120 likes | 249 Vues
Learn how to use your computer and the internet safely with essential tips on preventing malware infections. Understand the different types of malware, including viruses, worms, Trojans, spyware, and adware. Discover best practices for browsing safely, setting up your browser security, and protecting your personal information against phishing and identity theft. Explore basic PC protection methods such as strong passwords, antivirus software, firewalls, and spyware removal tools. Ensure your online experience is secure and your data is safe.
E N D
Computer security • Malware • Virus: a program that copies itself and infect a computer without permission or knowledge of the user. • Worm: a self-replicating computer program. It uses a network to send copies of itself to other computers on the network. Unlike a virus, it does not need to attach itself to an existing program. • Trojan: a program appears to perform a desirable function. • Rootkit: a computer virus which consists of a program to take fundamental control (in Unix terms "root" access, in Windows "Administrator" access) of a computer system. • Spyware: intercept or take partial control over the user's interaction with the computer; can collect various types of personal information, such as Internet surfing habit, sites that have been visited. • Adware: automatically plays, displays, or downloads advertisements. • Crimeware: a class of malware designed specifically to automate financial crime
Internet research and security • Browse Internet safely • Set your browser security to medium/medium-high • Add safe sites to trusted sites • Read e-mail messages in plain text • Block pop-up windows in your browser • Secure sites; Secure Data; online transaction; • Instant messenger, chatting
Email • Phishing (example) • Spam • MSU mail Spam Filter Process • Outlook spam filter setting • Virus • Free Anti virus software: AVG
Phishing examplesHow can we tell they are fake? • Appear to come from your bank, or company your know (such as Microsoft, or MSU mail team) • Spelling Mistakes • Incorrect Graphics • Ask for personal Information • The URL
Identity theft / Identity fraud • someone wrongfully obtains and uses another person's personal data • shoulder surfing • dumpster diving (preapproved" credit cards ) • Phishing emails • Internet traffic / network breach • Watch out when use/provide – be stingy (need to know): SSN, birth date, address, credit card number..
IE 7 popup blocker IE 7phishing filter
Basic PC protection • Strong password • Virus Scanning program features (Norton or NOD32); AVG for home use • Firewalls (turn on Windows built-in firewall) • Spyware & Adware removal (download and install “Windows Defender”) • Set the Internet browser security medium-high
Basic maintenance • “My computer does not work” (Be specific when report error; copy the error message). • Hard disk de-fragmentation • PC Restore and Recover • Restore PC performance • ***Useful free tools from Microsoft: Windows Sysinternals • ***Start application list; RUN MSCONFIG • Use AutoRun to see what will start automatically
Things to consider when you purchase a computer • CPU speed • Hard Drive size • Memory/RAM • DVD Drive • Video Card / web cam • External Connectors (USB 2.0, SATA) • College recommended vendor: Dell, IBM/Lenovo
Things to consider when you purchase a computer • Who is going to use it? • What is the priority? • Weight • Screen size • CPU power • Pricing • Timeline
Resources • College computer support website • MSU Help desk – Computer center RM120 • MSU computer store