Safe Computing

Download Report

Transcript Safe Computing

Safe Computing
Computer Maintenance

Back up, Back up, Back up



Disk Defragmenter


External Hard Drive
CDs or DVDs
Reallocates files so they use available hard drive space more
efficiently
Restore Utility


Periodically creates a restore point
Manually create a restore point before making any major
changes to your system
Viruses

Computer viruses are malicious codes or programs that
are usually installed on your computer without your
knowledge and against your wishes.

Virus severity varies




Just a nuisance
Corrupt or erase files
Shut down the computer
Erase the entire hard drive
How does your computer get a virus?

Through an e-mail attachment



Don’t open attachments without scanning with anti-virus
software
Don’t open attachments unless you know the sender and why
they are sending the attachment
Through files you download
Worms

Worms are malicious programs that spread from
computer to computer without human interaction.



Burrow into your e-mail address book and then send
themselves out to your contacts
Open a “back door” to your system, which enables hackers
access to it and the ability to control it with remote access
Replicate themselves and eventually fill up your hard drive or
network drive
Trojan Horses


Not truly viruses because they do not duplicate
themselves or infect other files.
Appear as legitimate programs (free screensaver, animated
cursors)
Spyware and Adware

Spyware is software designed to capture personal and
confidential information that resides on your system and
send it elsewhere.



Primary threat to your privacy and confidentiality – passwords,
IP Address
Doesn’t usually harm your system
Adware is spyware that tracks your Internet browsing
and can install malicious cookies on your computer.



Cookies are small text files that contain information that can
identify you to a Web site.
Cause an increase in the number of pop-up ads sometimes
even when you’re not online.
Hijack your browser and direct you to undesirable Web pages.
Key loggers

Key loggers record every keystroke made on the
computer.



Capture passwords, credit card numbers, bank account
numbers, etc.
Hardware key loggers attached between keyboard and
computer
Trojan horses can be used to distribute key loggers.
Avoiding Spyware



Don’t use free file-sharing services – Kazaa, Morpheus,
Share Bear
Don’t click on buttons on pop-up ads – use the close X
in the right corner of the window
Use pop-up blocking software – already enabled in IE and
Firefox
Protecting Your Computer


Update your Operating System and Web browser
Install and update Antivirus software


AVG Free – www.download.com, type AVG free in Search box
Personal firewalls – prevent unauthorized access to your
computer, prevent it from becoming a zombie


Hardware - router
Software – Windows XP and Vista have software firewall
included
Protecting Yourself




Avoid phishing attempts by never giving out personal
information unless it is for legitimate purposes. Legitimate
organizations will never ask for passwords, bank account
numbers or credit card details through e-mail.
Be aware of pharming. Pharming is the practice where
fraudulent Web sites are created to look like an official
Web site, so that unknowing clients and customers
conduct business and reveal personal information.
Create strong passwords that include combo of numbers
and letters
Never give out your passwords
Phishing example
Secure Web sites


When using a web site for shopping or banking
transactions, you want the Web site to be secure.
In the address bar the URL should have the protocol
HTTPS:// rather than just HTTP://