SlideShare uma empresa Scribd logo
1 de 35
COMPUTER & INTERNET
SECURITY
A LOOK INTO COMMON PRACTICES OF:
• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS
• SAFELY NAVIGATING AND USING THE INTERNET
• SECURING YOUR ONLINE ACCOUNTS
OVERVIEW
WHAT WE WILL COVER
1. Some Terminology
2. Computer Security
i. Type of threats
ii. Security measures
3. Break
4. Internet Security
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
!OVERVIEW
WHAT WE WON’T COVER
• Enterprise security
• Server security
• Active cyber security
• Kitchen security
SPEAKER: GERARD LAMUSSE
SOME TERMINOLOGY
• Computer security
• Security types
• Hacker vs.
Cracker
• Script kiddie
• Virus
• Worm
SPEAKER: GERARD LAMUSSE
• Key logging
• Malware
• Trojan
• Spyware/adware
• Phishing
• Quarantine
TERMINOLOGY
CONTINUED
COMPUTER SECURITY
• Computer Security means
protecting our computer system
and the information they contain
against unwanted access,
damage, destruction or
modification
SECURITY TYPES
• Hardware security
• Software security
• Anti-virus
• Firewall
• Network security
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
HACKER
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
CRACKER
• A person who accesses a
computer or network illegally but
has the intent of destroying
data, stealing information, or
other malicious action.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
SCRIPT KIDDIE
• Often are teenagers that use
prewritten hacking and cracking
programs to break into
computers
• Same intent as a cracker
VIRUS
• Can replicate itself and spread
from one computer to another.
• Does damage by altering
programs or the operating
system itself.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
WORM
• Spreads itself over a network
and other means.
• Replicates on host invisibly
• Aim: To use up available
memory and system resources.
KEY LOGGING
• The action of recording keys
struck on a keyboard.
• User unaware of this types
password and account details
• Information sent via malware.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
MALWARE
• Malicious software
• Gather sensitive information
• Gain access to private computer
systems.
TROJAN
• Form of malware
• A program claiming to rid your
computer of viruses but instead
introduces viruses, to your
computer
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
SPYWARE
• Similar to Trojan horse.
• Co-exists with other software
• Records actions performed by
user and relaying this
information to its author
ADWARE
• Legitmate alternative offered to
consumers who do not wish to pay
for software
• Displays adverts within program
• Tracks browsing habits to serve
related advertisements
• Has a bad reputation as a result of
spyware.SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
PHISHING
• The fraudulent practice of
sending e-mails purporting to be
from legitimate companies in
order to induce individuals to
reveal personal information.
QUARANTINE
• To move an undesired file such
as a virus-infected file or
spyware to an encrypted folder.
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
i. Type of threats
ii. Security measures
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
TYPES OF THREATS
SPEAKER: GERARD LAMUSSE
Malicious
Code
Natural
Threats
Humans
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
1. Rip data to DVDs
• Cheap, but takes time.
2. External secondary storage
• Cheaper per Gigabyte
• 2x 500Gb from R700
3. Upload and store to Cloud Storage
• Always available, monthly/yearly costs
• www.drive.google.com
• www.justcload.com
• www.mypcbackup.com
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
A utility program that we use to protect a computer against
viruses by identifying and removing computer viruses found
in the computer memory, computer storage and on incoming
e-mail files.
Microsoft Security Essentials
For windows 7 & earlier or
Windows Defender
For Windows 8
AVAST FREE for mac
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
WHY?
Not all anti-virus will prevent installation of spyware!
Much more common today than viruses.
Recommended
Malwarebytes Anti-Malware
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
Two types, hardware and software firewalls.
Your router functions as a hardware firewall, while Windows
includes a software firewall.
How it works?
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Save your data before…
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 1.
Windows 7 Control Panel
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 2.
Manage Accounts screen
in Windows 7
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 3.
Create New Account screen
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 4.
New user has been created
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Threat:
• Loss of data
• Stolen computer and other valuables
• Damage to property
Solutions???
• If they want to get in they will find a way
• Backup your data!!!
• Lockup and password secure your accounts.
RECOMMENDATION:
K9 Home Protection
COMPUTER & INTERNET
SECURITY
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
FIRST: PASSWORDS
i. What defines a strong password
ii. What is NOT a good password
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a strong password
i. Is at least eight characters long.
ii. Does not contain your user name, real name, or company name.
iii. Does not contain a complete word.
iv. Is significantly different from previous passwords.
v. Contains characters from each of the following four categories:
INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
Character category Examples
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the
keyboard and spaces
` ~ ! @ # $ % ^ & * ( ) _ - + = { } [
]  | : ; " ' < > , . ? /
INTERNET SECURITY
BAD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a bad password
i. Dictionary words.
ii. Names, surnames, contact details, registration numbers
iii. Not long enough
iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Create an acronym from an easy-to-remember piece of information.
For example, pick a phrase that is meaningful to you, such as My
son's birthday is 12 December, 2004. Using that phrase as your guide,
you might use Msbi12/Dec,4 for your password.
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Substitute numbers, symbols, and misspellings for letters or words in
an easy-to-remember phrase. For example, My son's birthday is 12
December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use
spaces in your password).
• Relate your password to a favourite hobby or sport. For example, ‘I
love to play badminton’ could become ILuv2PlayB@dm1nt()n.
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
Highly Recommended
• Use secure, unique passwords for every Internet site or service is one
of the best security practices out there.
• Use a single master password for storage of all passwords, then
never user it again!
• LastPass
• How secure is your password? Try
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
THE END
THANKS
SPEAKER: GERARD LAMUSSE

