1 / 10

Safe Computing Practices

Safe Computing Practices. Outline. Objective Safe Computing Defined Safe Computing Methods Summary List of References. Objective. To provide familiarity with the concept of safe computing and some of the methods employed. Safe Computing Definition.

ronnie
Télécharger la présentation

Safe Computing Practices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe Computing Practices

  2. Outline • Objective • Safe Computing Defined • Safe Computing Methods • Summary • List of References

  3. Objective • To provide familiarity with the concept of safe computing and some of the methods employed.

  4. Safe Computing Definition • Common practices and procedures to improve the chances of avoiding information security problems. • Following these suggestions will reduce the probability that you will become infected, have your system broken into, have important information stolen, lose critical information, etc.

  5. Safe Computing Methods • Keep your operating system and application programs patched • Install, use and update anti-virus and anti-spyware software • Use a strong password • When using public facilities, be sure to log out of applications • Use two or more email accounts • Use one for family/friends • Another for other uses; can be changed if/when start to receive spam • Be cautious when reading email with attachments and downloading files from untrusted locations • Don’t open unexpected attachments http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/

  6. Safe Computing Methods • Be very careful with any private data • Social Security Numbers, Account Numbers, Passwords, etc. • Don’t put personal information on web sites • Watch out for phishing or social engineering scams • Install and use a firewall • Back up your system frequently • Avoid filesharing programs • Log in as User not Administrator • Log out and use a screen saver password • Disable Java, JavaScript, VBScript and ActiveX if possible http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/

  7. Safe Computing Methods • Be careful when shopping on-line • Look for a secure connection • Know who you are buying from • Be careful what you post on social networking sites • Data on the Internet can last forever • Personal information is harvested from places like Facebook • Review the privacy policy

  8. Summary • We have introduced the concept of safe computing for information systems and described some of the methods employed.

  9. List of References • http://en.wikipedia.org/wiki/Physical_security • http://safecomputing.uchicago.edu/practices/ • http://www.cert.org/homeusers/HomeComputerSecurity/ • http://www.microsoft.com/protect/default.mspx • http://www.techspot.com/tweaks/windows_security/ • http://www.nsa.gov/snac/support/I33-011R-2006.pdf • http://www.internetsecurityguide.com/ • http://www.itsecurity.com/features/20-minute-guide-pc-security-021307/

  10. List of References • http://www.schneier.com/blog/archives/2004/12/safe_personal_c.html • http://users.iafrica.com/c/cq/cquirke/safe2000.htm • http://us.trendmicro.com/us/threats/home-user/preventing-intrusions/safe-computing-guide/Windows-xp/index.html CyberPatriot wants to thank and acknowledge the CyberWatch program which developed the original version of these slides and who has graciously allowed their use for training in this competition.

More Related