1 / 8

E-safety

E-safety. GROUP MEMBERS: MALINI A/P KUMAR PREMA A/P PARAMASIVAN. Macro-viruses. Boot-sector virus. Worms. MANAGING COMPUTER - VIRUSES. Hoax e-mail viruses. Email attachment viruses. Trojan viruses. Instruction to reduce the risk of virus infection and transmission.

matteo
Download Presentation

E-safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-safety GROUP MEMBERS: MALINI A/P KUMAR PREMA A/P PARAMASIVAN

  2. Macro-viruses Boot-sector virus Worms MANAGING COMPUTER - VIRUSES Hoax e-mail viruses Email attachment viruses Trojan viruses

  3. Instruction to reduce the risk of virus infection and transmission Do not switch off machines when the floppy disk is still in the drive. PCs can also can be configured so that do not boot off the floppy drive Do not open attachment to emails from people you do not know Download software only from the official source, and always check for viruses before installing the software Disable or turn off macros in World or Excel unless you use them regularly Back-up important files daily if its function is not performed by a system administrator.

  4. Approaches to developing secure system

  5. Avoid harvesting of addresses- spammers harvest e-mails from e-mail addresses published on web pages Use filter , filtering - software used to identify spam according to its characteristics such keywords Use blacklist services- a compilation of known sources of spam that are used to block e-mail Full range of techniques that can be used in combination to combat spam include: Use ‘peer to peer’ blocking services-take advantage of human being good at identifying spam and then notifying a central server Use whitelist services – a compilation of trusted sources of e-mail that is permitted to enter an inbox Educate staff not to reply to spam- can do on receiving spam is to reply to it to complain

  6. DEVELOP E-MAIL POLICIES WHICH EXPLAIN BEST PRACTICE- GUIDELINES> only send the e-mail to employees for which it is essential to inform. > Banning certain types of e-mails > avoid flaming> Avoid ‘trolls’>combine items from separate e-mails during the day >write clear subject lines>structure e-mails so that they can be scanned quickly using sub-heads >make follow- up actions clear>when reading e-mail, use folders to categorize e-mails according to content>Perform e-mail reading and checking in batches>delete e-mails which are not required for future feference

  7. THE END THANK YOU

More Related