Mais conteúdo relacionado

Mais procurados

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Mais procurados (20)

Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 

Destaque

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validityrodsazon
 

Destaque (6)

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validity
 

Semelhante a Computer & internet Security

Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.pptFork6
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 

Semelhante a Computer & internet Security (20)

Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Online safety
Online safety Online safety
Online safety
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Computer & internet Security

  • 1. COMPUTER & INTERNET SECURITY A LOOK INTO COMMON PRACTICES OF: • SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS • SAFELY NAVIGATING AND USING THE INTERNET • SECURING YOUR ONLINE ACCOUNTS
  • 2. OVERVIEW WHAT WE WILL COVER 1. Some Terminology 2. Computer Security i. Type of threats ii. Security measures 3. Break 4. Internet Security i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE
  • 3. !OVERVIEW WHAT WE WON’T COVER • Enterprise security • Server security • Active cyber security • Kitchen security SPEAKER: GERARD LAMUSSE
  • 4. SOME TERMINOLOGY • Computer security • Security types • Hacker vs. Cracker • Script kiddie • Virus • Worm SPEAKER: GERARD LAMUSSE • Key logging • Malware • Trojan • Spyware/adware • Phishing • Quarantine
  • 5. TERMINOLOGY CONTINUED COMPUTER SECURITY • Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification SECURITY TYPES • Hardware security • Software security • Anti-virus • Firewall • Network security SPEAKER: GERARD LAMUSSE
  • 6. TERMINOLOGY CONTINUED HACKER • A person who accesses a computer or network illegally. • Various types • Black • Grey • White CRACKER • A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. SPEAKER: GERARD LAMUSSE
  • 7. TERMINOLOGY CONTINUED SCRIPT KIDDIE • Often are teenagers that use prewritten hacking and cracking programs to break into computers • Same intent as a cracker VIRUS • Can replicate itself and spread from one computer to another. • Does damage by altering programs or the operating system itself. SPEAKER: GERARD LAMUSSE
  • 8. TERMINOLOGY CONTINUED WORM • Spreads itself over a network and other means. • Replicates on host invisibly • Aim: To use up available memory and system resources. KEY LOGGING • The action of recording keys struck on a keyboard. • User unaware of this types password and account details • Information sent via malware. SPEAKER: GERARD LAMUSSE
  • 9. TERMINOLOGY CONTINUED MALWARE • Malicious software • Gather sensitive information • Gain access to private computer systems. TROJAN • Form of malware • A program claiming to rid your computer of viruses but instead introduces viruses, to your computer SPEAKER: GERARD LAMUSSE
  • 10. TERMINOLOGY CONTINUED SPYWARE • Similar to Trojan horse. • Co-exists with other software • Records actions performed by user and relaying this information to its author ADWARE • Legitmate alternative offered to consumers who do not wish to pay for software • Displays adverts within program • Tracks browsing habits to serve related advertisements • Has a bad reputation as a result of spyware.SPEAKER: GERARD LAMUSSE
  • 11. TERMINOLOGY CONTINUED PHISHING • The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information. QUARANTINE • To move an undesired file such as a virus-infected file or spyware to an encrypted folder. SPEAKER: GERARD LAMUSSE
  • 12. COMPUTER SECURITY i. Type of threats ii. Security measures SPEAKER: GERARD LAMUSSE
  • 13. COMPUTER SECURITY TYPES OF THREATS SPEAKER: GERARD LAMUSSE Malicious Code Natural Threats Humans
  • 14. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE 1. Rip data to DVDs • Cheap, but takes time. 2. External secondary storage • Cheaper per Gigabyte • 2x 500Gb from R700 3. Upload and store to Cloud Storage • Always available, monthly/yearly costs • www.drive.google.com • www.justcload.com • www.mypcbackup.com
  • 15. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE A utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage and on incoming e-mail files. Microsoft Security Essentials For windows 7 & earlier or Windows Defender For Windows 8 AVAST FREE for mac
  • 16. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE WHY? Not all anti-virus will prevent installation of spyware! Much more common today than viruses. Recommended Malwarebytes Anti-Malware
  • 17. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE Two types, hardware and software firewalls. Your router functions as a hardware firewall, while Windows includes a software firewall. How it works?
  • 18. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Applies to teens as well. Problems they pose: • Accidental data deletion • Corrupt system files • Installation of spyware or viruses • Accidental natural disaster Preventing or Safe guarding against children threats: • Backup data • Save your data before… • Set up limited user accounts • Set up parental controls RECOMMENDATION: K9 Web Protection
  • 19. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 1. Windows 7 Control Panel
  • 20. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 2. Manage Accounts screen in Windows 7
  • 21. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 3. Create New Account screen
  • 22. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 4. New user has been created
  • 23. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Applies to teens as well. Problems they pose: • Accidental data deletion • Corrupt system files • Installation of spyware or viruses • Accidental natural disaster Preventing or Safe guarding against children threats: • Backup data • Set up limited user accounts • Set up parental controls RECOMMENDATION: K9 Web Protection
  • 24. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Threat: • Loss of data • Stolen computer and other valuables • Damage to property Solutions??? • If they want to get in they will find a way • Backup your data!!! • Lockup and password secure your accounts. RECOMMENDATION: K9 Home Protection
  • 26. INTERNET SECURITY i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE
  • 27. INTERNET SECURITY FIRST: PASSWORDS i. What defines a strong password ii. What is NOT a good password SPEAKER: GERARD LAMUSSE
  • 28. INTERNET SECURITY GOOD PASSWORDS SPEAKER: GERARD LAMUSSE What makes a password a strong password i. Is at least eight characters long. ii. Does not contain your user name, real name, or company name. iii. Does not contain a complete word. iv. Is significantly different from previous passwords. v. Contains characters from each of the following four categories:
  • 29. INTERNET SECURITY GOOD PASSWORDS SPEAKER: GERARD LAMUSSE Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard and spaces ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] | : ; " ' < > , . ? /
  • 30. INTERNET SECURITY BAD PASSWORDS SPEAKER: GERARD LAMUSSE What makes a password a bad password i. Dictionary words. ii. Names, surnames, contact details, registration numbers iii. Not long enough iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
  • 31. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE • Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.
  • 32. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE • Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password). • Relate your password to a favourite hobby or sport. For example, ‘I love to play badminton’ could become ILuv2PlayB@dm1nt()n.
  • 33. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE Highly Recommended • Use secure, unique passwords for every Internet site or service is one of the best security practices out there. • Use a single master password for storage of all passwords, then never user it again! • LastPass • How secure is your password? Try
  • 34. INTERNET SECURITY i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE

