Computer security and privacy threats lesson 2
This presentation is the property of its rightful owner.
Sponsored Links
1 / 13

Computer Security and Privacy Threats Lesson 2 PowerPoint PPT Presentation


  • 117 Views
  • Uploaded on
  • Presentation posted in: General

Protecting the Operation Environment and Data on the Computer, Securing Online Transactions, and Ensuring Email and Instant Messaging Security. Computer Security and Privacy Threats Lesson 2. Set a username and password

Download Presentation

Computer Security and Privacy Threats Lesson 2

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Computer security and privacy threats lesson 2

Protecting the Operation Environment and Data on the Computer, Securing Online Transactions, and Ensuring Email and Instant Messaging Security

Computer Security and Privacy Threats Lesson 2


Protecting operating environment and data on the computer

  • Set a username and password

    • You can also increase security and limit unauthorized access to your computer by setting up a username and password.

  • Keep passwords secure

    • Anyone who knows your password can access your computer and tamper with data.

    • Do not share your password with others

Protecting Operating Environment and Data on the Computer


Protecting operating environment and data on the computer continued

  • Lock your computer

    • When a computer is locked, it immediately hides the content of the screen.

    • It does not allow any operation until the computer is unlocked with the correct username and password combination

  • Install protective software

    • protective software programs help you detect and remove viruses and spyware present in your computer

    • They also prevent new ones from infecting your computer

Protecting Operating Environment and Data on the Computer Continued


Protecting operating environment and data on the computer continued1

  • Encrypt data

    • Converting your data to an unreadable form to protect it from unauthorized access

  • Back up data

    • making copies of important files and storing them on a different storage media, such as CDs, DVDs, or floppy disks

    • Store in secure location

Protecting Operating Environment and Data on the Computer Continued


Protecting operating environment and data on the computer continued2

  • Keep your computer updated

    • software companies regularly create updates that you can install on your computer.

    • Ensure that you regularly update the antivirus software so that it can detect the newest viruses

Protecting Operating Environment and Data on the Computer Continued


Securing online and network transactions

  • Use strong passwords

    • A strong password is a complex password, which cannot be guessed easily

    • The password should consist of a combination of uppercase and lowercase letters, numbers, and special characters such as ampersand and number sign, and should not contain complete words or names.

  • Protect against hacking and spyware

    • You also need to install antivirus software and firewall on your computer to protect it from viruses and hackers.

Securing Online and Network Transactions


Securing online and network transactions continued

  • Clear history and cache periodically

    • To prevent hackers from accessing your personal information, regularly delete the contents present in the browser history and in the cache memory.

  • Delete cookies periodically

    • periodically delete cookies to prevent your personal information from being misused.

Securing Online and Network Transactions Continued


Securing online and network transactions continued1

  • Avoid sharing personal information

    • before you share any personal information on a Web site, ensure that it is a secured Web site and there is a specific need to provide the information.

  • Ensure online transactions are performed on secure sites

    • A Web site is secure if its name has the prefix https.

    • The prefix indicates that the Web site implements the Secure Sockets Layer (SSL) protocol

Securing Online and Network Transactions Continued


Securing online and network transactions continued2

  • Configure security components using Windows Security Center

    • Windows Firewall-The firewall helps prevent malicious content, such as viruses and worms, from entering your computer

    • Automatic Updates-Enabling this feature ensures that your computer remains updated and protected against the newest security threats on the Internet.

    • Internet Options-By using Internet options, you can set the security level to low, medium, or high. Changing the security level affects the way your browser handles various Internet files such as cookies and active content

Securing Online and Network Transactions Continued


Securing online and network transactions continued3

  • Disable active content

  • Make use of security help from your ISP

    • Some ISPs even provide firewall protection, e-mail virus screening, and spam protection.

Securing Online and Network Transactions Continued


Ensuring e mail and instant messaging security

  • Avoid opening e-mail with attachments

    • be cautious while opening any mail containing an attachment because it is the most common pathway for the spread of viruses.

  • Do not respond to junk mail

    • Junk mail is often malicious in nature and can include content that is harmful for your computer

Ensuring E-Mail and Instant Messaging Security


Ensuring e mail and instant messaging security continued

  • Do not respond to unsolicited commercial mail

    • commercial messages carry the potential of identity theft, and you might accidentally share some sensitive information while responding to them

  • Protect yourself from phishing

    • Phishing is a common activity used to extract personal information from computer users and then use the information for malicious purposes.

    • verify the authenticity of such e-mail messages before responding with any personal information.

Ensuring E-Mail and Instant Messaging Security Continued


Ensuring e mail and instant messaging security continued1

  • Chat with known people only

    • Developing communication with new and unknown individuals makes you more vulnerable to threats such as online predators and scams.

  • Do not open attachments received over IM

    • You must avoid opening any attachments that you receive in an instant message, unless you are absolutely sure about its origin.

Ensuring E-Mail and Instant Messaging Security Continued


  • Login