user wareness
DESCRIPTION
User awarenessTRANSCRIPT
1 / 14
Computer Security
2 / 14
Index• Introduction to computer security issues
– Common Security Threats
• Operating System and Internet security– ActiveX – Tools for Internet Security
• Wireless security • Email Security • Social networking sites and chat groups • Q&A
3 / 14
Introduction to computer security issues
What is Computer Security?
Why should you care?
4 / 14
Common Security Threats
Malware
Worm
Spyware
AdwarePhishing
Botnet
ZombiesTrojan
Virus
5 / 14
• Install and use Anti-Virus programs• Keep your system patched• Use care when reading emails with attachments• Install and use a Firewall Program• Make backups of important files and folders.• Use strong passwords• Use care when downloading and installing programs• Install and use a File Encryption Program and Access
Controls• Install and use a Hardware Firewall
– What is the Hardware Firewall?– How does it function?
Internet Security
6 / 14
• Routers• Anti-virus programs• Firewalls• Anti-spyware• Browser choice
Tools for Internet Security
7 / 14
With the emergence of wireless networks as a preferred mode of connectivity to the server, Wireless Security has assumed greater significance in the recent times.
Wireless SecurityWireless security Risks
Even mobiles are attacked by virus today
8 / 14
Best Practices in Wireless Security
Encryption techniques
Regular network security audits
Good security measurements like wired network
Don't fall victim to virus hoaxes. These hoaxes spread needless alarm and
may even tell you to delete perfectly legitimate files.
9 / 14
What are the dangers of using email?
How Do I protect myself from Fraudulent Emails?
Tools to protect oneself against security attack by email
Email Security
.exe.bat.pif.vbs.scr
.com
Be careful while opening an Attachment of this file extension
Don’t open any e-mail attachments that you are not sure about, even if it looks like it came from a friend.
10 / 14
What are the security issues on Social networking sites?
– Limitation of Personal Information – Privacy setting on the website
– The threat of social engineering – The Defamation Threat – Identity Theft
How to protect oneself from security risks at social networking sites
Best practices (security related) at social networking sites and online chat groups rooms.
Social networking sites and chat groups
11 / 14
ATHLON Computer Security
Q & A
© ATHLON car lease 2008
12 / 14