Why is computer security important! Intruders hack into
computers to steal personal information that the user has stored on
it, such as; Credit Card Numbers Bank Accounts Anything that can be
used get to the users money.
Slide 3
Computer Terms Attack- An attempt to gain control over
another's computer. Vulnerability- This is the weak point of a
computer system that allows hackers to gain control. Virus- A
software that attaches itself to a file or files into the computer.
Worm- Attaches to a running program or operating system and
increases vulnerability.
Slide 4
More Computer Terms Trojan- A program that is usually hidden
within free programs. Hacker- Someone who deliberately attempts to
gain control over anothers computer. Spyware- Lets hackers know how
the users is using the computer. Firewall- A program that limits
the hackers ability to gain control over a computer. Backdoor- A
program that allows hackers to access another users computer.
Slide 5
9 Steps to Protect Your Computer 1) Install and properly use
Anti-Virus Software 2) Keep your system Patched 3) Use precaution
when opening emails with attachments 4) Install and properly use
Firewall Software 5) Back-Up any important files and folders 6)
Create strong passwords 7) Use precaution when installing or
downloading programs 8) Install and use Hardware Firewall 9)
Install and Use a File Encryption Program and Access Control
http://www.cert.org/homeuser/HomeComputerSecurity/
Slide 6
Install and Properly Use Anti-Virus Software When installing a
Anti-Virus program, there is a simple test that will help with thee
process. These test are called the DURCH tests. Demand Update
Respond Check Heuristics
Slide 7
Demand Can you check a file at any time needed? Before
downloading an attachment or program are you capable of checking it
for virus before you install it? If you download a suspicious file
are you capable of checking it for viruses right at that
moment?
Slide 8
Update Are you able to update virus databases at any time? How
often will it update? A daily update would be best. Can you control
when the update occurs? Are you able to schedule the update to
occur when the computer is not in use?
Slide 9
Respond How can you respond to an infected file? Is the program
able to remove or clean infected files? Can the program quarantine
the file and keep it from infecting your computer? How well does it
clean the file?
Slide 10
Check Can all your files be check on your home computer? Is it
possible to have daily automatic scans? How often will it scan? Can
you control when it scans your computer?
Slide 11
Heuristics Does the program do a heuristics test? Does it use
common sense when determining rules for dealing with threats?
Slide 12
Keep your System Patched Keeping your system patched is a way
of making sure all of your software is up to date and running
properly. Before installing a patch ask your self these
questions.
Slide 13
Does it Affect My System? Will the patch affect my computer and
cause any problems with it?
Slide 14
Will it Break Another Program? Will the new patch break any
programs I already have on my computer? Will it cause a problem
with the old system?
Slide 15
Is it Reversible? If the patch does cause problems, can you
reverse it and uninstall it?
Slide 16
Use Precaution When Opening Emails with Attachments Be careful
before opening an E-mail attachment be sure to ask your questions
like: Do I know who sent this? Can I trust what they sent me? Is it
worth the risk to download it?
Slide 17
Install and properly use Firewall Software Install a security
firewall to keep hackers out of your computer and keep your
information private. These Steps will help make sure your firewall
is properly installed and used. The Connection Test: make sure you
know which programs need to connect to internet and avoid general
rules of letting all programs connect. The location Test: Make sure
you regulate the paths and locations the programs choose to use to
connect to the internet. The Allowed Test: What programs are you
allowing to connect to the internet? The Temporary Test: is the
connection going to be an often one? If not make sure you add it as
a temporary connection.
Slide 18
Back-Up any important files and folders Ask your self these
questions when trying to figure out which files to back up: How
easy is it to recreate the files? Back up files that you can not
easily recreate with a CD-ROM or download from the internet. How
often do I back up my files? Make sure when you change a file or
update it that you also back it up. What media source do I have to
save my files to? Use what you feel is the most convenient, if you
have a CD-ROM or external hard drive, use it.
Slide 19
Create strong passwords A strong password will help secure your
online accounts and information, ask yourself these questions to
maximize your security. Is my password the as strong as it can be?
Is it as long as it can be? Is it something unique and unrelated to
you or your other passwords? Do I change it often?
Slide 20
Use precaution when installing or downloading programs Before
buying and installing a program make sure you go over these
questions. Do I know what this program does? Who wrote the program?
Are they trustworthy? Can I buy the program from a local store
instead of downloading it? Does it change my system in any way? Has
anybody else I know used the program? What is their opinion?
Slide 21
Install and use Hardware Firewall Make sure you buy an
additional firewall program to compliment the one that comes with
your computer. Make sure these programs are able to work together
and not conflict with one another.
Slide 22
Install and Use a File Encryption Program and Access Control If
you have any files that are sensitive, files that are personal or
contain information that is important, you should encrypt it to
ensure that only you have access to it. Make sure you encrypt it to
allow other users who need to use it the access to view it. Make
sure you encrypt your files and folders that need to be encrypted
are given rules according to their priority.
Slide 23
Additional Security Tips There are many more security tips that
you can follow that will better equip your home computer to cope
with malicious attacks from hackers and virus Encrypted Wi-Fi
connection Limited guest user privileges Limit the number of
different computers you connect your thumb drive to Be cautious
when you choose to pirate music and movies Be cautious about the
information you store on your computer Run daily virus scans
Slide 24
Encrypt Your Wi-Fi Connection If you choose to go with a
wireless home network be sure you have a router that is capable of
encryting your internet connection. Leaving your connection
unprotected is the same as leaving your door unlocked when you are
not home, an unencrypted network is an open invitation to hackers
everywhere, so be cautious when picking a router.
Slide 25
Limited guest Privileges If you allow friends and family to use
your computer be sure to set up a guest account on your computer to
limit their access to your files as well as administrative actions,
such as installing and uninstalling programs. Also, make sure your
account is password protected with a strong password in the event
that your laptop is stolen or left unattended.
Slide 26
Limit the use of your thumb drive Thumb drives are great for
transferring larger files between computers but it is also great
for picking up virus from an already infected computer, be sure to
scan your thumb drive for virus after each use to make the
probability of a virus attack unlikely.
Slide 27
Do Not Pirate Music Peer-to-peer sharing is one the fasting
growing trends amongst computer users. Its the way most people get
the newest songs and movies for free, but it also how most people
get virus infections in their computer, causing them to either
spend hundreds getting it repaired or buying a new computer.
Slide 28
Be Aware Be aware of the information you store on your
computer, if it can easily be written down and stored some where
else and is of important value, it would be best to store it the
old-fashioned way with pen and paper in a safe location in your
home than on a computer that is liable to get compromised by a
virus or hacker.
Slide 29
Use the precautions you have learned It is no use to have all
the tools to protect your computer if you do not use them. Make
sure you change your passwords frequently and update and run your
virus scans daily.