SlideShare une entreprise Scribd logo
1  sur  35
COMPUTER & INTERNET
SECURITY
A LOOK INTO COMMON PRACTICES OF:
• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS
• SAFELY NAVIGATING AND USING THE INTERNET
• SECURING YOUR ONLINE ACCOUNTS
OVERVIEW
WHAT WE WILL COVER
1. Some Terminology
2. Computer Security
i. Type of threats
ii. Security measures
3. Break
4. Internet Security
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
!OVERVIEW
WHAT WE WON’T COVER
• Enterprise security
• Server security
• Active cyber security
• Kitchen security
SPEAKER: GERARD LAMUSSE
SOME TERMINOLOGY
• Computer security
• Security types
• Hacker vs.
Cracker
• Script kiddie
• Virus
• Worm
SPEAKER: GERARD LAMUSSE
• Key logging
• Malware
• Trojan
• Spyware/adware
• Phishing
• Quarantine
TERMINOLOGY
CONTINUED
COMPUTER SECURITY
• Computer Security means
protecting our computer system
and the information they contain
against unwanted access,
damage, destruction or
modification
SECURITY TYPES
• Hardware security
• Software security
• Anti-virus
• Firewall
• Network security
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
HACKER
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
CRACKER
• A person who accesses a
computer or network illegally but
has the intent of destroying
data, stealing information, or
other malicious action.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
SCRIPT KIDDIE
• Often are teenagers that use
prewritten hacking and cracking
programs to break into
computers
• Same intent as a cracker
VIRUS
• Can replicate itself and spread
from one computer to another.
• Does damage by altering
programs or the operating
system itself.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
WORM
• Spreads itself over a network
and other means.
• Replicates on host invisibly
• Aim: To use up available
memory and system resources.
KEY LOGGING
• The action of recording keys
struck on a keyboard.
• User unaware of this types
password and account details
• Information sent via malware.
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
MALWARE
• Malicious software
• Gather sensitive information
• Gain access to private computer
systems.
TROJAN
• Form of malware
• A program claiming to rid your
computer of viruses but instead
introduces viruses, to your
computer
SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
SPYWARE
• Similar to Trojan horse.
• Co-exists with other software
• Records actions performed by
user and relaying this
information to its author
ADWARE
• Legitmate alternative offered to
consumers who do not wish to pay
for software
• Displays adverts within program
• Tracks browsing habits to serve
related advertisements
• Has a bad reputation as a result of
spyware.SPEAKER: GERARD LAMUSSE
TERMINOLOGY
CONTINUED
PHISHING
• The fraudulent practice of
sending e-mails purporting to be
from legitimate companies in
order to induce individuals to
reveal personal information.
QUARANTINE
• To move an undesired file such
as a virus-infected file or
spyware to an encrypted folder.
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
i. Type of threats
ii. Security measures
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
TYPES OF THREATS
SPEAKER: GERARD LAMUSSE
Malicious
Code
Natural
Threats
Humans
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
1. Rip data to DVDs
• Cheap, but takes time.
2. External secondary storage
• Cheaper per Gigabyte
• 2x 500Gb from R700
3. Upload and store to Cloud Storage
• Always available, monthly/yearly costs
• www.drive.google.com
• www.justcload.com
• www.mypcbackup.com
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
A utility program that we use to protect a computer against
viruses by identifying and removing computer viruses found
in the computer memory, computer storage and on incoming
e-mail files.
Microsoft Security Essentials
For windows 7 & earlier or
Windows Defender
For Windows 8
AVAST FREE for mac
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
WHY?
Not all anti-virus will prevent installation of spyware!
Much more common today than viruses.
Recommended
Malwarebytes Anti-Malware
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
Two types, hardware and software firewalls.
Your router functions as a hardware firewall, while Windows
includes a software firewall.
How it works?
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Save your data before…
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 1.
Windows 7 Control Panel
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 2.
Manage Accounts screen
in Windows 7
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 3.
Create New Account screen
SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 4.
New user has been created
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Threat:
• Loss of data
• Stolen computer and other valuables
• Damage to property
Solutions???
• If they want to get in they will find a way
• Backup your data!!!
• Lockup and password secure your accounts.
RECOMMENDATION:
K9 Home Protection
COMPUTER & INTERNET
SECURITY
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
FIRST: PASSWORDS
i. What defines a strong password
ii. What is NOT a good password
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a strong password
i. Is at least eight characters long.
ii. Does not contain your user name, real name, or company name.
iii. Does not contain a complete word.
iv. Is significantly different from previous passwords.
v. Contains characters from each of the following four categories:
INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
Character category Examples
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the
keyboard and spaces
` ~ ! @ # $ % ^ & * ( ) _ - + = { } [
]  | : ; " ' < > , . ? /
INTERNET SECURITY
BAD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a bad password
i. Dictionary words.
ii. Names, surnames, contact details, registration numbers
iii. Not long enough
iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Create an acronym from an easy-to-remember piece of information.
For example, pick a phrase that is meaningful to you, such as My
son's birthday is 12 December, 2004. Using that phrase as your guide,
you might use Msbi12/Dec,4 for your password.
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Substitute numbers, symbols, and misspellings for letters or words in
an easy-to-remember phrase. For example, My son's birthday is 12
December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use
spaces in your password).
• Relate your password to a favourite hobby or sport. For example, ‘I
love to play badminton’ could become ILuv2PlayB@dm1nt()n.
INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
Highly Recommended
• Use secure, unique passwords for every Internet site or service is one
of the best security practices out there.
• Use a single master password for storage of all passwords, then
never user it again!
• LastPass
• How secure is your password? Try
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
THE END
THANKS
SPEAKER: GERARD LAMUSSE

