1 / 21

By Steven Bertke

PC Security. By Steven Bertke. Contents. Physical protection and Simple measures Passwords Firewalls Anti-Virus, Spyware and Malware Web browsers Email Patches Wireless Encryption Software. Physical Protection. Laptops: Multi-Purpose Hard-Shell Backpack Tracking software

iolana
Télécharger la présentation

By Steven Bertke

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PC Security By Steven Bertke

  2. Contents • Physical protection and Simple measures • Passwords • Firewalls • Anti-Virus, Spyware and Malware • Web browsers • Email • Patches • Wireless • Encryption Software

  3. Physical Protection • Laptops: • Multi-Purpose Hard-Shell Backpack • Tracking software • STOP Security plate • Desktops: • Lock your computer, i.e. ctrl+alt+del -> lock • Lock the door • Password protect everything • Password protected screensaver

  4. Passwords • Things not to do: • Don’t choose a simple password like your pets name 123 • Don’t include your name or anyone in your families name • Don’t include your birthday • Don’t use common words • Don’t keep the same password for a long period of time • Don’t use the same password for every single thing that requires one.

  5. Passwords • Over 7 characters • Upper/Lowercase + Digits e.g. AhJtKthr207 • Anny helped John take Kate to her recital • Add a date or number on the end e.g. 20th of the 7th • Make up words e.g. BloopShmear2000 or JuckNanYuck160 • Different language

  6. Passwords • The SUPR tests • The Strong test: Is the password as strong (meaning length and content) as the rules allow? • The Unique test: Is the password unique and unrelated to any of your other passwords? • The Practical test: Can you remember it without having to write it down? • The Recent test: Have you changed it recently? • Keep them guessing!

  7. Firewalls • What is a firewall? • Hardware = Router • Software = Windows XP ect • Differences • Up to you to decide!

  8. Anti-Virus ect • What is a virus? • What is spyware? • What is malware?

  9. Anti-Virus ect • Crucial for securing your PC! • Why?

  10. Anti-Virus ect • Anti-Virus examples: • AVG • Norton • Kapersky • BitDefender • Avast!

  11. Anti-Virus ect • Anti-Spyware examples: • Spybot Search and Destroy • SUPERAntiSpyware • Spy Sweeper • Ad-Aware Pro • Macafee Virus Scan and Anti Spyware • ..and many more. • Choose which ever you prefer • Update your AV(Anti-Virus) and Anti-Spyware!

  12. Web Browsers • Major weakness in computers defences • Choose a safe and reliable browser • Stay away from Internet Explorer! • Mozilla Firefox • Firefox add-ons • No-Script • WOT(Web of Trust) • ... and many more! • Google “Firefox add-ons”

  13. Email • Email Clients • Google Mail • Mozilla Thunderbird

  14. Email • KRESV tests; • The Know test: Is the email from someone that you know? • The Received test: Have you received email from this sender before? • The Expect test: Were you expecting email with an attachment from this sender? • The Sense test: Does the email from the sender make sense. Does the subject line and attachment add up? • The Virus test: Does this email contain a virus? Scan the email for a virus

  15. Patches • What is a patch? • Importance of fixing vulnerabilities • Update your OS • Web browsers • Anti-virus ect • Any internet dependant application • Do it regularly !

  16. Wireless • Protect your wireless network • Drive by hackers • Change your networks name • Wi-Fi network encryption • WEP = NO! • WPA2 ect = YES!! • Hide your SSID

  17. Wireless • Honeypots: • Probably to good to be true • If you must use them: • Don’t sign into your financial accounts! • Type as little private information as possible

  18. Encryption Software • What is it? • Examples of software • Windows Bitlocker/Bitlocker to go • Truecrypt • How can it help? • Windows Bitlocker; Good for USB storage devices • Truecrypt; Good for hidden volumes

  19. Encryption Software • Hidden volumes = hidden locked container • Create a file • Choose how big you want the “container” to be • Name the file • Give it a password • Put it where you want • Mount it with Truecrypt • Now becomes like an extra hard drive • Put stuff in it • Unmount it

  20. Conclusion Keep it safe!

  21. Questions

More Related