1 / 56

KEEPING SAFE

KEEPING SAFE. LET’S TALK ABOUT SECURITY!. YOU ARE UNDER ATTACK! People who want your money People who want your information People who want to use your computer People who want to mess up your computer just for fun. SHALL WE PANIC NOW OR LATER?. We are NOT going to panic at all

shadi
Télécharger la présentation

KEEPING SAFE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. KEEPING SAFE

  2. LET’S TALK ABOUT SECURITY! • YOU ARE UNDER ATTACK! • People who want your money • People who want your information • People who want to use your computer • People who want to mess up your computer just for fun

  3. SHALL WE PANIC NOW OR LATER? • We are NOT going to panic at all • We are going to understand what can happen • We are going to learn how easy it is to defend ourselves and how little extra it need cost • TOTAL SECURITY IS IMPOSSIBLE BUT WE CAN GET VERY CLOSE

  4. THE AREAS WE HAVE TO LOOK AT • Passwords and ID’s • Information Back-Up [Safety Copy] • Firewalls • Anti-Virus • Anti-Malware [MALicious softWARE] • Scareware & false Pop-Ups • False Web Sites • Wireless connections

  5. PASSWORDS AND I.D.’S • As you use the computer for different things you may need to have several passwords and I.D’s [I.D. may be called different things like LogIn Name, Account Name but will almost always be used with a password] • They prevent other people from using your computer or pretending they are you – probably not for your good

  6. PASSWORDS AND I.D.’S • Your first protection – when your computer is starting up - prevents people from physically using your computer unless you want them to – this is password only • Can stop others using anything on your computer or stop them from using critical parts • BUT THEY ARE ONLY GOOD IF YOU DO IT RIGHT

  7. A GOOD PASSWORD • Should not be obvious – spouses name, birthday etc. • Mixed letters and numbers – harder to break • Longer is better than shorter • Easy to remember

  8. PASSWORDS AND I.D.’S • Never tell anyone else your password & I.D. • Best to never write down your passwords and I.D.’s – just remember them • If you have a lot [I have 14] remembering them all can be hard. It’s not good to have them all the same – if someone gets one somehow - then you are in trouble for everything • If you do write them down you MUST keep them hidden – NOT near the computer

  9. PASSWORDS AND I.D.’S • Many places you visit on the web [Banks, E-mail] will need both I.D. and password and some will ask if you would like them to remember these for next time • NEVER do this if using someone else’s computer – the next person can become you • On your own computer it may be OK to have the I.D. remembered but NEVER passwords

  10. AN EXCEPTION • For most e-mail systems, your I.D. is the same as your e-mail address. To use e-mail, other people have to know your address – so in this case you have to give it to people.

  11. WRITTEN DOWN? • Why not use a password protected file? • Double layer of security • Keep it in two places

  12. HOW TO DO IT • Open a WORD document • List your passwords – and log-ins. Could keep your Product Key Codes here too • Create a password – use something you will remember BUT not something obvious like your birthday

  13. PASSWORDS & I.D.’S • Click Tools - Options

  14. PASSWORDS & I.D.’S • On the Security Tab type “password to open” and click OK

  15. PASSWORDS & I.D.’S • You will be asked to enter it again – click OK when you have done it • Then ‘save as” in the normal way

  16. PASSWORDS & I.D.’S • Suggest to save in “My Documents” • Then save it on a spare flash drive also – you keep this safe as we shall see later when talking about physical security

  17. INFORMATION BACK-UP • You can lose all the information in your computer due to: • Fire • Theft • Damage to the storage – could be a faulty hard drive, a lost or damaged flash drive or it could be due to a serious Virus infection

  18. INFORMATION BACK-UP • Much of what is stored on your computer – Operating System & Programs can be recovered – although it may take time and need expert help • Things you created yourself can NOT be recovered if the worst happens UNLESS you have a copy – this is called BACK-UP

  19. LET’S KEEP IT SIMPLE • There are ways to back up everything • Programs like Macrium Reflect [free] can create a complete “mirror image” of your hard drive [s] – see www.macrium.com • You will need a back-up drive at least as large as the one in your computer – an extra cost • What this does do is to save time and money if you have a disaster. This may not be a big deal for people who do not depend on their computer

  20. BASIC BACK UP • You can keep things simple be storing all your work in the special place set up by Windows called “My Documents” • You can then back up this place to a Flash Drive

  21. BASIC BACK UP • If you do this, you will need a flash drive that has enough storage. An 4Gb drive will be enough for most people – $10 - $12. • For most people, making a back up once a week is enough although people who use a computer a lot may do it each day

  22. HOW IS IT DONE? • Back up is done by making a copy of what is stored in the computer on a separate device that can be kept away from the computer • This device should be hidden • The best thing is to keep it in a fire-proof box – these can be bought for as little as $25

  23. HOW IS IT DONE? • The easiest way is to use a program which comes with all versions of Windows called “Windows Explorer” • Be sure your Flash Drive is plugged in • Good idea to name it

