0% found this document useful (0 votes)
91 views21 pages

Computer Security: Information Systems & Literacy Presentation

A PowerPoint of my computer security presentation with the goal to simplify a complicated subject so that it can be understood easier and help some in the process. I hope this helps!

Uploaded by

Aaron Couch
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views21 pages

Computer Security: Information Systems & Literacy Presentation

A PowerPoint of my computer security presentation with the goal to simplify a complicated subject so that it can be understood easier and help some in the process. I hope this helps!

Uploaded by

Aaron Couch
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Information Systems & Literacy Presentation

COMPUTER SECURITY
Outline

 What is computer security and why it matters


 Threats
 How computers become insecure
 Precautions to take
 Recommendations
 What about Macs?
 Conclusion
 Summary
 Questions
 Works Cited
Computer Security

 Process of preventing and detecting


unauthorized use of your computer
 Prevention helps you stop intruders
 Detection helps you determine if someone
attempted to access your information and whether it
was successful
Why It Matters

 We use computers for everything


 Banking
 Entertainment
 Work
 School
 Productivity
 Shopping
 Communication
 Responsibility – you could put others at risk
Threats
 Malware – A generic name for all malicious programs
 Adware – designed to show advertisements. It often reports
personal information back to its owners – privacy can be
violated
 Spyware – installed on your computer without your consent to
monitor or control your computer use
 Rogue – disguised as a trustworthy program (ex. anti-spyware)
 Virus – multiplies and is capable to attach itself to other
programs after being executed
 Trojan – pretends to have a particular function, but that only
shows its real purpose after execution (often destructive) - can’t
multiply
Threats (continued)
 Phishing – a scam where
Internet fraudsters send
or pop-up messages to
lure personal and
financial information
from unsuspecting
victims.
 Ignorance – significant
part
 Less than 50% of
Americans even know
what phishing is
Threats – Phishing Example
Facebook Conversation

Addressed by
wrong name
Facebook Conversation (cont.)
How Computers Become Insecure

 Computers are made secure


 Firewall – keeps the unwanted out while allowing
appropriate traffic in and out of the computer
 Recent updates
 No viruses, spyware or malware
 The user and operator
 Visiting unknown/ dangerous websites
 Don’t update or patch system and software
 Open links and attachments in emails from unknown
senders
Action Steps

 Essential programs to have installed


 Anti-virus software
 Firewall program
 Anti-spyware and/or malware software
 Frequent Updates
 Operating system and software
 Automatic Updates
 Wary of emails from unknown senders
 Attachments & Links – Don’t left click or open
 Known sender – if unsure, just ask them before opening
Action Steps (continued)

 Backup
 What, When, Where and Where?
 Backup any files that you can’t replicate
 Backup as frequently as possible
 Backup on whatever you have – CD-ROMs, external
hard drives, Internet, flash drives, SD cards
 Store the media in a safe, known place
Action Steps (continued)

 Secure Your Passwords


 The Strong Test – Is it strong enough ( length & content)
 The Unique Test: Is it unique & unrelated?
 The Practical Test: Can you remember it ?
 The Recent Test: Have you changed it recently?
 Use passwords on your home computer and services
used on the Internet
 Combine upper & lowercase
 Numbers & punctuation
 Can’t be found in the dictionary
Action Steps (continued)

