Enviar pesquisa
Carregar
Safe computing (circa 2004)
•
0 gostou
•
132 visualizações
Azmi Mohd Tamil
Seguir
My lecture note on safe computing, circa 2004. Reposted for the notes on SIRCAM virus.
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Recomendados
Antivirus support
Antivirus support
Peter james
Safe_IT
Safe_IT
Trish Bourke
Computer and internet security
Computer and internet security
hoshmand kareem
Malware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki
Trojan horse
Trojan horse
Kaushik Paul
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Adeel Khurram
Device security Tips
Device security Tips
kanika sharma
Recomendados
Antivirus support
Antivirus support
Peter james
Safe_IT
Safe_IT
Trish Bourke
Computer and internet security
Computer and internet security
hoshmand kareem
Malware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki
Trojan horse
Trojan horse
Kaushik Paul
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Adeel Khurram
Device security Tips
Device security Tips
kanika sharma
Protecting Against Ransomware
Protecting Against Ransomware
Symantec
Online Safety - Malwares
Online Safety - Malwares
Arnav Kumar
Spyware powerpoint
Spyware powerpoint
galaxy201
OSB120 Beat Ransomware
OSB120 Beat Ransomware
Ivanti
Spikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx
Senior Technology Education
Senior Technology Education
Summerpair77
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Stuart Walton
Spywareguide1
Spywareguide1
DiannClarke
Spywareguide1
Spywareguide1
DiannClarke
10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
Malware
Malware
Avani Patel
P7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
Zero day exploit
Zero day exploit
Aashiq Ahamed N
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
F-Secure Corporation
Identifying potential security risks
Identifying potential security risks
samthking25
Get Norton Support From The Norton Experts
Get Norton Support From The Norton Experts
mitchm4545
Network Security
Network Security
Angie Perez (LION)
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
F-Secure Corporation
Malware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
Copy of antiviruse
Copy of antiviruse
SWAMY NAYAK
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
Mais conteúdo relacionado
Mais procurados
Protecting Against Ransomware
Protecting Against Ransomware
Symantec
Online Safety - Malwares
Online Safety - Malwares
Arnav Kumar
Spyware powerpoint
Spyware powerpoint
galaxy201
OSB120 Beat Ransomware
OSB120 Beat Ransomware
Ivanti
Spikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx
Senior Technology Education
Senior Technology Education
Summerpair77
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Stuart Walton
Spywareguide1
Spywareguide1
DiannClarke
Spywareguide1
Spywareguide1
DiannClarke
10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
Malware
Malware
Avani Patel
P7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
Zero day exploit
Zero day exploit
Aashiq Ahamed N
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
F-Secure Corporation
Identifying potential security risks
Identifying potential security risks
samthking25
Get Norton Support From The Norton Experts
Get Norton Support From The Norton Experts
mitchm4545
Network Security
Network Security
Angie Perez (LION)
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
F-Secure Corporation
Mais procurados
(19)
Protecting Against Ransomware
Protecting Against Ransomware
Online Safety - Malwares
Online Safety - Malwares
Spyware powerpoint
Spyware powerpoint
OSB120 Beat Ransomware
OSB120 Beat Ransomware
Spikes Security Isla Isolation
Spikes Security Isla Isolation
Senior Technology Education
Senior Technology Education
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Spywareguide1
Spywareguide1
Spywareguide1
Spywareguide1
10 Components of Business Cyber Security
10 Components of Business Cyber Security
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Malware
Malware
P7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
Zero day exploit
Zero day exploit
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
Identifying potential security risks
Identifying potential security risks
Get Norton Support From The Norton Experts
Get Norton Support From The Norton Experts
Network Security
Network Security
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
Semelhante a Safe computing (circa 2004)
Malware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
Copy of antiviruse
Copy of antiviruse
SWAMY NAYAK
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
Internet security
Internet security
rfukunaga
Cybersecurity
Cybersecurity
UmairFirdous
anti_virus
anti_virus
sharq university
information about virus
information about virus
toshan badiye
Preventive measures. Blog. pptx
Preventive measures. Blog. pptx
ReshmaBV2
What is Network Security?
What is Network Security?
