Information systems literacy presentation
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

Computer security PowerPoint PPT Presentation


  • 100 Views
  • Uploaded on
  • Presentation posted in: General

Information Systems & Literacy Presentation. Computer security. Outline. What is computer security and why it matters Threats How computers become insecure Precautions to take Recommendations What about Macs? Conclusion Summary Questions Works Cited. Computer Security.

Download Presentation

Computer security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Information systems literacy presentation

Information Systems & Literacy Presentation

Computer security


Outline

Outline

  • What is computer security and why it matters

  • Threats

  • How computers become insecure

    • Precautions to take

    • Recommendations

  • What about Macs?

  • Conclusion

  • Summary

  • Questions

  • Works Cited


Computer security

Computer Security

  • Process of preventing and detecting unauthorized use of your computer

    • Prevention helps you stop intruders

    • Detection helps you determine if someone attempted to access your information and whether it was successful


Why it matters

Why It Matters

  • We use computers for everything

    • Banking

    • Entertainment

    • Work

    • School

    • Productivity

    • Shopping

    • Communication

  • Responsibility – you could put others at risk


Threats

Threats

  • Malware – A generic name for all malicious programs

  • Adware – designed to show advertisements. It often reports personal information back to its owners – privacy can be violated

  • Spyware – installed on your computer without your consent to monitor or control your computer use

  • Rogue – disguised as a trustworthy program (ex. anti-spyware)

  • Virus – multiplies and is capable to attach itself to other programs after being executed

  • Trojan – pretends to have a particular function, but that only shows its real purpose after execution (often destructive) - can’t multiply


Threats continued

Threats (continued)

  • Phishing – a scam where Internet fraudsters send or pop-up messages to lure personal and financial information from unsuspecting victims.

    • Ignorance – significant part

      • Less than 50% of Americans even know what phishing is


Threats phishing example

Threats – Phishing Example


Computer security

Facebook Conversation


Facebook conversation cont

Facebook Conversation (cont.)


How computers become insecure

How Computers Become Insecure

  • Computers are made secure

    • Firewall – keeps the unwanted out while allowing appropriate traffic in and out of the computer

    • Recent updates

    • No viruses, spyware or malware

  • The user and operator

    • Visiting unknown/ dangerous websites

    • Don’t update or patch system and software

    • Open links and attachments in emails from unknown senders


Action steps

Action Steps

  • Essential programs to have installed

    • Anti-virus software

    • Firewall program

    • Anti-spyware and/or malware software

  • Frequent Updates

    • Operating system and software

    • Automatic Updates

  • Wary of emails from unknown senders

    • Attachments & Links – Don’t left click or open

    • Known sender – if unsure, just ask them before opening


Action steps continued

Action Steps (continued)

  • Backup

    • What, When, Where and Where?

      • Backup any files that you can’t replicate

      • Backup as frequently as possible

      • Backup on whatever you have – CD-ROMs, external hard drives, Internet, flash drives, SD cards

      • Store the media in a safe, known place


Action steps continued1

Action Steps (continued)

  • Secure Your Passwords

    • The Strong Test – Is it strong enough ( length & content)

    • The Unique Test: Is it unique & unrelated?

    • The Practical Test: Can you remember it ?

    • The Recent Test: Have you changed it recently?

    • Use passwords on your home computer and services used on the Internet

    • Combine upper & lowercase

    • Numbers & punctuation

    • Can’t be found in the dictionary


Action steps continued2

Action Steps (continued)

  • Use caution when downloading & installing programs

    • Shareware – Paid for software (Microsoft Office)

    • Freeware – Free software (Adobe Reader)

    • Open Source – Free and “Open” Software (Firefox)

    • Questions to ask:

      • What is it?

      • What does it do?

      • Do I need it?

      • Where is it coming from?

      • Is it worth it?


Recommendations

Recommendations

  • Anti-virus Software

    • Avast Free Antivirus

    • Avira AntiVir Personal – Free Antivirus

    • Microsoft Security Essentials

  • Spyware removal

    • Malwarebytes Anti-Malware Free

  • Firewall

    • Comodo Internet Security

    • Provided Windows/Mac firewall

  • Backup

    • Windows Backup & Restore Center – Default (backup on External HDD/ CD-ROM)

    • SyncBack – Freeware (backup on External HDD/ CD-ROM)

    • SugarSync – Online Backup

    • Live Mesh – Online Backup

  • Web Browser Add-ons/Plug-ins

    • Web of Trust for Firefox, Internet Explorer and Chrome

    • LastPass Password Manager for Firefox, IE and Chrome

  • www.download.com


Macintosh computers

Macintosh Computers

  • Who feels Macs are more secure than PCs?

  • More than half of Americans believe that PCs are very or extremely vulnerable to cybercrime attacks, while only 20% say the same about Macs

  • The survey of more than 1,000 people found that while both PC & Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.


Mac computers continued

Mac Computers (continued)

  • It isn’t the operating system or computer – it’s the user

  • Don’t fall for the marketing techniques Apple uses to entice consumers to buy their product.

    • Macs can get viruses too

    • At the 2009 CanSec-West conference a security researcher broke into a mac within 10 seconds through flaw in the Mac internet browser, Safari (Discover Mag)

  • It is up to the user and operator of the computer to stay safe online


Conclusion

Conclusion

  • Be aware

    • Research

    • Know the risks

    • Don’t trust everything you see on the Internet

  • Be prepared

    • Have updated software and operating system

    • Use an anti-virus and protect yourself

    • Backup your files

    • Use the web and its services responsibly


Summary

Summary

  • Computer security prevents and detects unauthorized use of your computer

  • Computer security matters because your information matters

  • Users’ lack of knowledge or care is what truly causes security issues in computers

  • Have a plan and action steps to ensure safe use of your computer

  • Macs are great, but don’t buy one for security reasons, buy it because its what you want

  • There are several types of threats out there, but you can beat them all with one stick – awareness and preparation


Questions

Questions


Works cited

Works Cited

  • Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT COMPUTER HACKING." Discover 30.10 (2009): 80. Academic Search Elite. EBSCO. Web. 16 Feb. 2010.

  • "Home Computer Security." http://www.cert.org/homeusers/HomeComputerSecurity/. November 22, 2002 . Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/homeusers/HomeComputerSecurity/>.

  • "Home Network Security." CERT. 27 Feb 2006. Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/tech_tips/home_networks.html>.

  • Mills, Elinor. "In their words: Experts weigh in on Mac vs. PC security." InSecurity Complex (2010): 1. Web. 16 Feb 2010. <http://news.cnet.com/8301-27080_3-10444561-245.html>.

  • Abrams, Randy. "Once Upon a Cybercrime." ESET Threat Blog (2009): 1. Web. 16 Feb 2010. <http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6>.

  • "Description of Malware." Malwarebytes. 2010. Malwarebytes Corporation, Web. 16 Feb 2010. <http://www.malwarebytes.org/malwarenet.php?name=Adware.MyWebSearch>.

  • "Phishing." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/phishing.aspx>.

  • "Spyware." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010. <http://www.onguardonline.gov/topics/spyware.aspx>.

  • "Security Starter Kit." CNET Download.com. Jan 2010. CNET, Web. 16 Feb 2010. <http://download.cnet.com/2701-2023_4-6-1.html?tag=page;page>.

  • "Confused man about a virus alert ." Shutterstock Images. Web. 16 Feb 2010.

  • "Recognizing and Avoiding Scams." Howstuffworks. Web. 17 Feb 2010. <http://computer.howstuffworks.com/5-internet-security-videos1.htm>.


  • Login