Notas do Editor

  1. Just to be aware of the two.Hacker types: Not in todays scope.
  2. VIRUSNeeds you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
  3. Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers.
  4. MALWARE:Can seem like a normal program but used or programmed by attackers to disrupt computer operation.Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. victims computer.Used a lot by script kiddies, to hack and play around with a
  5. Spyware:they have the capability to monitor your keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookiesSymptoms: If you notice any changes to your Web browser that you did not make such as extra toolbars or different homepage settings, as well as changes to your security settings and favourites list, you could have spyware running on your system. Other signs of a spyware infection include pop-up ads which aren&apos;t related to a Web site you&apos;re viewing; usually spyware advertisements are adult content in nature and are not displayed in the same fashion as legitimate ads you would normally see on your favourite Web sites. You may also see advertisements when you&apos;re not browsing the Web.Adware- When you stop running the software, the ads should disappear. This allows consumers to try the software before they buy and you always have the option of disabling the ads by purchasing a registration key.
  6. Phishing:The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.Quarantine simply keeps the detected object in a safe location and is usually encrypted so other malware apps won&apos;t detect it. Always quarantine before deleting. You don&apos;t want to delete an important system file or delete something that your AV is erroneously flagging as malicious.
  7. Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
  8. Malicious Code:The most likely of the three Consists of those threats which I have just mentioned, such as viruses and malware.Humans: Second most likely to threaten your computer. Theft Children / people playing around where they should not, such as system files and such. Could accidently delete Important files.Natural Threats: Include power surge, lightning, water damage, eg. floods 
  9. DVDs and CDsPro: They&apos;re cheap. CD-Rs and DVD-Rs are extremely inexpensive these days. Con: They&apos;re not always reliable. Despite the low cost, there&apos;s a big problem with optical media--they occasionally don&apos;t burn right. Buffer underruns and other problems mean that out of every batch of CD-Rs or DVD-Rs, occasionally one or two might be bad. If that&apos;s the disc that had your important files on it, your data backup is lost. |Slower to burn than copying to secondary storage.External hard drivesPro: Cheaper per Gigabyte. | Faster to read and write data | There are no ongoing costs eg. In relation to cloud storage | Much more reliable and secure than DVDs and cloud computing, because you have the responsibility over them.Cons: If they fail, and you don’t have redundant data backups, your data is lost! | You physically need the hard drive with you to make and retrieve backupsCloud StoragePro: Online backup is becoming very affordable | Access your files from anywhere | Share your files with friends and family | Online backup takes care of your file security | Your files are safeCons: Initial backup can be slow | You have ongoing costs | You have to trust - As you send your files to a relatively unknown third-party, you have to trust that they treat your files with care and utmost security. Once you send your files over, they still remain your control, but they are no longer only on your computer. Many providers do have the option to encrypt files locally, so that your files can only be seen by the owner of the encryption key – and that would be you.
  10. Why Wouldn’t You Run an Antivirus?Some people believe that antivirus software is heavy and slows down your computer. This was certainly true in the past. Older Norton and McAfee antivirus software suites were infamous for slowing down your computer more than actual viruses would. They’re full of notifications and advertisementsto remind you of paying for the subscription and buy more expensive security suites, just as adware annoys you with requests to buy products.This isn’t true anymore. Computers have become so fast that antivirus software don’t weigh them down like they used to. There are also more efficient security suites that are much lighter on resources. The free Microsoft Security Essentials for Windows 7 or the included Windows Defender on Windows 8 are lightweight antivirus programs created