SlideShare una empresa de Scribd logo
1 de 39
Progressive Integrations presents: Computer Security 101
Seminar contents ,[object Object]
Consumer Reports says that home users connected to the Internet have an one in three chance of suffering financial loss, computer damage, or both because of spyware or a computer virus that sneaks onto their computer.”,[object Object]
How To Delete Your Hard Drive.
Keylogger Prevention Tips.
How To Speed Up A Slow Computer.
How To Secure Your Wireless Network.
Trojan Horse Prevention Info & Tips.
Free Internet Security Software.,[object Object]
First things first: Take care of your computer You may not know it, but your computer is being targeted.  It’s nothing personal—all computers are targets. There are people out there trying to bring down your computer or gain access to data on it. It’s up to you to learn about the dangers and find out how you can help protect your computer and be more secure.  As I am talking go to this site and start scanning your machine for FREE: ,[object Object]
Win Vista/7:  http://onecare.live.com/site/en-us/center/whatsnew.htm
Mac/Apple:  http://nakedsecurity.sophos.com/2009/08/28/apples-integrated-antimalware-feature-xprotect/,[object Object]
Security threats Most of the security threats mentioned involve a piece of malicious software (or code) that is intended to run on your computer without you knowing about it.  Malicious software may be hidden inside another file or program, or run silently in the background. Most malicious software is designed to replicate itself and infect other files or computers.  But what exactly the malicious code does to your computer depends on what it is and how destructive it is.
Here are a few definitions, so that you know what you’re dealing with: ,[object Object]
Worm: Software that replicates independently by sending itself to other systems through network connections.
Trojan horse: Software that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run.Security threats
Here are a few definitions, so that you know what you’re dealing with: ,[object Object],Security threats ,[object Object],[object Object]
Sources of infection If you kept your computer in a sealed room, never linked it to a network or the Internet, and never inserted a CD or floppy disk, you would remain safe.  But that would make your computer practically useless. So practice safeguards instead.  As well as being wary of information coming into your computer, be careful when visiting Web sites that request information from you. Also ensure that you’re on a genuine site before entering any personal data.
Microsoft Update: an essential security precaution The most basic security step is to make sure your computer software is up to date.  Microsoft releases regular updates—you may hear them called “patches” in the news media—to combat new threats as they appear.  It’s wise to check for and install updates regularly. Updates for the Microsoft Windows® operating system and for Office are found on the Microsoft Update site.
Antivirus software Your most important  and essential defense against viruses is antivirus software. Install it, use it, and keep it up to date.  Antivirus software is designed to detect known viruses. Because new viruses are always being written, it’s essential to keep your antivirus software up to date.  When a new virus hits the world, the antivirus software manufacturers typically have an update available for download on their Web sites within hours.
Other security measures There are a whole raft of other security steps you should be aware of.  Here’s a brief summary.  ,[object Object]
Always use strong passwords.
For even greater security, use a firewall.
Regularly make backup copies of your important documents. ,[object Object]
E-mail security After you’ve decided you want to open or save an attached file, you can do so by right-clicking its icon in the Outlook Reading Pane. If you’re still concerned that the message is infected with a virus or contains other malicious code, and if the sender is a friend or colleague, you can always ask for confirmation before opening it.  If the message does turn out to be viral, delete it without opening it. And then delete it from your Deleted Items folder.
Security I: How the 2007 Office system helps you to stay safer Quiz, question 1 How can viruses get into your computer? (Pick one answer.) Through infected floppy disks.  By opening infected e-mail attachments.  By sharing an infected document across a network.  All of the above.
Security I: How the 2007 Office system helps you to stay safer Quiz, question 1: Answer All of the above.  Your computer could get a virus through any of those means.
Quiz, question 2 What’s your most important defense against computer viruses? (Pick one answer.) Use antivirus software.  Take your cold medicine.  Never let other people use your computer.  Use Microsoft Update.
Quiz, question 2: Answer Use antivirus software.  There’s no substitute for up-to-date antivirus software.
Quiz, question 3 What is a security update (or “patch”)? (Pick one answer.) An adhesive patch you can stick on the computer to ward off viruses.  A software update to protect against the latest known security threats.  An area of a Web site where you go to get security updates.  A very small security blanket.
Quiz, question 3: Answer A software update to protect against the latest known security threats.  You should regularly install the latest patches for both Microsoft Office and Microsoft Windows.
Topic 1 How to Detect and Remove Malware
How to Detect and Remove Malware Is your computer acting strange?  Are you getting weird error messages?  Are strange files downloading on your hard drive?  Has your computer developed a mind of its own?  Computer running slower than your old Commodore 64?  You very well might be infected with malware, such as a Trojan Horse, keylogger, spyware, or computer virus. This malicious software can certainly be more than just a mere annoyance.  It can be downright scary and a real threat to your Internet security and privacy. It can spread through your system like a virus(pardon the pun), corrupting your computer. It can actually lead you to completely losing all data on your hard drive. Not only that, malware can lead you to become the next victim of identity theft, one of the fastest growing crimes in Canada and the US.
How to Detect and Remove Malware (cont) In fact, since 2003 the vast majority of widespread viruses and worms have been designed to take one-hundred percent control of the user's computer for black market exploitation.  They might very well have more control of your computer than you do.   Infected "zombie computers" are used to send that annoying spam that we all love to hate.  On a more serious note, the ‘spam’ could contain illegal content such as child porn.  Your computer could even be used to engage in distributed denial of service attacks as a form of extortion. Malware is a malicious form of software which is actually designed to infiltrate or damage a computer system without the owner's informed consent. As mentioned above, malware includes Trojans, keyloggers, spyware, worms, computer viruses, and other malicious software. With the explosive growth of the Internet and home user broadband, malware is a huge and growing problem.  There was believe it or not as much malware was produced in 2007 alone as the previous twenty years altogether. Ready to throw your computer out the window and cancel your broadband Internet access forever?  Thankfully, there are steps that can be taken to detect and remove malware before it does anymore harm.
How to Detect and Remove Malware (cont) ,[object Object]
Many malware infestations today are so bad you will possibly have to reboot your machine and go into safe mode.  Safe mode is engaged when you reboot your machine and hit F8 (continually) in the boot sequence until prompted for the choice of safe mode you want (with networking, without networking etc)
BEST Tools for malware infestation
http://malwarebytes.org/ - FREE
http://www.microsoft.com/security/malwareremove/default.aspx - FREE

