© 2008 prentice-hall, inc.1 technology in action technology in focus: protecting your computer and...

14
© 2008 Prentice-Hall, Inc. 1 Technology in Action Technology in Action Technology in Focus: Technology in Focus: Protecting Your Computer and Protecting Your Computer and Backing Up Your Data Backing Up Your Data

Post on 19-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 1

Technology in ActionTechnology in Action

Technology in Focus: Technology in Focus: Protecting Your Computer and Protecting Your Computer and

Backing Up Your Data Backing Up Your Data

Page 2: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 2

Physically Protecting Your Physically Protecting Your ComputerComputer

• Environmental factorsEnvironmental factors– FallsFalls– Excessive heatExcessive heat– Dust and other particlesDust and other particles

• Power surgesPower surges– Surge protectorsSurge protectors

• Power outagesPower outages– Uninterruptible power supply (UPS)Uninterruptible power supply (UPS)

Page 3: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 3

Deterring TheftDeterring Theft

• Motion alarms Motion alarms • Locks Locks • Surrounds (cages)Surrounds (cages)• ““Phone home” computersPhone home” computers Surround

Motion alarmLock

Page 4: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 4

Keeping PDAs and Keeping PDAs and Cell Phones SafeCell Phones Safe

• PDA Bomb SoftwarePDA Bomb Software– Thief steals PDAThief steals PDA– Thief launches a brute force attack Thief launches a brute force attack

on device to get accesson device to get access– PDA senses attack and erases PDA senses attack and erases

datadata• Bluetooth VulnerabilityBluetooth Vulnerability

– BluesnarfingBluesnarfing• Exploits an access flaw in Bluetooth Exploits an access flaw in Bluetooth

software making data vulnerablesoftware making data vulnerable– BluebuggingBluebugging

• Hacker takes actual control of the Hacker takes actual control of the Bluetooth deviceBluetooth device

Page 5: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 5

Protecting Your Computer from Protecting Your Computer from Unauthorized AccessUnauthorized Access

• Access privilegesAccess privileges• Password protection Password protection

– Passwords shouldPasswords should• Contain 5 to 8 alphanumeric charactersContain 5 to 8 alphanumeric characters• Not be a word found in a dictionaryNot be a word found in a dictionary• Not be easily associated with youNot be easily associated with you• Include special charactersInclude special characters• Never be given to anyoneNever be given to anyone

Page 6: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 6

Good and Bad PasswordsGood and Bad PasswordsGOOD PASSWORD

REASON BAD PASSWORD

REASON

L8t2meGaNDalf351

Uses letters and numbers to come up with memorable phrase “Late to me” and adds it to a character name from Lord of the Rings plus a random number

Jsmith Combination of first initial and last name

IwaLR8384GdY First initials of first line of Green Day song I Walk a Lonely Road plus a random number and an abbreviation for Green Day

4smithkids Even though this has alphanumeric combination, it is too descriptive of a family

P1zzA244WAterShiPDowN

Easily remembered word with mix of alphanumeric characters and upper- and lowercase letters, your locker number at your gym, plus the title of a book that you like (with upper- and lowercase letters)

Brown5512 Last name and last four digits of phone number is easily decoded

S0da&ICB3N&J3RRY

Mix of numbers, symbols, and letters. Stands for Soda and Ice Cream and the names of famous ice cream makers with the number 3 instead of the letter E

123MainSt Your street address is an easily decoded password

Page 7: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 7

Managing PasswordsManaging Passwords

• Free password management software takes the Free password management software takes the worry out of forgetting passwordsworry out of forgetting passwords

• Remembers passwords for you.Remembers passwords for you.• Remember just one password to access the Remember just one password to access the

password management programpassword management program

Page 8: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 8

Protecting Your Computer from Protecting Your Computer from Unauthorized AccessUnauthorized Access

• Keeping IM Keeping IM sessions safesessions safe– Allow Allow

connections only connections only from the Buddy from the Buddy ListList

– Disable file Disable file sharing, file sharing, file transfer, and transfer, and Direct IMDirect IM

Page 9: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 9

Protecting Your Computer from Protecting Your Computer from Unauthorized AccessUnauthorized Access

• Biometric authentication devicesBiometric authentication devices– Read unique personal characteristicsRead unique personal characteristics

• FingerprintFingerprint• Iris patternsIris patterns• Voice patternsVoice patterns• Face patternsFace patterns

Mouse fingerprint reader

• FirewallsFirewalls– Prevent unauthorized Prevent unauthorized

access when access when connected to the connected to the InternetInternet

Page 10: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 10

Windows UpdatesWindows Updates

• Microsoft frequently Microsoft frequently issues updates to issues updates to patch security holespatch security holes

• In Windows XP, In Windows XP, updates can be updates can be automatically loadedautomatically loaded

Page 11: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 11

Backing Up Your DataBacking Up Your Data

• BackupBackup– A copy of a file that A copy of a file that

can be used to can be used to replace the originalreplace the original

• Types of files to Types of files to backupbackup– ProgramProgram– DataData

• Backup routineBackup routine– FrequencyFrequency– Changed filesChanged files

Page 12: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 12

Backup SoftwareBackup Software

• Software programs for easy backupSoftware programs for easy backup– Schedule automatic backupsSchedule automatic backups– Can backup files, folders, or entire drivesCan backup files, folders, or entire drives– Back up to USB device, CD, or DVDBack up to USB device, CD, or DVD

• Entire system backup softwareEntire system backup software– Takes an image of the entire system Takes an image of the entire system – Stores on a separate hard driveStores on a separate hard drive– In case of failure, new drive is insertedIn case of failure, new drive is inserted

Page 13: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 13

Protection from PhishingProtection from Phishing

• Phishing attacks lure you to Web sites that look legitimate

• Free tools identify suspicious sites.

• Credit card providers Credit card providers offer services like offer services like “Virtual Account “Virtual Account Numbers” for their Numbers” for their customerscustomers

Page 14: © 2008 Prentice-Hall, Inc.1 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data

© 2008 Prentice-Hall, Inc. 14

Backing Up Your DataBacking Up Your Data

• Backup softwareBackup software– Schedule automatic Schedule automatic

backupsbackups

• Online backupsOnline backups– Store backup files on Store backup files on

Internet serversInternet servers– Fees for the serviceFees for the service