module4_computersecurity1.ppt 2878KB Jun 23 2011 01:01:20 PM

Computer Security 1

Keeping your computer safe

Computer Security 1
Computer Security 1 includes two lessons:
 Lesson 1: An overview of computer security and privacy
 Lesson 2: Protecting your computer and your data

Lesson 1
Objectives
After completing this lesson, you will be able to:
 Explain what the terms security and privacy mean as
they apply to computing.
 Identify the various threats prevalent in the world of
computers and the corresponding solutions.

Definitions
 Computer threat: Any factor that can damage your
computer or the data on it.
 floods and hurricanes

 accidental or intentional loss and tampering
 Computer security: Deals with the measures that you can
take to avoid such damage to the computer and its data.
 Installing computers in secure locations
 Backing up data
 Data Storage in Safe Locations

Definitions
 Computer privacy means that your data, such as
personal files and e-mail messages, is not accessible by
anyone without your permission.
 Computer privacy deals with the measures that you can
take to restrict access to your data.

Natural Threats
Categories
 Natural Disasters
 Fire
 Extreme Hot or Cold
 Voltage Problems


Solutions
 Backing up Data
 Install Computer in
Secure Location
 Controlling Operating
Environment
 Surge Protection
 Uninterruptible Power
Supply

Human Threats







Categories

Hackers
Virtual Theft
Viruses, Worms &
Trojan Horses
Spyware
Internet Scams
Online Predators

Solutions
 Data Storage in Safe
Locations
 Virus and Spyware
Protection
 Firewall

Questions??

Lesson 2
Objectives
 After completing this lesson, you will be able to:

 Identify several common methods for protecting
the operating system, software, and data on
your computer.
 Identify the various means of securing online
and network transactions.
 Identify the common measures for securing email and instant messaging transactions.

Protecting Your Computer
1.
2.
3.
4.
5.
6.
7.
8.

Implement user identification
Set a username and password
Keep passwords secure

Lock your computer
Install protective software
Encrypt data
Back up data
Keep your computer up to date

Protecting Your Computer
Implement user identification

Protecting Your Computer
Set a username

Protecting Your Computer
Set a password (cont.)

Protecting Your Computer
Set a password (cont.)

Protecting Your Computer
Set a password (cont.)


Protecting Your Computer
Set a password (cont.)

Click here after filling
this form

Protecting Your Computer
Lock your computer
Press: Ctrl Alt Delete keys at the same time

Click here to change
your password

Click here to lock
your computer

Install protective software
Antivirus
AVG free

AVAST free
McAfee
Symantec

http://free.avg.com/
http://www.avast.com/eng/avast_4_home.html

Install protective software
AntiSpyware
 Windows Defender free

http://www.microsoft.com/windows/products/winfamily/defender/defa
ult.mspx

 Ad-Aware free
 McAfee
 Symantec

http://www.lavasoft.com/


Install protective software
Firewall

Encrypt data
Right click file

Back up data

Back up data (cont.)

Back up data (cont.)

Back up data (cont.)

Restore data

Restore data

Secure online and network
transactions

1.
2.
3.
4.
5.
6.
7.
8.
9.

Use strong passwords
Protect against hacking and spyware
Clear history and cache periodically
Delete cookies periodically
Avoid sharing personal information
Make online transactions on secure sites
Configure security components
Disable active content
Use security help from your ISP


Ensure e-mail and instant
messaging security
1.
2.
3.
4.
5.
6.

Avoid opening e-mail with attachments
Do not respond to junk mail
Do not respond to unsolicited commercial mail
Protect yourself from phishing
Chat with known people only
Do not open attachments received over instant
messenger

Questions??


Dokumen yang terkait

ANALISIS FAKTOR YANGMEMPENGARUHI FERTILITAS PASANGAN USIA SUBUR DI DESA SEMBORO KECAMATAN SEMBORO KABUPATEN JEMBER TAHUN 2011

2 53 20

KONSTRUKSI MEDIA TENTANG KETERLIBATAN POLITISI PARTAI DEMOKRAT ANAS URBANINGRUM PADA KASUS KORUPSI PROYEK PEMBANGUNAN KOMPLEK OLAHRAGA DI BUKIT HAMBALANG (Analisis Wacana Koran Harian Pagi Surya edisi 9-12, 16, 18 dan 23 Februari 2013 )

64 565 20

FAKTOR – FAKTOR YANG MEMPENGARUHI PENYERAPAN TENAGA KERJA INDUSTRI PENGOLAHAN BESAR DAN MENENGAH PADA TINGKAT KABUPATEN / KOTA DI JAWA TIMUR TAHUN 2006 - 2011

1 35 26

A DISCOURSE ANALYSIS ON “SPA: REGAIN BALANCE OF YOUR INNER AND OUTER BEAUTY” IN THE JAKARTA POST ON 4 MARCH 2011

9 161 13

Pengaruh kualitas aktiva produktif dan non performing financing terhadap return on asset perbankan syariah (Studi Pada 3 Bank Umum Syariah Tahun 2011 – 2014)

6 101 0

Pengaruh pemahaman fiqh muamalat mahasiswa terhadap keputusan membeli produk fashion palsu (study pada mahasiswa angkatan 2011 & 2012 prodi muamalat fakultas syariah dan hukum UIN Syarif Hidayatullah Jakarta)

0 22 0

Perlindungan Hukum Terhadap Anak Jalanan Atas Eksploitasi Dan Tindak Kekerasan Dihubungkan Dengan Undang-Undang Nomor 39 Tahun 1999 Tentang Hak Asasi Manusia Jo Undang-Undang Nomor 23 Tahun 2002 Tentang Perlindungan Anak

1 15 79

Pendidikan Agama Islam Untuk Kelas 3 SD Kelas 3 Suyanto Suyoto 2011

4 108 178

PP 23 TAHUN 2010 TENTANG KEGIATAN USAHA

2 51 76

KOORDINASI OTORITAS JASA KEUANGAN (OJK) DENGAN LEMBAGA PENJAMIN SIMPANAN (LPS) DAN BANK INDONESIA (BI) DALAM UPAYA PENANGANAN BANK BERMASALAH BERDASARKAN UNDANG-UNDANG RI NOMOR 21 TAHUN 2011 TENTANG OTORITAS JASA KEUANGAN

3 32 52