by Microsoft. They don’t try to sell you anything at all. There’s no reason not to use them – unless you just want to brag online that you’re too smart for an antivirus.RECOMMEND - MACYou Should Still Be CarefulAn antivirus is only a single layer of security. No antivirus program is perfect, as all the antivirus tests show nothing catches all malware all of the time. if you don’t exercise caution, you may become infected by malware even if you’re using an antivirus Be careful about the files you download and run, keep your software updated, uninstall vulnerable software like Java, and more – but don’t drop your antivirus defences completely just because you’re being careful. Malware isn’t what it used to be – much of it is created by organized crime to capture financial information and other sensitive data. Antivirus software helps you stay ahead of the bad guys by a little bit more, and it’s worth using.If you own a mac AVAST
  11. As mentioned earlier:Spyware is a type of malware that damages your computer system. Spyware is NOT a computer virus in the traditional sense, but is unwanted and harmful nonetheless. It works by getting into your computer system for the purpose of taking partial control over your use, or collecting personal information without your knowledge. It often ends up on your computer after downloading and installing free software so be very careful what software you download, and which websites you download from.Recommends
  12. A firewall works as a barrier, or a shield, between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you. How it works?2 images.
  13. Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!Safeguard: Save your data before… If accidental shutdown could mean loss of data busy working on.
  14. Windows 7/vistaClick on the Start button. This is the small round button () in the lower left corner of your screen that has a Windows flag on it.  Click on the Control Panel menu option.  When the control panel opens you will see a screen similar to Figure 1 below.Click on the Add or remove user accounts control panel option as shown by the red arrow in figure 1.  You will now be in the Manage Accounts control panel as shown in Figure 2 below.
  15. Windows 7/vistaThis screen shows all the accounts currently on your computer. To create a new account, click on the Create a new account option as shown by the red arrow above.  You will now be at the Create New Account screen.
  16. Windows 7/vistaIn the New account name field enter the name of the new account that you would like to create. This could be a person&apos;s first name, full name, or whatever other designation you would like to give. You then need to decide which of the two types of accounts you would like to create. An Administrator account has full access to the computer and can make all changes, install software, and create and delete accounts. The other type of account is Standard user and has limited privileges as to what settings and changes it can make to the computer. It is suggested that for all users, you set them as a Standard User account and have one administrator account that you can logon to as needed. This will protect your computer from malware and other harmful activities.When you have finished selecting a name and the type of account you wish to setup, you should click on the Create Account button.  Your new account will have been created and you will see it listed in the Manage Accounts screen.
  17. Windows 7/vistaAs you can see our new user, named Test Account, has been created.Now when you start Windows 7 or Vista, you will see the additional account listed in the logon screen. That user can then select their login name and login into their profile so they can access their private data.
  18. Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!
  19. Thiefs: Solutions:AS mentioned before, backup your data, and store the backups in a secure location, either using online backups, or secondary backup stored in a safe.
  20. Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  21. Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  22. Help yourself remember your strong password by following these tips:Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son&apos;s birthday is 12 December, 2004 could become Mi$un&apos;s Brthd8iz 12124 (it&apos;s OK to use spaces in your password).Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
  23. Help yourself remember your strong password by following these tips:
  24. Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam
  25. Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam