1 / 14

Computer Network Security

Computer Network Security. February 15-16 , 2013, Kompot , Cambodia. About Me:. Name: Leangchea Gouv Company: WiCam co,.ltd Position: Network Engineering E-mail: leangchea2222@gmail.com Mobile: 088 875 2222. Content:. Computer Security Computer Security risks to home users

erelah
Download Presentation

Computer Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Network Security February 15-16, 2013, Kompot, Cambodia

  2. About Me: • Name: LeangcheaGouv • Company: WiCamco,.ltd • Position: Network Engineering • E-mail: leangchea2222@gmail.com • Mobile: 088 875 2222

  3. Content: • Computer Security • Computer Security risks to home users • What is at risk? • Intentional misuse of your computer • Accidents and other risks • Action home users can take to protect their computer systems • Question?

  4. Computer Security • What is computer security?

  5. Computer Security • What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer.

  6. Computer Security • Why should I care about computer security?

  7. Computer Security • Why should I care about computer security? We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.  Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).

  8. Computer Security • Who would want to break into my computer?

  9. Computer Security • Who would want to break into my computer? • Hackers • Attackers • Crackers • etc..

  10. Computer security risks to users • What is at risks? Information security is concerned with three main area: • Confidentiality: information should be available only to those who rightfully to access it. • Integrity: information should be modified by those who are authorized • Availability: information should be accessible to those who need it

  11. Computer security risks to users • Intentional misuse of your computer The most common methods used by intruders to gain control of computers are described below: • Trojan horse programs • Back door and remote administration programs • Denial of service • Being an intermediary for another attack • Unprotected windows shares • Mobile code • Cross-site scripting • Email spoofing • Email-borne viruses • Hidden file extensions • Chat clients • Packet sniffing

  12. Computer security risks to users • Accidents and other risks • Disk Failure • Power failure and surges • Physical theft

  13. Actions users can take to protect their computer The recommends the following practices to users: • Consult your system support • Secure your Username & Password • Use virus protection software • Use a firewall • Don’t open unknown email attachments • Don’t run programs of unknown • Disable hidden filename extensions • Keep all application (including your operating system) patched • Turn off your computer or disconnect from the network when not use • Disable scripting features in email programs • Disable Java, Javascript, and activeX if possible • Make regular backups of critical data • Make a external disk in case your computer is damaged or compromised

  14. Question ?

More Related