Faith Zeller
How To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
Firewall
Firewall
sajeena81
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
Virus and malware presentation
Virus and malware presentation
Amjad Bhutto
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
Spyware
Spyware
Ishita Bansal
Malicious
Malicious
Khyati Rajput
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
Advanced Technology Consulting (ATC)
Semelhante a Safe computing (circa 2004)
(20)
Malware ppt final.pptx
Malware ppt final.pptx
Copy of antiviruse
Copy of antiviruse
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Internet security
Internet security
Cybersecurity
Cybersecurity
anti_virus
anti_virus
information about virus
information about virus
Preventive measures. Blog. pptx
Preventive measures. Blog. pptx
What is Network Security?
What is Network Security?
How To Protect Your Home PC
How To Protect Your Home PC
Firewall
Firewall
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
Viruses, worms, and trojan horses
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
Virus and malware presentation
Virus and malware presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
Information Security (Malicious Software)
Information Security (Malicious Software)
Spyware
Spyware
Malicious
Malicious
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
Mais de Azmi Mohd Tamil
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Azmi Mohd Tamil
Audiovisual and technicalities from preparation to retrieval how to enhance m...
Audiovisual and technicalities from preparation to retrieval how to enhance m...
Azmi Mohd Tamil
Broadcast quality online teaching at zero budget
Broadcast quality online teaching at zero budget
Azmi Mohd Tamil
Video for Teaching & Learning: OBS
Video for Teaching & Learning: OBS
Azmi Mohd Tamil
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
Azmi Mohd Tamil
GIS & History of Mapping in Malaya (lecture notes circa 2009)
GIS & History of Mapping in Malaya (lecture notes circa 2009)
Azmi Mohd Tamil
Blended e-learning in UKMFolio
Blended e-learning in UKMFolio
Azmi Mohd Tamil
How to Compute & Recode SPSS Data
How to Compute & Recode SPSS Data
Azmi Mohd Tamil
Introduction to Data Analysis With R and R Studio
Introduction to Data Analysis With R and R Studio
Azmi Mohd Tamil
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Azmi Mohd Tamil
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Azmi Mohd Tamil
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
Azmi Mohd Tamil
New Emerging And Reemerging Infections circa 2006
New Emerging And Reemerging Infections circa 2006
Azmi Mohd Tamil
Hacks#36 -Raspberry Pi 4 Mini Computer
Hacks#36 -Raspberry Pi 4 Mini Computer
Azmi Mohd Tamil
Hack#35 How to FB Live using a Video Encoder
Hack#35 How to FB Live using a Video Encoder
Azmi Mohd Tamil
Hack#34 - Online Teaching with Microsoft Teams
Hack#34 - Online Teaching with Microsoft Teams
Azmi Mohd Tamil
Hack#33 How To FB-Live
Hack#33 How To FB-Live
Azmi Mohd Tamil
Skype for Business for UKM
Skype for Business for UKM
Azmi Mohd Tamil
Introduction to Structural Equation Modeling
Introduction to Structural Equation Modeling
Azmi Mohd Tamil
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Azmi Mohd Tamil
Mais de Azmi Mohd Tamil
(20)
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Audiovisual and technicalities from preparation to retrieval how to enhance m...
Audiovisual and technicalities from preparation to retrieval how to enhance m...
Broadcast quality online teaching at zero budget
Broadcast quality online teaching at zero budget
Video for Teaching & Learning: OBS
Video for Teaching & Learning: OBS
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
GIS & History of Mapping in Malaya (lecture notes circa 2009)
GIS & History of Mapping in Malaya (lecture notes circa 2009)
Blended e-learning in UKMFolio
Blended e-learning in UKMFolio
How to Compute & Recode SPSS Data
How to Compute & Recode SPSS Data
Introduction to Data Analysis With R and R Studio
Introduction to Data Analysis With R and R Studio
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
New Emerging And Reemerging Infections circa 2006
New Emerging And Reemerging Infections circa 2006
Hacks#36 -Raspberry Pi 4 Mini Computer
Hacks#36 -Raspberry Pi 4 Mini Computer
Hack#35 How to FB Live using a Video Encoder
Hack#35 How to FB Live using a Video Encoder
Hack#34 - Online Teaching with Microsoft Teams
Hack#34 - Online Teaching with Microsoft Teams
Hack#33 How To FB-Live
Hack#33 How To FB-Live
Skype for Business for UKM
Skype for Business for UKM
Introduction to Structural Equation Modeling
Introduction to Structural Equation Modeling
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Último
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
blackmambaettijean
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Último
(20)
How to write a Business Continuity Plan
How to write a Business Continuity Plan
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Safe computing (circa 2004)
1.