Más contenido relacionado

La actualidad más candente

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

La actualidad más candente (20)

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer security
Computer securityComputer security
Computer security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber security
cyber security cyber security
cyber security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Destacado

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communicationAli Kamran
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communicationnet ambit
 
Intro to business communication
Intro to business communicationIntro to business communication
Intro to business communicationugik sugiharto
 
Management information system
Management information systemManagement information system
Management information systemAnamika Sonawane
 
Management information system
Management information systemManagement information system
Management information systemSikander Saini
 

Destacado (12)

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communication
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communication
 
Intro to business communication
Intro to business communicationIntro to business communication
Intro to business communication
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Management information system
Management information systemManagement information system
Management information system
 
Management information system
Management information systemManagement information system
Management information system
 

Similar a Computer Security 101

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay SaferOklahoma Dept. Mental Health
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 

Similar a Computer Security 101 (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
M
MM
M
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Microsoft® office
Microsoft® officeMicrosoft® office
Microsoft® office
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Computervirus
Computervirus Computervirus
Computervirus
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Virus
VirusVirus
Virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Sowmya
SowmyaSowmya
Sowmya
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay Safer
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Computer Security 101

  • 1. Progressive Integrations presents: Computer Security 101
  • 2.
  • 3.
  • 4. How To Delete Your Hard Drive.
  • 6. How To Speed Up A Slow Computer.
  • 7. How To Secure Your Wireless Network.
  • 9.
  • 10.
  • 11. Win Vista/7: http://onecare.live.com/site/en-us/center/whatsnew.htm
  • 12.
  • 13. Security threats Most of the security threats mentioned involve a piece of malicious software (or code) that is intended to run on your computer without you knowing about it. Malicious software may be hidden inside another file or program, or run silently in the background. Most malicious software is designed to replicate itself and infect other files or computers. But what exactly the malicious code does to your computer depends on what it is and how destructive it is.
  • 14.
  • 15. Worm: Software that replicates independently by sending itself to other systems through network connections.
  • 16. Trojan horse: Software that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run.Security threats
  • 17.
  • 18. Sources of infection If you kept your computer in a sealed room, never linked it to a network or the Internet, and never inserted a CD or floppy disk, you would remain safe. But that would make your computer practically useless. So practice safeguards instead. As well as being wary of information coming into your computer, be careful when visiting Web sites that request information from you. Also ensure that you’re on a genuine site before entering any personal data.
  • 19. Microsoft Update: an essential security precaution The most basic security step is to make sure your computer software is up to date. Microsoft releases regular updates—you may hear them called “patches” in the news media—to combat new threats as they appear. It’s wise to check for and install updates regularly. Updates for the Microsoft Windows® operating system and for Office are found on the Microsoft Update site.
  • 20. Antivirus software Your most important and essential defense against viruses is antivirus software. Install it, use it, and keep it up to date. Antivirus software is designed to detect known viruses. Because new viruses are always being written, it’s essential to keep your antivirus software up to date. When a new virus hits the world, the antivirus software manufacturers typically have an update available for download on their Web sites within hours.
  • 21.
  • 22. Always use strong passwords.
  • 23. For even greater security, use a firewall.
  • 24.
