syafiqah slideshare of security measures

23

Upload: syafiqah-akemi

Post on 18-Jan-2017

118 views

Category:

Documents


2 download

TRANSCRIPT

PowerPoint Presentation

Table of Contents

PASSWORD SET UPSimple rules-Slide 3Advise-Slide 4Strength Checker -Slide 5Techniques-Slide 6TYPES OF VIRUSES Virus-Slide 7Virus Indications-Slide 8Worms-Slide 9Trojan-Slide 10Purpose of TROJAN use-Slide 11

HOW STORAGE DEVICE CAN BE INFECTED By Host-Slide 12By Removable Medium-Slide 13By Gadgets and Auto-Run-Slide 14

TYPE OF SECURITY MEASURE-Slide 15Data Backup-Slide 16Safety precautions-Slide 17FireWall-Slide 18Ways to avoid viruses-Slide 19

ANTI VIRUS PROGRAMMcAfee-Slide 20Norton-Slide 21

HYPERLINKS-Slide 22

2

Create Strong Password by having more than 8 CharactersContain a mixture of special characters, numbers, upper & lower caseAvoid using own names Do not use simple passwords like ABC123

https://www.youtube.com/watch?v=hYyWgPXfx9U

Use different passwords across your accountsChange them up every couple of monthsRetire old passwords or reinvent them with number and symbols**Alternate between Upper and Lowercase( 3 of each recommended

**Example: BEFORE ( thissentenceismyyypassword) AFTER(ThisS3nt3nceismyPassword)

**Run your passwords through a Strength CheckerIf its a strong password use it! Do not use personal info like birthdate , phone numberAvoid easy to guess sequencesExample: abcdefg , 1234567

**Microsoft offers a free password Strength Checker.You can access it using this link.https://www.microsoft.com/security/pc-security/password-checker.aspx

Think of a phrase you can rememberExample :I Met Danish at Fuchun Secondary in 2010PASSWORD :ImDaFsI2010Never share passwords to anyone even if you trust the person.A friend can become an ex-friendYour friend might not be as careful as you are

VIRUS SCANNING SOFTWAREViruses **It Corrupt or delete data on your computer

*Example : Use your e-mail program to spread itself to other computers. * Erases everything on your hard disk.

Designed to spread from one computer to another & interfere with computer operation

Can be disguised as attachments of images , audio & video files

Virus IndicationsFiles have strange names than the normal

Programs getting corrupted without any reasons

Program takes longer time to load than the normal

Victim will not be able to open some programs

Worms Uses computer networks and security holes to replicate itself.Scans for another machine that has a specific security hole & copies itselfUsed up computer processing time and network bandwidth during replicationCarry payloads that do considerable damage

Trojan Horse A destructive program that masquerades as a benign applicationProgram that claims to rid your computer of virusesInstead introduces viruses onto your computer If executed, computer system will be damaged

Purpose & Uses A Trojan may give a Hacker a remote access to a targeted computer computer system. Operations that could be performed by a targeted computer system may include:Crashing the computerElectronic money theftData Theft ( e.g retrieving passwords or credit card information)Modification or deletion of files

Ways how your Storage device can be infected by themWhen its host is taken to the uninfected computer* For instance by a user sending it over Internet Network

By a removable medium such asUSB driveCDFloppy Disk

USB drive spreads virus on machines with Auto-Run type feature enabled.

**Thumb drives aren't the only culprits

any device that plugs into a USB portGadgets likeLightsFansSpeakers..etc

Type of Security Measures

Data BackupNeeded to backup all data & application in the computerData can be recovered in case of an emergency

Do not open any unknown email filesDo not accept files from strangersDo not visit strange websitesDo not bring in disks from outside

Protects networks resources from intrusion by other users

Gives you control over the data on computer

FIREWALL

Restricts information that comes to your computer from other computer

Defence against programs that try to connect without invitation

19

Ways To Prevent or Avoid Getting Viruses Avoid letting strangers insert their USB Drive to your computerDo not download stuff from websites that cant be trustedLook for feedback from users before downloading anything from websites.

**Antivirus Software: detects , prevents and takes action to disarm or remove Malicious Software Programs(Viruses , Worms etc.)

Its FeaturesAward Winning Anti Virus ProtectionOptimize Your PCs PerformanceParental Controls and Web Safety Tools

www.tec24x7.com/images/mcafee.png

sg.norton.com/antivirus/Keeps you safe when you surf , shop and bank onlineProtects you from social media scamsStops both todays and tomorrows online treatsBlocks infected and dangerous downloadshttp://upload.wikimedia.org/wikipedia/commons/6/6d/Norton_av_logo.png

http://images.techhive.com/images/article/2014/04/digital-warrior-fight-against-virus-computer-155895292-100264890-primary.idge.jpghttp://i.kinja-img.com/gawker-media/image/upload/s--bhUOQ4Rr--/18ixia2sacv8njpg.jpgPictures linksVideoshttps://www.youtube.com/watch?v=hYyWgPXfx9Uwww.tec24x7.com/images/mcafee.pngINFORMATION

www.tranquilnet.com/uploads/tranquilnet-The-Danger-of-Contracting-Computer-Viruses-blog.jpghttp://theitbros.com/wp-content/uploads/2013/03/FBI-computer-virus.pngwww.threattracksecurity.com/it-blog/wp-content/uploads/2013/07/password-security.pngcore0.staticworld.net/images/article/2013/01/password_580-100022344-large.jpgheimdalsecurity.com/blog/security-experts-roundupThank Youcomputersoftwarereview.com/wp-content/uploads/2014/09/best-free-antivirus10.jpg