  24. STARTING WINDOWS EXPLORER • All these illustrations are from Windows 7 [Windows Vista will look the same] • Remember that if you are using XP, it will look a little different

  25. STARTING WINDOWS EXPLORER

  26. Make sure you can see both the “from” [Documents/My Documents] and the “to” – the flash drive

  27. LET’S DO IT! • We use “Drag and Drop • ONE BIG DIFFERENCE – WE USE THE RIGHT BUTTON

  28. REMEMBER – USE THE RIGHT BUTTON

  29. WHAT NEXT • When you release the Right button you will see this • If you click “Move here” you will still only have your work in one place • Use “Copy here”

  30. FIREWALL • This is a program inside your computer that acts like a wall round a castle – it tries to keep unwanted strangers out. You don’t need to understand it. • All modern Windows Operating Systems have a good Firewall built in. So no problem except:- • When installing, some anti-virus and anti-malware programs will ask if you want to install their Firewall. Say NO – if you have two, they fight each other and ignore real problems

  31. ANTI-VIRUS & ANTI-MALWAREViruses, Trojans & Worms • Don’t worry about the meanings of these names – they are all bad things that try to invade your computer from outside • They can arrive hidden in an e-mail or be waiting on a web site you visit • The most dangerous web sites are social networking sites [Facebook, YouTube, Twitter] & Celebrity Sites

  32. ANTI-VIRUS & ANTI-MALWAREViruses, Trojans & Worms • THE DANGER EVERYONE FORGETS ABOUT • The friend who has no protection on his/her computer but brings stuff to your computer on a flash drive or CD/DVD for you to use

  33. BASIC FACTS • Many people will say that a good anti-virus software [program] is all you need • Experience shows that both anti-virus and anti-malware are needed – as they look after different things • Many computers have anti-virus installed when they are bought

  34. MORE BASIC FACTS • This anti-virus software is usually only a “trial” version – after a few months you will have to pay to keep it up to date – usually every year • You must never have more than one anti-virus program running – if you do, they fight and let the bad things in • Some free software only runs in a way that helps AFTER the bad thing arrives. Sometimes this is enough BUT often not!

  35. WHAT SHOULD I GET? • For anti-virus, Microsoft Security Essentials is suggested. THIS IS FREE • For anti-malware MalwareBytes is suggested. This costs about $40. There is a free version but, as mentioned, it only works AFTER the problem arrives

  36. IMPORTANT • Neither of these programs can be bought at a store – they have to be downloaded from the Internet. • If you are not sure, get experienced help: • To download • To install properly

  37. IMPORTANT • If you are downloading a replacement ant-virus you need to follow these steps: • Go on-line and download the new software BUT choose the “save” option – not “run” • You need to un-install the old anti-virus. Go to the manufacturer’s web site and check for an un-install utility – add/remove software may not do it. Again – “save” not “run”

  38. IMPORTANT • DISCONNECT FROM THE INTERNET – YOU ARE VUNERABLE DURING THE NEXT STEP. • Un-install the old a/v • Install the new a/v and set it up • Re-connect to the Internet

  39. FRIEND OR ENEMY? • A friend wants to load something on your computer from a flash drive or other media – but you’re not sure that they know the dangers – it may be compromised • There is an easy way to check before you load

  40. STEPS • Start Windows Explorer • Insert the “visiting” media • Locate the device concerned • Then right click on it

  41. This will give you the chance to scan the item with any or all of the “protection” software you have installed

  42. SCAREWARE & FALSE POP-UPS • These are messages that “pop-up” on your screen • They usually are about one of two things: • Telling you that your computer has a problem – usually that it has viruses - and to “click here” to fix it • Telling you there is an update available for you computer and to “click here” to download it

  43. HOW DO I KNOW IT’S NOT GENUINE? • The most common way used to get your attention is to make it look like it’s a Windows message – Windows DOESN’T do this! • If it seems to come from a program you didn’t know you had

  44. WHAT DOES SCAREWARE LOOK LIKE? • Look like genuine messages • Made to “scare” you into doing something • Doing anything with these will probably make things worse • Often ask you to pay as well – you get NOTHING!

  45. WHAT DO I DO? • Click the red X at the top right • NEVER click anything else – sometimes you are offered YES or NO choices [or ACCEPT & CANCEL] – both are really YES! • If there is no red X or it doesn’t close the message – SHUT OFF THE COMPUTER AND GET HELP • If it keeps coming back – GET HELP

  46. FALSE POP-UPS • Usually tell you that an update is available • Often use the name of a program [Adobe is an example] that is found on most computers • May be genuine – a number of real programs use this way of telling you that updates are available

  47. WHAT DO I DO? • Close with the X – if it won’t close, again switch off and get help • If it comes from a program you don’t have – ignore it • If you think it might be real – close the pop-up and go to the web site for that program. You can get the update from there – get help if you are not sure how

  48. FALSE WEB SITES • When you use a search engine you get many choices of where to go – in the example below where we are looking to find a download for the new Microsoft Internet Explorer 9

  49. LET’S LOOK A LITTLE CLOSER

  50. BUT ARE THEY?

More Related