Contenu connexe

Tendances

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 

Tendances (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 

En vedette

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validityrodsazon
 

En vedette (6)

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validity
 

Similaire à Computer & internet Security

Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.pptFork6
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 

Similaire à Computer & internet Security (20)

Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Online safety
Online safety Online safety
Online safety
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Computer & internet Security

  • 1. COMPUTER & INTERNET SECURITY A LOOK INTO COMMON PRACTICES OF: • SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS • SAFELY NAVIGATING AND USING THE INTERNET • SECURING YOUR ONLINE ACCOUNTS
  • 2. OVERVIEW WHAT WE WILL COVER 1. Some Terminology 2. Computer Security i. Type of threats ii. Security measures 3. Break 4. Internet Security i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE
  • 3. !OVERVIEW WHAT WE WON’T COVER • Enterprise security • Server security • Active cyber security • Kitchen security SPEAKER: GERARD LAMUSSE
  • 4. SOME TERMINOLOGY • Computer security • Security types • Hacker vs. Cracker • Script kiddie • Virus • Worm SPEAKER: GERARD LAMUSSE • Key logging • Malware • Trojan • Spyware/adware • Phishing • Quarantine
  • 5. TERMINOLOGY CONTINUED COMPUTER SECURITY • Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification SECURITY TYPES • Hardware security • Software security • Anti-virus • Firewall • Network security SPEAKER: GERARD LAMUSSE
  • 6. TERMINOLOGY CONTINUED HACKER • A person who accesses a computer or network illegally. • Various types • Black • Grey • White CRACKER • A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. SPEAKER: GERARD LAMUSSE
  • 7. TERMINOLOGY CONTINUED SCRIPT KIDDIE • Often are teenagers that use prewritten hacking and cracking programs to break into computers • Same intent as a cracker VIRUS • Can replicate itself and spread from one computer to another. • Does damage by altering programs or the operating system itself. SPEAKER: GERARD LAMUSSE
  • 8. TERMINOLOGY CONTINUED WORM • Spreads itself over a network and other means. • Replicates on host invisibly • Aim: To use up available memory and system resources. KEY LOGGING • The action of recording keys struck on a keyboard. • User unaware of this types password and account details • Information sent via malware. SPEAKER: GERARD LAMUSSE
  • 9. TERMINOLOGY CONTINUED MALWARE • Malicious software • Gather sensitive information • Gain access to private computer systems. TROJAN • Form of malware • A program claiming to rid your computer of viruses but instead introduces viruses, to your computer SPEAKER: GERARD LAMUSSE
  • 10. TERMINOLOGY CONTINUED SPYWARE • Similar to Trojan horse. • Co-exists with other software • Records actions performed by user and relaying this information to its author ADWARE • Legitmate alternative offered to consumers who do not wish to pay for software • Displays adverts within program • Tracks browsing habits to serve related advertisements • Has a bad reputation as a result of spyware.SPEAKER: GERARD LAMUSSE
  • 11. TERMINOLOGY CONTINUED PHISHING • The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information. QUARANTINE • To move an undesired file such as a virus-infected file or spyware to an encrypted folder. SPEAKER: GERARD LAMUSSE
  • 12. COMPUTER SECURITY i. Type of threats ii. Security measures SPEAKER: GERARD LAMUSSE
  • 13. COMPUTER SECURITY TYPES OF THREATS SPEAKER: GERARD LAMUSSE Malicious Code Natural Threats Humans
  • 14. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE 1. Rip data to DVDs • Cheap, but takes time. 2. External secondary storage • Cheaper per Gigabyte • 2x 500Gb from R700 3. Upload and store to Cloud Storage • Always available, monthly/yearly costs • www.drive.google.com • www.justcload.com • www.mypcbackup.com