  • 25. E-mail security After you’ve decided you want to open or save an attached file, you can do so by right-clicking its icon in the Outlook Reading Pane. If you’re still concerned that the message is infected with a virus or contains other malicious code, and if the sender is a friend or colleague, you can always ask for confirmation before opening it. If the message does turn out to be viral, delete it without opening it. And then delete it from your Deleted Items folder.
  • 26. Security I: How the 2007 Office system helps you to stay safer Quiz, question 1 How can viruses get into your computer? (Pick one answer.) Through infected floppy disks. By opening infected e-mail attachments. By sharing an infected document across a network. All of the above.
  • 27. Security I: How the 2007 Office system helps you to stay safer Quiz, question 1: Answer All of the above. Your computer could get a virus through any of those means.
  • 28. Quiz, question 2 What’s your most important defense against computer viruses? (Pick one answer.) Use antivirus software. Take your cold medicine. Never let other people use your computer. Use Microsoft Update.
  • 29. Quiz, question 2: Answer Use antivirus software. There’s no substitute for up-to-date antivirus software.
  • 30. Quiz, question 3 What is a security update (or “patch”)? (Pick one answer.) An adhesive patch you can stick on the computer to ward off viruses. A software update to protect against the latest known security threats. An area of a Web site where you go to get security updates. A very small security blanket.
  • 31. Quiz, question 3: Answer A software update to protect against the latest known security threats. You should regularly install the latest patches for both Microsoft Office and Microsoft Windows.
  • 32. Topic 1 How to Detect and Remove Malware
  • 33. How to Detect and Remove Malware Is your computer acting strange? Are you getting weird error messages? Are strange files downloading on your hard drive? Has your computer developed a mind of its own? Computer running slower than your old Commodore 64? You very well might be infected with malware, such as a Trojan Horse, keylogger, spyware, or computer virus. This malicious software can certainly be more than just a mere annoyance. It can be downright scary and a real threat to your Internet security and privacy. It can spread through your system like a virus(pardon the pun), corrupting your computer. It can actually lead you to completely losing all data on your hard drive. Not only that, malware can lead you to become the next victim of identity theft, one of the fastest growing crimes in Canada and the US.
  • 34. How to Detect and Remove Malware (cont) In fact, since 2003 the vast majority of widespread viruses and worms have been designed to take one-hundred percent control of the user's computer for black market exploitation. They might very well have more control of your computer than you do. Infected "zombie computers" are used to send that annoying spam that we all love to hate. On a more serious note, the ‘spam’ could contain illegal content such as child porn. Your computer could even be used to engage in distributed denial of service attacks as a form of extortion. Malware is a malicious form of software which is actually designed to infiltrate or damage a computer system without the owner's informed consent. As mentioned above, malware includes Trojans, keyloggers, spyware, worms, computer viruses, and other malicious software. With the explosive growth of the Internet and home user broadband, malware is a huge and growing problem. There was believe it or not as much malware was produced in 2007 alone as the previous twenty years altogether. Ready to throw your computer out the window and cancel your broadband Internet access forever? Thankfully, there are steps that can be taken to detect and remove malware before it does anymore harm.
  • 35.
  • 36. Many malware infestations today are so bad you will possibly have to reboot your machine and go into safe mode. Safe mode is engaged when you reboot your machine and hit F8 (continually) in the boot sequence until prompted for the choice of safe mode you want (with networking, without networking etc)
  • 37. BEST Tools for malware infestation
  • 40.
  • 41. How to Delete Your Hard Drive Are you selling, recycling, or donating your old computer? Do you need to get rid of all the junk the kids have put on the hard drive from playing on the Internet? Is there objectionable content on your hard drive? Do you want to permanently delete data and files on your hard drive, giving your computer a "fresh start"? Wondering how to delete your hard drive? I know, by now you are probably saying "enough of the questions already!" Formatting does not permanently delete files on your hard drive. All formatting actually does is delete the addresses of the files on your hard drive. This leaves data from a formatted hard drive easily being recovered using data recovery software. This software is readily available on the Internet. Believe it or not, some data recovery software is even free of charge! A lot of people don't realize that Windows keeps every picture, web site address, video clip, email, and chat room conversation is written to your hard drive. Windows keeps the web browser cache, temp files, and other data. This is a very real threat to your Internet security and privacy.
