1 / 23

Understanding security and safe computing.

Bob Penn presents:. Understanding security and safe computing. Be Web Wise. Understanding security and safe computing. Overview: Online Risks. Understanding the Risks. Keeping Safe. Overview : Online Risks. Internet shopping is booming – every 20th pound is spent online.

connor
Download Presentation

Understanding security and safe computing.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bob Penn presents: Understanding security and safe computing. Be Web Wise.

  2. Understanding security and safe computing • Overview: Online Risks. • Understanding the Risks. • Keeping Safe.

  3. Overview: Online Risks • Internet shopping is booming – every 20th pound is spent online. Internet card fraud accounts for 80 per cent of all losses where the card is not physically present.

  4. Overview:OnlineRisks • Simple, common sense precautions can keep you safe when you’re in cyberspace. Don’t panic its not as bad as it sounds.

  5. Understanding the Risks • Viruses and worms can wreck your data and shut down your machine. • Purchase recognised anti-viral and anti-spyware programs and set them to auto-update regularly. • Free software is also available, and works well but carries no warranty. • Set your browser preferences only to accept cookies from sites you recognise and actively wish to install.

  6. Understanding the Risks • Do other users access your PC while you’re connected to the Internet. • Use a personal firewall. • If your operating system already includes a firewall, make sure it is switched on.

  7. Understanding the Risks • Update your Operating System! • Regularly install any operating system patches and fixes to keep your system security in place. • Instruct your computer to check regularly. Cyber crooks target those who don’t bother.

  8. Understanding the Risks • Eavesdroppers can tune in to insecure wireless networks. • Many wireless networks are not encrypted, so anyone with a little knowledge could eavesdrop. • Keep your device in non-discoverable mode when you are not using Wi-Fi. • Do not connect to non-secure access points in public places.

  9. Understanding the Risks • E-mails from unknown people. • If you receive mail from people or organisations you do not know, delete them and, if possible, inform your e-mail supplier that they are spam. • Do not open any unknown attachments – these may carry viruses. • Never reply because that alerts spammers that the e-mail address is valid and you will be bombarded with more messages from more senders.

  10. Understanding the Risks – Sample - A

  11. Understanding the Risks – Sample - B

  12. Understanding the Risks • Password forgetfulness. • The average person now has 15 different passwords and codes to access online accounts and more than ten per cent use an astonishing 50 or more online accounts. • Many use the same password for several accounts & a quarter of us keep a password list in our purse or wallet - DON’T DO IT. • Use as many different passwords as possible and try word association techniques to remember them. • Never, ever give your password to anyone else – treat it like a PIN.

  13. Understanding the Risks • FileDelete is not enough. • Information does not disappear when you place it in your computer’s waste basket or recycle bin. • Buy and use a clean-up utility to overwrite the disk space occupied by discarded information or use a free eraser such as “Eraser 5.86a from (VNUNET). • Delete sensitive and personal information if you need to send your PC to a supplier for a health check or upgrade. • When replacing your computer, the only real way of preventing others from recovering the data from your hard disk is physical destruction.

  14. Understanding the Risks • Portable storage devices. • Portable storage devices, such as USB key rings, are not secure. • keep them as safe as you would your passport or credit cards.

  15. Understanding the Risks • Back up important documents! • Most of us are dependant on our PCs now, so it makes sense to copy important documents on to a CD and keep it somewhere secure. • And of course……Don’t, if possible, record your passwords!

  16. Keeping Safe ` • So What to Do?

  17. Keeping Safe • Check your security status with Windows Security Centre.

  18. Keeping Safe • Use a firewall.

  19. Keeping Safe • Security alerts. If Windows detects that your computer might need enhanced security in any one of the security areas— firewall, automatic updating, malware protection, or other security settings — until the problem is fixed, you will see a notification every time you log on. Notifications are displayed in the notification area of the taskbar.

  20. Keeping Safe Use and update regularly your Virus Protection. • Destructive viruses, etc can erase information from your hard disk, completely disable your computer or worsen its performance and stability. • Antivirus programs scan e-mail and other files on your computer for viruses, worms, and Trojan horses – even the free ones. • If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files. • If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.

  21. Keeping Safe Use and update regularly your Spyware Protection. • Spyware/ Adware is software that can display advertisements, collect information about you, or change settings on your computer, generally without obtaining your consent. • Most spyware is installed through free downloaded software, but in some cases simply visiting a website can results in an infection. • Windows has a built-in antispyware program called Windows Defender, turned on by default. Defender alerts you when spyware tries to install itself. It also scans for existing spyware and then remove it. • A number of free programs are also available but require manual updating/scanning (SpyBot / Ad-aware).

  22. KeepingSafe Update Windows automatically. • Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating.

  23. Safe Surfing • Keep Safe Bob

More Related