1 / 13

Computer Security and Privacy Threats Lesson 2

Protecting the Operation Environment and Data on the Computer, Securing Online Transactions, and Ensuring Email and Instant Messaging Security. Computer Security and Privacy Threats Lesson 2. Set a username and password

avent
Download Presentation

Computer Security and Privacy Threats Lesson 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting the Operation Environment and Data on the Computer, Securing Online Transactions, and Ensuring Email and Instant Messaging Security Computer Security and Privacy Threats Lesson 2

  2. Set a username and password • You can also increase security and limit unauthorized access to your computer by setting up a username and password. • Keep passwords secure • Anyone who knows your password can access your computer and tamper with data. • Do not share your password with others Protecting Operating Environment and Data on the Computer

  3. Lock your computer • When a computer is locked, it immediately hides the content of the screen. • It does not allow any operation until the computer is unlocked with the correct username and password combination • Install protective software • protective software programs help you detect and remove viruses and spyware present in your computer • They also prevent new ones from infecting your computer Protecting Operating Environment and Data on the Computer Continued

  4. Encrypt data • Converting your data to an unreadable form to protect it from unauthorized access • Back up data • making copies of important files and storing them on a different storage media, such as CDs, DVDs, or floppy disks • Store in secure location Protecting Operating Environment and Data on the Computer Continued

  5. Keep your computer updated • software companies regularly create updates that you can install on your computer. • Ensure that you regularly update the antivirus software so that it can detect the newest viruses Protecting Operating Environment and Data on the Computer Continued

  6. Use strong passwords • A strong password is a complex password, which cannot be guessed easily • The password should consist of a combination of uppercase and lowercase letters, numbers, and special characters such as ampersand and number sign, and should not contain complete words or names. • Protect against hacking and spyware • You also need to install antivirus software and firewall on your computer to protect it from viruses and hackers. Securing Online and Network Transactions

  7. Clear history and cache periodically • To prevent hackers from accessing your personal information, regularly delete the contents present in the browser history and in the cache memory. • Delete cookies periodically • periodically delete cookies to prevent your personal information from being misused. Securing Online and Network Transactions Continued

  8. Avoid sharing personal information • before you share any personal information on a Web site, ensure that it is a secured Web site and there is a specific need to provide the information. • Ensure online transactions are performed on secure sites • A Web site is secure if its name has the prefix https. • The prefix indicates that the Web site implements the Secure Sockets Layer (SSL) protocol Securing Online and Network Transactions Continued

  9. Configure security components using Windows Security Center • Windows Firewall-The firewall helps prevent malicious content, such as viruses and worms, from entering your computer • Automatic Updates-Enabling this feature ensures that your computer remains updated and protected against the newest security threats on the Internet. • Internet Options-By using Internet options, you can set the security level to low, medium, or high. Changing the security level affects the way your browser handles various Internet files such as cookies and active content Securing Online and Network Transactions Continued

  10. Disable active content • Make use of security help from your ISP • Some ISPs even provide firewall protection, e-mail virus screening, and spam protection. Securing Online and Network Transactions Continued

  11. Avoid opening e-mail with attachments • be cautious while opening any mail containing an attachment because it is the most common pathway for the spread of viruses. • Do not respond to junk mail • Junk mail is often malicious in nature and can include content that is harmful for your computer Ensuring E-Mail and Instant Messaging Security

  12. Do not respond to unsolicited commercial mail • commercial messages carry the potential of identity theft, and you might accidentally share some sensitive information while responding to them • Protect yourself from phishing • Phishing is a common activity used to extract personal information from computer users and then use the information for malicious purposes. • verify the authenticity of such e-mail messages before responding with any personal information. Ensuring E-Mail and Instant Messaging Security Continued

  13. Chat with known people only • Developing communication with new and unknown individuals makes you more vulnerable to threats such as online predators and scams. • Do not open attachments received over IM • You must avoid opening any attachments that you receive in an instant message, unless you are absolutely sure about its origin. Ensuring E-Mail and Instant Messaging Security Continued

More Related