1 / 13

Computer Security: Protect your PC and Protect Yourself

Computer Security: Protect your PC and Protect Yourself. Computer Firewalls. Firewalls work to block unsolicited entry to your computer. The firewall routs communication through a proxy server outside the network. Security Center.

Download Presentation

Computer Security: Protect your PC and Protect Yourself

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security: Protect your PC and Protect Yourself

  2. Computer Firewalls Firewalls work to block unsolicited entry to your computer. The firewall routs communication through a proxy server outside the network.

  3. Security Center To set your firewall to be enabled to protect your computer go to your Start menu, Click on Settings Control Panel Security Center

  4. Your work computer should already have the firewall enabled. On your home computer make sure the firewall is set to On.

  5. Computer Firewalls Firewalls are your first line of computer defense. Select Windows Firewall

  6. Automatic Updates Automatic Updates: your continual line of defense to new viruses, worms, and other hacker tools used to enter your computer. Installing updates allows your computer to be continually protected against the changing environment.

  7. Set to Automatically Update

  8. Use Antivirus Protection • McAfee, Norton, AVG, etc • Only use one of them!! • Make sure it is enabled • Icon is usually in the system tray

  9. VirusesEmail, Web, and Instant Message • Viruses come in email attachments, URL links, and Instant Messages. • Do not trust the icons of attachment file. Worms often send executable files which have an icon resembling icons of picture, text or archive files (to fool the user). • Never accept attachments from strangers in online chat systems such as IRC, ICQ or AOL Instant Messenger. • Avoid downloading files from public newsgroups (Usenet news). These are often used by virus writers to distribute their new viruses. • Be wary of installing a “free” cd to your computer. It may have other things it installs without your knowledge. If you don’t know the sender of the message,don’t open any attachments, or click on anyURL addresses in an email,

  10. Internet Security • Anyone who is connected to the internet should know about security. Take time to educate yourself on the issues. Vigilance is the best defense against system vulnerabilities. • Install Anti Virus Software and keep it up to date. Using the most up to date version of this will ensure that it is kept up to date. • Keep your operating system up to date. The best way to do this if you are using Windows is to turn on auto update. • www.microsoft.com/athome/security/protect/

  11. How do you know you have a virus? • Your computer runs more slowly than normal • Your computer stops responding or locks up often • Your computer crashes and restarts every few minutes • Your computer restarts on its own and then fails to run normally • Applications on your computer don't work correctly • Disks or disk drives are inaccessible • You can't print correctly • You see unusual error messages • You see distorted menus and dialog boxes

  12. Worst Case Scenario • Received a virus – now what? • Several Possibilities • Load Anti virus software, let the software detect and attempt to fix your computer • May not solve the entire problem • “Reimage” your machine(reinstall everything) • Time consuming • Take it to a professional • Can be costly ($$)

  13. Resources The following web addresses provide very helpful information in addition to this presentation. • Security at Homewww.microsoft.com/athome/security/protect/ • Protecting a new computerhttp://www.purdue.edu/securepurdue/bestPractices/newComputer.cfm

More Related