Safe Computing Practices - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Safe Computing Practices

Description:

Common practices and procedures to improve the chances of ... Following these suggestions will reduce the probability that ... a screen saver password ... – PowerPoint PPT presentation

Number of Views:657
Avg rating:3.0/5.0
Slides: 11
Provided by: admi818
Category:

less

Transcript and Presenter's Notes

Title: Safe Computing Practices


1
Safe Computing Practices
2
Outline
  • Objective
  • Safe Computing Defined
  • Safe Computing Methods
  • Summary
  • List of References

3
Objective
  • To provide familiarity with the concept of safe
    computing and some of the methods employed.

4
Safe Computing Definition
  • Common practices and procedures to improve the
    chances of avoiding information security
    problems.
  • Following these suggestions will reduce the
    probability that you will become infected, have
    your system broken into, have important
    information stolen, lose critical information,
    etc.

5
Safe Computing Methods
  • Keep your operating system and application
    programs patched
  • Install, use and update anti-virus and
    anti-spyware software
  • Use a strong password
  • When using public facilities, be sure to log out
    of applications
  • Use two or more email accounts
  • Use one for family/friends
  • Another for other uses can be changed if/when
    start to receive spam
  • Be cautious when reading email with attachments
    and downloading files from untrusted locations
  • Dont open unexpected attachments

http//www.claymania.com/safe-hex.html http//safe
computing.uchicago.edu/practices/
6
Safe Computing Methods
  • Be very careful with any private data
  • Social Security Numbers, Account Numbers,
    Passwords, etc.
  • Dont put personal information on web sites
  • Watch out for phishing or social engineering
    scams
  • Install and use a firewall
  • Back up your system frequently
  • Avoid filesharing programs
  • Log in as User not Administrator
  • Log out and use a screen saver password
  • Disable Java, JavaScript, VBScript and ActiveX if
    possible

http//www.claymania.com/safe-hex.html http//safe
computing.uchicago.edu/practices/
7
Safe Computing Methods
  • Be careful when shopping on-line
  • Look for a secure connection
  • Know who you are buying from
  • Be careful what you post on social networking
    sites
  • Data on the Internet can last forever
  • Personal information is harvested from places
    like Facebook
  • Review the privacy policy

8
Summary
  • We have introduced the concept of safe computing
    for information systems and described some of the
    methods employed.

9
List of References
  • http//en.wikipedia.org/wiki/Physical_security
  • http//safecomputing.uchicago.edu/practices/
  • http//www.cert.org/homeusers/HomeComputerSecurity
    /
  • http//www.microsoft.com/protect/default.mspx
  • http//www.techspot.com/tweaks/windows_security/
  • http//www.nsa.gov/snac/support/I33-011R-2006.pdf
  • http//www.internetsecurityguide.com/
  • http//www.itsecurity.com/features/20-minute-guide
    -pc-security-021307/

10
List of References
  • http//www.schneier.com/blog/archives/2004/12/safe
    _personal_c.html
  • http//users.iafrica.com/c/cq/cquirke/safe2000.htm
  • http//us.trendmicro.com/us/threats/home-user/prev
    enting-intrusions/safe-computing-guide/Windows-xp/
    index.html

CyberPatriot wants to thank and acknowledge the
CyberWatch program which developed the original
version of these slides and who has graciously
allowed their use for training in this
competition.
Write a Comment
User Comments (0)
About PowerShow.com