  • 15. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE A utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage and on incoming e-mail files. Microsoft Security Essentials For windows 7 & earlier or Windows Defender For Windows 8 AVAST FREE for mac
  • 16. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE WHY? Not all anti-virus will prevent installation of spyware! Much more common today than viruses. Recommended Malwarebytes Anti-Malware
  • 17. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE 4 Main types of security measure 1. Data Backup 2. Antivirus 3. Anti-spyware 4. Firewall MALICIOUS CODE Two types, hardware and software firewalls. Your router functions as a hardware firewall, while Windows includes a software firewall. How it works?
  • 18. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Applies to teens as well. Problems they pose: • Accidental data deletion • Corrupt system files • Installation of spyware or viruses • Accidental natural disaster Preventing or Safe guarding against children threats: • Backup data • Save your data before… • Set up limited user accounts • Set up parental controls RECOMMENDATION: K9 Web Protection
  • 19. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 1. Windows 7 Control Panel
  • 20. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 2. Manage Accounts screen in Windows 7
  • 21. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 3. Create New Account screen
  • 22. SECURING AND SETTING UP USER ACCOUNTS SPEAKER: GERARD LAMUSSE Figure 4. New user has been created
  • 23. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Applies to teens as well. Problems they pose: • Accidental data deletion • Corrupt system files • Installation of spyware or viruses • Accidental natural disaster Preventing or Safe guarding against children threats: • Backup data • Set up limited user accounts • Set up parental controls RECOMMENDATION: K9 Web Protection
  • 24. COMPUTER SECURITY SECURITY MEASURES SPEAKER: GERARD LAMUSSE Problems and solutions: 1. Children 2. Thieves HUMANS Threat: • Loss of data • Stolen computer and other valuables • Damage to property Solutions??? • If they want to get in they will find a way • Backup your data!!! • Lockup and password secure your accounts. RECOMMENDATION: K9 Home Protection
  • 26. INTERNET SECURITY i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE
  • 27. INTERNET SECURITY FIRST: PASSWORDS i. What defines a strong password ii. What is NOT a good password SPEAKER: GERARD LAMUSSE
  • 28. INTERNET SECURITY GOOD PASSWORDS SPEAKER: GERARD LAMUSSE What makes a password a strong password i. Is at least eight characters long. ii. Does not contain your user name, real name, or company name. iii. Does not contain a complete word. iv. Is significantly different from previous passwords. v. Contains characters from each of the following four categories:
  • 29. INTERNET SECURITY GOOD PASSWORDS SPEAKER: GERARD LAMUSSE Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard and spaces ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] | : ; " ' < > , . ? /
  • 30. INTERNET SECURITY BAD PASSWORDS SPEAKER: GERARD LAMUSSE What makes a password a bad password i. Dictionary words. ii. Names, surnames, contact details, registration numbers iii. Not long enough iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
  • 31. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE • Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.
  • 32. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE • Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password). • Relate your password to a favourite hobby or sport. For example, ‘I love to play badminton’ could become ILuv2PlayB@dm1nt()n.
  • 33. INTERNET SECURITY PASSWORD OVERVIEW SPEAKER: GERARD LAMUSSE Highly Recommended • Use secure, unique passwords for every Internet site or service is one of the best security practices out there. • Use a single master password for storage of all passwords, then never user it again! • LastPass • How secure is your password? Try
  • 34. INTERNET SECURITY i. Browser security ii. Web browsing iii. Online accounts SPEAKER: GERARD LAMUSSE

