syafiqah slideshare of security measures
TRANSCRIPT
PowerPoint Presentation
Table of Contents
PASSWORD SET UPSimple rules-Slide 3Advise-Slide 4Strength Checker -Slide 5Techniques-Slide 6TYPES OF VIRUSES Virus-Slide 7Virus Indications-Slide 8Worms-Slide 9Trojan-Slide 10Purpose of TROJAN use-Slide 11
HOW STORAGE DEVICE CAN BE INFECTED By Host-Slide 12By Removable Medium-Slide 13By Gadgets and Auto-Run-Slide 14
TYPE OF SECURITY MEASURE-Slide 15Data Backup-Slide 16Safety precautions-Slide 17FireWall-Slide 18Ways to avoid viruses-Slide 19
ANTI VIRUS PROGRAMMcAfee-Slide 20Norton-Slide 21
HYPERLINKS-Slide 22
2
Create Strong Password by having more than 8 CharactersContain a mixture of special characters, numbers, upper & lower caseAvoid using own names Do not use simple passwords like ABC123
https://www.youtube.com/watch?v=hYyWgPXfx9U
Use different passwords across your accountsChange them up every couple of monthsRetire old passwords or reinvent them with number and symbols**Alternate between Upper and Lowercase( 3 of each recommended
**Example: BEFORE ( thissentenceismyyypassword) AFTER(ThisS3nt3nceismyPassword)
**Run your passwords through a Strength CheckerIf its a strong password use it! Do not use personal info like birthdate , phone numberAvoid easy to guess sequencesExample: abcdefg , 1234567
**Microsoft offers a free password Strength Checker.You can access it using this link.https://www.microsoft.com/security/pc-security/password-checker.aspx
Think of a phrase you can rememberExample :I Met Danish at Fuchun Secondary in 2010PASSWORD :ImDaFsI2010Never share passwords to anyone even if you trust the person.A friend can become an ex-friendYour friend might not be as careful as you are
VIRUS SCANNING SOFTWAREViruses **It Corrupt or delete data on your computer
*Example : Use your e-mail program to spread itself to other computers. * Erases everything on your hard disk.
Designed to spread from one computer to another & interfere with computer operation
Can be disguised as attachments of images , audio & video files
Virus IndicationsFiles have strange names than the normal
Programs getting corrupted without any reasons
Program takes longer time to load than the normal
Victim will not be able to open some programs
Worms Uses computer networks and security holes to replicate itself.Scans for another machine that has a specific security hole & copies itselfUsed up computer processing time and network bandwidth during replicationCarry payloads that do considerable damage
Trojan Horse A destructive program that masquerades as a benign applicationProgram that claims to rid your computer of virusesInstead introduces viruses onto your computer If executed, computer system will be damaged
Purpose & Uses A Trojan may give a Hacker a remote access to a targeted computer computer system. Operations that could be performed by a targeted computer system may include:Crashing the computerElectronic money theftData Theft ( e.g retrieving passwords or credit card information)Modification or deletion of files
Ways how your Storage device can be infected by themWhen its host is taken to the uninfected computer* For instance by a user sending it over Internet Network
By a removable medium such asUSB driveCDFloppy Disk
USB drive spreads virus on machines with Auto-Run type feature enabled.
**Thumb drives aren't the only culprits
any device that plugs into a USB portGadgets likeLightsFansSpeakers..etc
Type of Security Measures
Data BackupNeeded to backup all data & application in the computerData can be recovered in case of an emergency
Do not open any unknown email filesDo not accept files from strangersDo not visit strange websitesDo not bring in disks from outside
Protects networks resources from intrusion by other users
Gives you control over the data on computer
FIREWALL
Restricts information that comes to your computer from other computer
Defence against programs that try to connect without invitation
19
Ways To Prevent or Avoid Getting Viruses Avoid letting strangers insert their USB Drive to your computerDo not download stuff from websites that cant be trustedLook for feedback from users before downloading anything from websites.
**Antivirus Software: detects , prevents and takes action to disarm or remove Malicious Software Programs(Viruses , Worms etc.)
Its FeaturesAward Winning Anti Virus ProtectionOptimize Your PCs PerformanceParental Controls and Web Safety Tools
www.tec24x7.com/images/mcafee.png
sg.norton.com/antivirus/Keeps you safe when you surf , shop and bank onlineProtects you from social media scamsStops both todays and tomorrows online treatsBlocks infected and dangerous downloadshttp://upload.wikimedia.org/wikipedia/commons/6/6d/Norton_av_logo.png
http://images.techhive.com/images/article/2014/04/digital-warrior-fight-against-virus-computer-155895292-100264890-primary.idge.jpghttp://i.kinja-img.com/gawker-media/image/upload/s--bhUOQ4Rr--/18ixia2sacv8njpg.jpgPictures linksVideoshttps://www.youtube.com/watch?v=hYyWgPXfx9Uwww.tec24x7.com/images/mcafee.pngINFORMATION
www.tranquilnet.com/uploads/tranquilnet-The-Danger-of-Contracting-Computer-Viruses-blog.jpghttp://theitbros.com/wp-content/uploads/2013/03/FBI-computer-virus.pngwww.threattracksecurity.com/it-blog/wp-content/uploads/2013/07/password-security.pngcore0.staticworld.net/images/article/2013/01/password_580-100022344-large.jpgheimdalsecurity.com/blog/security-experts-roundupThank Youcomputersoftwarereview.com/wp-content/uploads/2014/09/best-free-antivirus10.jpg