  • 42.
  • 43. Wipe, Delete, Secure, Your Hard Drive the easy way: http://www.howtogeek.com/howto/15817/wipe-delete-and-securely-destroy-your-hard-drives-data-the-easy-way/
  • 44.
  • 45. Keylogger Prevention Tips A keylogger builds a log of everything typed into a keyboard to be reviewed by a third party. Keyloggers can be used for legitimate purposes to troubleshoot networks, analyze employee productivity, or to assist law enforcement, for example; or they can be used for illegitimate purposes to surreptitiously spy on people for personal gain. A keylogger can be a hardware device or a software program. Keyloggers are indeed a real threat to your Internet security and privacy. This malicious software will secretly record every keystroke that the computer user makes. Some keylogging programs can even take snapshots of the users Desktop, record both side of instant messenger chat conversations(AOL, Windows Messenger, ICQ, etc.), and record every website the unsuspecting computer user makes. How scary is that!?
  • 46. Keylogger Prevention Tips (cont) You should be glad to know that by following the steps below you will significantly reduce your chances of becoming infected with a keylogger. If you have already downloaded a keylogger, following the steps below will stop the keylogging software before it does anymore harm. •Installing a good antivirus program will help prevent having a keylogger installed on your computer. There are actually free antivirus software available to download free of charge. •Anti-spyware software will certainly help prevent you from becoming infected with a keylogger. Most, but not all keystroke loggers are detected with anti-spyware software. It is good to know that there is free anti-spyware software available to download on the Internet. •Also, to help prevent having keylogging software installed on your computer, avoid running programs you receive via email and instant messaging unless you know exactly what it is. •Installing a firewall will detect and disable keyloggers before they are installed or do anymore harm on your computer. BEST Antilogging software: http://www.zemana.com and http://anti-keylogger-software-review.toptenreviews.com/
  • 47. Topic 4 How to Speed Up a Slow Computer
  • 48.
  • 49. Computer Viruses: Viruses and worms can wreak havoc on your computer - being very much a real threat to your Internet security and privacy...not to mention slowing down your computer. If you are connected to the Internet(if you are reading this chances are high that you are) it is essential that you have antivirus software installed on your computer. It is important that you keep antivirus software up-to-date. However, it is good to know that most modern antivirus software updates automatically. There is actually free antivirus software available for download on the Internet. Highly recommend Microsoft Security Essentials for pc (http://www.microsoft.com/security_essentials/) and Sophos for Mac: http://www.sophos.com/products/free-tools/free-mac-anti-virus/ (FREE)
  • 50.
  • 51. Trojan Horse Prevention Info & Tips (cont) A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology. When it comes to Trojan Horses, like other Internet security and privacy threats, an ounce of prevention is indeed better than the cure. FREE online scan for Trojans: http://www.windowsecurity.com/trojanscan/ Best FREE Trojan scanners: http://www.techsupportalert.com/best-free-trojan-scanner-trojan-remover.htm Highly recommend Malwarebytes and SuperAntiSpyWare listed on this page.
  • 52. Topic 6 Free Internet Security Software
  • 53. Free Internet Security Software & Tools It is essential you have Internet security software installed on your computer, to protect it from Internet security and privacy threats. Fortunately, there is free Internet security software available for download online. Many patches and updates from Microsoft and Apple provide essential security patching and updates, and it is highly recommended that you obtain those as they are made available. Our top recommendations for Security Suite Software; PC: Microsoft Security Essentials (http://www.microsoft.com/security_essentials/) Mac: Sophos (http://www.sophos.com/products/free-tools/free-mac-anti-virus/) Best Freeware Tested Utilities: http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
  • 54. Q&A Make sure to fill out the sheet for your FREE Security Audit