Notes de l'éditeur

  1. Just to be aware of the two.Hacker types: Not in todays scope.
  2. VIRUSNeeds you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
  3. Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers.
  4. MALWARE:Can seem like a normal program but used or programmed by attackers to disrupt computer operation.Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. victims computer.Used a lot by script kiddies, to hack and play around with a
  5. Spyware:they have the capability to monitor your keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookiesSymptoms: If you notice any changes to your Web browser that you did not make such as extra toolbars or different homepage settings, as well as changes to your security settings and favourites list, you could have spyware running on your system. Other signs of a spyware infection include pop-up ads which aren&apos;t related to a Web site you&apos;re viewing; usually spyware advertisements are adult content in nature and are not displayed in the same fashion as legitimate ads you would normally see on your favourite Web sites. You may also see advertisements when you&apos;re not browsing the Web.Adware- When you stop running the software, the ads should disappear. This allows consumers to try the software before they buy and you always have the option of disabling the ads by purchasing a registration key.
  6. Phishing:The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.Quarantine simply keeps the detected object in a safe location and is usually encrypted so other malware apps won&apos;t detect it. Always quarantine before deleting. You don&apos;t want to delete an important system file or delete something that your AV is erroneously flagging as malicious.
  7. Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
  8. Malicious Code:The most likely of the three Consists of those threats which I have just mentioned, such as viruses and malware.Humans: Second most likely to threaten your computer. Theft Children / people playing around where they should not, such as system files and such. Could accidently delete Important files.Natural Threats: Include power surge, lightning, water damage, eg. floods 
  9. DVDs and CDsPro: They&apos;re cheap. CD-Rs and DVD-Rs are extremely inexpensive these days. Con: They&apos;re not always reliable. Despite the low cost, there&apos;s a big problem with optical media--they occasionally don&apos;t burn right. Buffer underruns and other problems mean that out of every batch of CD-Rs or DVD-Rs, occasionally one or two might be bad. If that&apos;s the disc that had your important files on it, your data backup is lost. |Slower to burn than copying to secondary storage.External hard drivesPro: Cheaper per Gigabyte. | Faster to read and write data | There are no ongoing costs eg. In relation to cloud storage | Much more reliable and secure than DVDs and cloud computing, because you have the responsibility over them.Cons: If they fail, and you don’t have redundant data backups, your data is lost! | You physically need the hard drive with you to make and retrieve backupsCloud StoragePro: Online backup is becoming very affordable | Access your files from anywhere | Share your files with friends and family | Online backup takes care of your file security | Your files are safeCons: Initial backup can be slow | You have ongoing costs | You have to trust - As you send your files to a relatively unknown third-party, you have to trust that they treat your files with care and utmost security. Once you send your files over, they still remain your control, but they are no longer only on your computer. Many providers do have the option to encrypt files locally, so that your files can only be seen by the owner of the encryption key – and that would be you.
  10. Why Wouldn’t You Run an Antivirus?Some people believe that antivirus software is heavy and slows down your computer. This was certainly true in the past. Older Norton and McAfee antivirus software suites were infamous for slowing down your computer more than actual viruses would. They’re full of notifications and advertisementsto remind you of paying for the subscription and buy more expensive security suites, just as adware annoys you with requests to buy products.This isn’t true anymore. Computers have become so fast that antivirus software don’t weigh them down like they used to. There are also more efficient security suites that are much lighter on resources. The free Microsoft Security Essentials for Windows 7 or the included Windows Defender on Windows 8 are lightweight antivirus programs created