 Use caution when downloading & installing


programs
 Shareware – Paid for software (Microsoft Office)
 Freeware – Free software (Adobe Reader)
 Open Source – Free and “Open” Software (Firefox)
 Questions to ask:
 What is it?
 What does it do?
 Do I need it?
 Where is it coming from?
 Is it worth it?
Recommendations
 Anti-virus Software
 Avast Free Antivirus
 Avira AntiVir Personal – Free Antivirus
 Microsoft Security Essentials
 Spyware removal
 Malwarebytes Anti-Malware Free
 Firewall
 Comodo Internet Security
 Provided Windows/Mac firewall
 Backup
 Windows Backup & Restore Center – Default (backup on External HDD/ CD-ROM)
 SyncBack – Freeware (backup on External HDD/ CD-ROM)
 SugarSync – Online Backup
 Live Mesh – Online Backup
 Web Browser Add-ons/Plug-ins
 Web of Trust for Firefox, Internet Explorer and Chrome
 LastPass Password Manager for Firefox, IE and Chrome
 www.download.com
Macintosh Computers
 Who feels Macs are more secure than PCs?
 More than half of Americans believe that PCs are very or extremely
vulnerable to cybercrime attacks, while only 20% say the same about Macs
 The survey of more than 1,000 people found that while both PC & Mac
users perceive the Mac as being safer, Mac users are victims of cybercrime
just as frequently as PC users.
Mac Computers (continued)

 It isn’t the operating system or computer – it’s the


user
 Don’t fall for the marketing techniques Apple uses
to entice consumers to buy their product.
 Macs can get viruses too
 At the 2009 CanSec-West conference a security
researcher broke into a mac within 10 seconds through
flaw in the Mac internet browser, Safari (Discover Mag)
 It is up to the user and operator of the computer to
stay safe online
Conclusion

 Be aware
 Research
 Know the risks
 Don’t trust everything you see on the Internet
 Be prepared
 Have updated software and operating system
 Use an anti-virus and protect yourself
 Backup your files
 Use the web and its services responsibly
Summary

 Computer security prevents and detects unauthorized use of


your computer
 Computer security matters because your information matters
 Users’ lack of knowledge or care is what truly causes security
issues in computers
 Have a plan and action steps to ensure safe use of your
computer
 Macs are great, but don’t buy one for security reasons, buy it
because its what you want
 There are several types of threats out there, but you can beat
them all with one stick – awareness and preparation
Questions
Works Cited
 Coffey, Rebecca. "20 THINGS YOU DIDN'T KNOW ABOUT COMPUTER HACKING." Discover 30.10 (2009):
80. Academic Search Elite. EBSCO. Web. 16 Feb. 2010.
 "Home Computer Security." http://www.cert.org/homeusers/HomeComputerSecurity/. November 22, 2002 .
Carnegie Mellon University, Web. 16 Feb 2010. <http://www.cert.org/homeusers/HomeComputerSecurity/>.
 "Home Network Security." CERT. 27 Feb 2006. Carnegie Mellon University, Web. 16 Feb 2010.
<http://www.cert.org/tech_tips/home_networks.html>.
 Mills, Elinor. "In their words: Experts weigh in on Mac vs. PC security." InSecurity Complex (2010): 1. Web. 16
Feb 2010. <http://news.cnet.com/8301-27080_3-10444561-245.html>.
 Abrams, Randy. "Once Upon a Cybercrime." ESET Threat Blog (2009): 1. Web. 16 Feb 2010.
<http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6>.
 "Description of Malware." Malwarebytes. 2010. Malwarebytes Corporation, Web. 16 Feb 2010.
<http://www.malwarebytes.org/malwarenet.php?name=Adware.MyWebSearch>.
 "Phishing." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010.
<http://www.onguardonline.gov/topics/phishing.aspx>.
 "Spyware." OnGuard Online. Feb 2008. OnGuard Online, Web. 16 Feb 2010.
<http://www.onguardonline.gov/topics/spyware.aspx>.
 "Security Starter Kit." CNET Download.com. Jan 2010. CNET, Web. 16 Feb 2010.
<http://download.cnet.com/2701-2023_4-6-1.html?tag=page;page>.
 "Confused man about a virus alert ." Shutterstock Images. Web. 16 Feb 2010.
 "Recognizing and Avoiding Scams." Howstuffworks. Web. 17 Feb 2010.
<http://computer.howstuffworks.com/5-internet-security-videos1.htm>.

You might also like