1 / 15

Technology in Action

Technology in Action. Technology in Action. Technology in Focus: Protecting Your Computer and Backing Up Your Data. Physically Protecting Your Computer. Environmental factors Falls Excessive heat Dust and other particles Power surges Surge protectors Power outages

tamarr
Download Presentation

Technology in Action

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technology in Action

  2. Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

  3. Physically Protecting Your Computer • Environmental factors • Falls • Excessive heat • Dust and other particles • Power surges • Surge protectors • Power outages • Uninterruptible power supply (UPS)

  4. Deterring Theft • Motion alarms • Locks • Surrounds (cages) • “Phone home” computers Surround Lock Motion alarm

  5. Keeping PDAs and Cell Phones Safe • PDA Bomb Software • Thief steals PDA • Thief launches a brute force attack on device to get access • PDA senses attack and erases data • Bluetooth Vulnerability • Bluesnarfing • Exploits an access flaw in Bluetooth software making data vulnerable • Bluebugging • Hacker takes actual control of the Bluetooth device

  6. Protecting Your Computer from Unauthorized Access • Access privileges • Password protection • Passwords should • Contain 5 to 8 alphanumeric characters • Not be a word found in a dictionary • Not be easily associated with you • Include special characters • Never be given to anyone

  7. Good and Bad Passwords

  8. Managing Passwords • Free password management software takes the worry out of forgetting passwords • Remembers passwords for you. • Remember just one password to access the password management program

  9. Protecting Your Computer from Unauthorized Access • Keeping IM sessions safe • Allow connections only from the Buddy List • Disable file sharing, file transfer, and Direct IM

  10. Protecting Your Computer from Unauthorized Access • Biometric authentication devices • Read unique personal characteristics • Fingerprint • Iris patterns • Voice patterns • Face patterns Mouse fingerprint reader • Firewalls • Prevent unauthorized access when connected to the Internet

  11. Windows Updates • Microsoft frequently issues updates to patch security holes • In Windows XP, updates can be automatically loaded

  12. Backing Up Your Data • Backup • A copy of a file that can be used to replace the original • Types of files to backup • Program • Data • Backup routine • Frequency • Changed files

  13. Backup Software • Software programs for easy backup • Schedule automatic backups • Can backup files, folders, or entire drives • Back up to USB device, CD, or DVD • Entire system backup software • Takes an image of the entire system • Stores on a separate hard drive • In case of failure, new drive is inserted

  14. Protection from Phishing • Phishing attacks lure you to Web sites that look legitimate • Free tools identify suspicious sites. • Credit card providers offer services like “Virtual Account Numbers” for their customers

  15. Backing Up Your Data • Backup software • Schedule automatic backups • Online backups • Store backup files on Internet servers • Fees for the service

More Related