1 / 0

Computer security

Computer security . Purposes. To arouse the awareness regarding computer application security To avoid data leakage by taking some precautious measures. Today’s topics. Simple precautious measures against most of the computer security threat E-mail usage safety

wynn
Download Presentation

Computer security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer security

  2. Purposes To arouse the awareness regarding computer application security To avoid data leakage by taking some precautious measures
  3. Today’s topics Simple precautious measures against most of the computer security threat E-mail usage safety Web surfing privacy and safety Wireless network safety
  4. What is Computer Security? It is the protection of the information stored in a computer system, as opposed to protecting information that is being transmitted (which is network security), or protecting the equipment and the facility itself (physical security) Focus on operating system features that control who can access a system and the data stored in it.
  5. Definitions of Virus , Worm, Trojan , Adware and Spyware Virus It is malicious code that replicates itself. Serious damage can be made, such as erasing files. Worm Similar as virus as it replicates itself. It resides in memory and eats up a lot of system resources. Trojan Get its name from the story of the Trojan horse in Greek legend
  6. Definitions of Virus, Worm, Trojan, Adware and Spyware It is a malicious program which masqueraded as a normal application Adware Commonly used to generate ads. Can monitor various aspects of how you use your computer (e.g. What websites you have visited)
  7. Definitions of Virus, Worm, Trojan, Adware and Spyware Spyware Similar to Adware But it installs malicious software without your permission
  8. Simple precautious measures to most of the computer security threat Password Understand the password cracking methods: Dictionary Attack Brute Force Attack Hybrid Attack Advice Select strong password (1. Length, 2. Character types e.g. #?@! , 3. Capitalizing,4. Avoid dictionary words) Change them often Only use your own Keep them hidden Not share them with your friends Use different set of password according to its importance Protect yourself with Antivirus software (e.g. Sophos, Norton,etc)Free Antivirus (e.g. Antivir, AVG) Keep your Antivirus software updatedUpdate your antivirus software daily, schedule update can be set. Patch your Windows systems
  9. Simple precautious measures to most of the computer security threat Install “Microsoft Malicious Software Removal Tool”http://www.microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en Enable the Windows firewall (Click Start  Windows FirewallEnable)
  10. Simple precautious measures to most of the computer security threat How to set automatic updates in Windows XP? Click Start  Control Panel  Automatic Updates  Choose Automatic (recommended) and set the time which is suitable for you You can update other Windows programs manually by visiting http://update.microsoft.com/microsoftupdate/v6/default.aspx
  11. Simple precautious measures to most of the computer security threat Disable hidden file extensions Why? Malicious software can hide their file extension which misleads you as a safe file. E.g. An executable file with the file extension goodsoftware.txt Enable screen-saver’s password protected function Why? Deny access when the user’s computer is idle for a period of time without a valid password
  12. E-mail Usage Safety Risks: Malicious Attachment Spoofed Addresses Spam Hoaxes and Phishing (An adaptation of the word “fishing”)
  13. E-mail Usage Safety Malicious Attachment How? Using Social Engineering to trick you What is Social Engineering?Social engineering is the act of manipulating people into performing actions or divulging/exposing confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering,fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. (From Wikipedia) Ramification? You trust the e-mail message and open the malicious attachment and has the possibilities that your computer get infected with malware
  14. E-mail Usage Safety Be suspicious when opening any attachments Disable hidden file extensions as mentioned earlier When reading mail sent from anyone, take a look at the subject to see whether there are any suspicious terms (e.g. Re: Re: Re ) Reputable companies would not ask for your username and password in an email Do not open any suspicious hyperlink in the email (Open it via reliable search engine or call up customer services)Recommended software: http://linkscanner.avg.com/
  15. Web Surfing Privacy and Safety Cookies A simple text files stored at your computer for the web server to record user’s activities on a given website. Shopping Safety Beware of malicious website (e-banking website)
  16. Web Surfing Privacy and Safety precautious measures Do not open any suspicious website from the link in the e-mail Confirm with the corporation that the website is legitimate Confirm that you are connected with the website with encryption using SSL (Secure Socket Layer) (The address should be started with https:) when transmitting sensitive information Check the validity of a website by clicking on the “locked padlock icon”
  17. Web Surfing Privacy and Safety precautious measures 1. 2. Check whether you are connected to the website with https, which means the data transmitted to the web server will be encrypted. Double click on the “locked padlock icon” to see whether this website is legitimate.
  18. Web Surfing Privacy and Safety precautious measures Click on it to view the digital certificate
  19. Web Surfing Privacy and Safety precautious measures Keep an eye on the: Publisher (e.g. Verisign) Valid from and valid until Publish to (Should be the company which you are visiting on the website)
  20. Wireless Network Security Widely used and ubiquitous Risk? Use your home access-point without permission Utilize your access-point to sniff, steal your personal information Illegal activities
  21. Wireless Network Security – Security Measures Change the factory-default (Username, password)  STRONG PASSWORDfor your wireless router Change the SSID (Service Set Identifier) Disable broadcasting of the SSID Configure the connection mode (From ad-hoc to infrastructure) Filter access based on the client MAC (Media Access Control) address Review router’s log Turn off the wireless router when you don’t use it
  22. Public Wireless Network Safety Install Up-to-Date Antivirus Software Install a Personal Firewall Disable file and folder sharing Make sure you are connecting to a trusted access point Beware of prying eyes Use Web-Based E-mailWhy? Most of the Web-Based E-mail uses (SSL) to encrypt the data when transmitted data from client to server.
More Related