Upload
marybeth-briggs
View
217
Download
0
Tags:
Embed Size (px)
Citation preview
Safe Computing
Computer Maintenance Back up, Back up, Back up
External Hard Drive CDs or DVDs
Disk Defragmenter Reallocates files so they use available hard drive
space more efficiently Restore Utility
Periodically creates a restore point Manually create a restore point before making any
major changes to your system
Viruses Computer viruses are malicious codes or
programs that are usually installed on your computer without your knowledge and against your wishes.
Virus severity varies Just a nuisance Corrupt or erase files Shut down the computer Erase the entire hard drive
How does your computer get a virus? Through an e-mail attachment
Don’t open attachments without scanning with anti-virus software
Don’t open attachments unless you know the sender and why they are sending the attachment
Through files you download
Worms Worms are malicious programs that spread
from computer to computer without human interaction. Burrow into your e-mail address book and then
send themselves out to your contacts Open a “back door” to your system, which enables
hackers access to it and the ability to control it with remote access
Replicate themselves and eventually fill up your hard drive or network drive
Trojan Horses Not truly viruses because they do not
duplicate themselves or infect other files. Appear as legitimate programs (free
screensaver, animated cursors)
Spyware and Adware Spyware is software designed to capture personal and
confidential information that resides on your system and send it elsewhere. Primary threat to your privacy and confidentiality –
passwords, IP Address
Doesn’t usually harm your system Adware is spyware that tracks your Internet browsing
and can install malicious cookies on your computer. Cookies are small text files that contain information that
can identify you to a Web site. Cause an increase in the number of pop-up ads sometimes
even when you’re not online. Hijack your browser and direct you to undesirable Web
pages.
Key loggers Key loggers record every keystroke made on
the computer. Capture passwords, credit card numbers, bank
account numbers, etc. Hardware key loggers attached between keyboard
and computer Trojan horses can be used to distribute key
loggers.
Avoiding Spyware Don’t use free file-sharing services – Kazaa,
Morpheus, Share Bear Don’t click on buttons on pop-up ads – use the
close X in the right corner of the window Use pop-up blocking software – already
enabled in IE and Firefox
Protecting Your Computer Update your Operating System and Web
browser Install and update Antivirus software
AVG Free – www.download.com, type AVG free in Search box
Personal firewalls – prevent unauthorized access to your computer, prevent it from becoming a zombie Hardware - router Software – Windows XP and Vista have software
firewall included
Protecting Yourself Avoid phishing attempts by never giving out
personal information unless it is for legitimate purposes. Legitimate organizations will never ask for passwords, bank account numbers or credit card details through e-mail.
Be aware of pharming. Pharming is the practice where fraudulent Web sites are created to look like an official Web site, so that unknowing clients and customers conduct business and reveal personal information.
Create strong passwords that include combo of numbers and letters
Never give out your passwords
Phishing example
Secure Web sites When using a web site for shopping or
banking transactions, you want the Web site to be secure.
In the address bar the URL should have the protocol HTTPS:// rather than just HTTP://