by Microsoft. They don’t try to sell you anything at all. There’s no reason not to use them – unless you just want to brag online that you’re too smart for an antivirus.RECOMMEND - MACYou Should Still Be CarefulAn antivirus is only a single layer of security. No antivirus program is perfect, as all the antivirus tests show nothing catches all malware all of the time. if you don’t exercise caution, you may become infected by malware even if you’re using an antivirus Be careful about the files you download and run, keep your software updated, uninstall vulnerable software like Java, and more – but don’t drop your antivirus defences completely just because you’re being careful. Malware isn’t what it used to be – much of it is created by organized crime to capture financial information and other sensitive data. Antivirus software helps you stay ahead of the bad guys by a little bit more, and it’s worth using.If you own a mac AVAST
  11. As mentioned earlier:Spyware is a type of malware that damages your computer system. Spyware is NOT a computer virus in the traditional sense, but is unwanted and harmful nonetheless. It works by getting into your computer system for the purpose of taking partial control over your use, or collecting personal information without your knowledge. It often ends up on your computer after downloading and installing free software so be very careful what software you download, and which websites you download from.Recommends
  12. A firewall works as a barrier, or a shield, between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you. How it works?2 images.
  13. Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!Safeguard: Save your data before… If accidental shutdown could mean loss of data busy working on.
  14. Windows 7/vistaClick on the Start button. This is the small round button () in the lower left corner of your screen that has a Windows flag on it.  Click on the Control Panel menu option.  When the control panel opens you will see a screen similar to Figure 1 below.Click on the Add or remove user accounts control panel option as shown by the red arrow in figure 1.  You will now be in the Manage Accounts control panel as shown in Figure 2 below.
  15. Windows 7/vistaThis screen shows all the accounts currently on your computer. To create a new account, click on the Create a new account option as shown by the red arrow above.  You will now be at the Create New Account screen.
  16. Windows 7/vistaIn the New account name field enter the name of the new account that you would like to create. This could be a person&apos;s first name, full name, or whatever other designation you would like to give. You then need to decide which of the two types of accounts you would like to create. An Administrator account has full access to the computer and can make all changes, install software, and create and delete accounts. The other type of account is Standard user and has limited privileges as to what settings and changes it can make to the computer. It is suggested that for all users, you set them as a Standard User account and have one administrator account that you can logon to as needed. This will protect your computer from malware and other harmful activities.When you have finished selecting a name and the type of account you wish to setup, you should click on the Create Account button.  Your new account will have been created and you will see it listed in the Manage Accounts screen.
  17. Windows 7/vistaAs you can see our new user, named Test Account, has been created.Now when you start Windows 7 or Vista, you will see the additional account listed in the logon screen. That user can then select their login name and login into their profile so they can access their private data.
  18. Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!
  19. Thiefs: Solutions:AS mentioned before, backup your data, and store the backups in a secure location, either using online backups, or secondary backup stored in a safe.
  20. Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  21. Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  22. Help yourself remember your strong password by following these tips:Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son&apos;s birthday is 12 December, 2004 could become Mi$un&apos;s Brthd8iz 12124 (it&apos;s OK to use spaces in your password).Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
  23. Help yourself remember your strong password by following these tips:
  24. Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam
  25. Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam