window • Use pop-up blocking software – already enabled in IE and Firefox

  10. Protecting Your Computer • Update your Operating System and Web browser • Install and update Antivirus software • AVG Free – www.download.com, type AVG free in Search box • Personal firewalls – prevent unauthorized access to your computer, prevent it from becoming a zombie • Hardware - router • Software – Windows XP and Vista have software firewall included

  11. Protecting Yourself • Avoid phishing attempts by never giving out personal information unless it is for legitimate purposes. Legitimate organizations will never ask for passwords, bank account numbers or credit card details through e-mail. • Be aware of pharming. Pharming is the practice where fraudulent Web sites are created to look like an official Web site, so that unknowing clients and customers conduct business and reveal personal information. • Create strong passwords that include combo of numbers and letters • Never give out your passwords

  12. Phishing example

  13. Secure Web sites • When using a web site for shopping or banking transactions, you want the Web site to be secure. • In the address bar the URL should have the protocol HTTPS:// rather than just HTTP://

More Related