Jabatan Kesihatan Masyarakat Cheapskate's
Guide to a Safe PC Dr Azmi Mohd Tamil
2.
© Introduction • http://www.wired.com/news/print/0, 1294,62222,00.html • MyDoom
virus-laden e-mails may no longer be clogging inboxes, but each of those infected computers now contains a backdoor that allows any malicious hacker with a modicum of technical skills to remotely access and control the infected machines.
3.
© Data Protection • From
Viruses - explorer.zip, SirCam, Nimda, MyDoom • From Spyware • Malicious Intrusion - hackers, crackers, use of trojan viruses • Unplanned Disasters - need for backups
4.
© Protection From Intrusion •
First up, firewalls. If you're only going to run one security application, then make it a firewall, which acts as a sort of watchdog for your computer, alerting you to and blocking the entrance or exit of unwelcome visitors. • ZoneAlarm is the most popular free firewall. • Agnitum's Outpost free firewall is easy to install and uses plug-in software modules to add to or enhance its features.
5.
© Data Protection • http://www.wired.com/news/print/0,1294,45581,00.html •
In Order to Have Your Advice • By Jon Rochmis • 2:00 a.m. July 27, 2001 PDT • “And, by the way, hats off to the FBI guy who opened the SirCam virus. His computer proceeded to send the virus -- and random FBI documents -- to e-mail addresses stored in his computer as well as throughout the entire National Infrastructure Protection Center, which, it just so happens, was established to protect the United States' computer networks.”
6.
© Data Protection
7.
© Protection From Viruses •
Install a good anti-virus program • Update it daily if possible, if not every fortnight • Update yourself on virus information ie http://www.wired.com, http://www.cert.org • Never ever click on an attachment esp .exe, .bat, .vbs, .lnk, .pif, sent via e-mail, unless you’re expecting it
8.
© Anti Virus • Free
antivirus applications are also available, but brand-new viruses can and do slip past scanners until companies can analyze the new virus's code and release an upgrade that will block it. Given that limitation, antivirus tools are good at protecting computers against known viruses, but should never be considered bulletproof.
9.
© Spy-Ware • You've checked
your computer for viruses but you're still struggling with application crashes, slowed performance, slews of pop-up ads even when you're not browsing the Web, a home or start page that's been changed to some odd search site, or other "ghost in the machine" sorts of mishaps, chances are your computer harbors spyware, adware or a Trojan Horse. • All of these programs purport to be some useful or fun tool, but actually hand over some level of control over your computer to an outside entity.
10.
© Anti Spy-Ware • The
best program to handle spyware or Trojans is Spybot-Search & Destroy. Spybot effectively and easily removes virtually every sneaky piece of software in existence. Run it weekly. • I myself uses Lavasoft Ad-Aware.
11.
© Avoid Microsoft • Last
but not least, one of the best all- around free security tools is Mozilla's browser and e-mail applications. Since so many viruses, worms and Internet exploits are aimed at Microsoft applications, switching to these open- source programs can help you avoid problems. • The browser also has built-in pop-up blocking and advanced, configurable privacy and security tools.
12.
© Data Protection
13.
© Disaster Recovery • Use
of data backup software • Use of data replication software • If possible, store backups off-site • Duplicating data (mirroring) using 2 powerful servers, one sited off-site • “Hot-site” mirroring
14.
© Data Safekeeping • Repositories.
These are responsible for holding data and other information assets and preparing them for reuse.
15.
© Conclusion • The use
of computers in education has improved the learning & education process. • But without the proper strategies or precautions, it may impede education, instead of helping us.
16.
Jabatan Kesihatan Masyarakat Terima
Kasih