Computing Ethics
Towards Safe Computing
       By: Dheeraj Mehrotra
 www.computerscienceexpertise.com

             comput...
computerscienceexpertise.com
  Towards Quality IT Literacy
Ensure you have the latest
 updates. Install updates and
security patches on all servers,
   desktop and laptop PCs.



  ...
Reduce the risk of viruses.
 There are numerous things you
 can do to protect your computer
and your network against virus...
Use Windows Security Centre
to manage your settings. Get a
    clear picture of the security
  settings on your PC using t...
Download internet files from
 trusted sources only. If you're
  unsure if the files you want to
   download are safe, cons...
Use password encryption to protect Office
  files. Improved encryption technology has
strengthened password security in Wo...
Clean your hard drive before you discard a
 PC. If you're getting a new PC or notebook and
   your old one is being discar...
Use a firewall. If your company
   uses always-on broadband to
  connect to the internet, install a
firewall as a basic li...
Never surf the web from a
server. As the command centre
for your entire network, a server
typically stores critical busine...
Be smart about passwords.
  Always use strong passwords
that are at least eight characters
 long and a combination of lowe...
Create secure, original
  passwords. Creating unique
 passwords is one of the easiest
  ways for consumers to ensure
their...
Avoid deceptive attempts to trick
 you into revealing credit card
   numbers, bank accounts,
 passwords or other personal
...
To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
  any doubt, call the ins...
Avoid Phishing
                    What is phishing?
Phishing means sending an e-mail that falsely claims to
   be from a ...
Practice basic e-mail and
 downloading quot;street smarts.quot;
Most viruses are transmitted as
     e-mail attachments.

...
Avoid opening e-mail
attachments that contain quot;.vbs,quot;
     quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file
...
Be wary of e-mail messages that
   ask for personal or financial
information such as user names
   and passwords, credit c...
Do not click any links inside an e-
   mail that is suspected to be
 spoofed. Instead, go directly to
the valid company's ...
Ensure that any Web site visited
  is secure when submitting
 sensitive information such as
      credit card numbers



 ...
Knowledge is still the best
protection from getting scammed.
It is important to educate oneself
         on Internet fraud...
Ensure that any Web site visited
  is secure when submitting
 sensitive information such as
      credit card numbers



 ...
Visit websites by typing the URL
  directly into the address bar.
 Make sure any site you reveal
information to uses encry...
Check credit card and bank
 statements routinely. Notify
authorities if you suspect any
   abuses of your personal
       ...
To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
  any doubt, call the ins...
Keep your passwords strong,
and keep them in your head.




        computerscienceexpertise.com
          Towards Quality...
BACK UP THE HARD DRIVE
REGULARLY: Backing up files
 will not prevent exposure or
damage from a virus but it can
 minimize ...
INSTALL ANTI VIRUS
SOFTWARE: Make sure that you
have antivirus software installed
    and that it is up to date.



      ...
Don't share your password
with anyone, and don't write it
down - the only secure place
 for your password is in your
     ...
USE GOOD PASSWORDS: Use
Good Passwords. Do NOT allow
a password to be blank or empty.




          computerscienceexperti...
SCAN EVERY FILE DOWNLOADED
   FROM THE INTERNET BEFORE
  USING OR OPENING IT: Another
 way computers are infected is from
...
BE WARY OF PUTTING YOUR
       DISK INTO OTHER
 COMPUTERS. If you use other
computers such as a colleague’s
computer, thes...
computerscienceexpertise.com
  Towards Quality IT Literacy
SCAN YOUR HARD DISK
REGULARLY FOR VIRUSES.




       computerscienceexpertise.com
         Towards Quality IT Literacy
Get anti-virus software. Use it.
     Keep it up to date.




          computerscienceexpertise.com
            Towards Q...
If you can't trust the source
you're downloading from, you
      can't trust the file.




         computerscienceexperti...
Don't leave a computer you're
 logged into unattended or
         unprotected.




         computerscienceexpertise.com
 ...
3.      When considering what services should
     be running on your system, here are a few
                    easy rule...
Oath by kids:
   I will not give out any personal information
  online without my parents' permission. This
includes my na...
Oath by kids:


  When using the Internet, I will
  always use a pretend name or
   nickname that doesn't reveal
    wheth...
Oath by kids:




   When creating a password, I will
      make one up that is hard to
       guess but easy for me to
  ...
Oath by kids:



 I will not respond to any message
  that makes me uncomfortable. I
    will show an adult right away.


...
Oath by kids:


  I will arrange to meet a friend I
 have made on the Internet ONLY
  if one of my parents has been
   inf...
Oath by kids:



 I will not send an insulting or rude
  message to anyone online. This
   is called quot;flamingquot; and...
Oath by kids:


  I will not open e-mail, files, links,
   pictures or games from people
    that I don't know or trust. I...
What you need to worry about:
Email frauds:
Emails that cheat you of huge sums of money by
offering fantastic overseas fin...
THINGS YOU NEED TO WORRY
ABOUT:
Social engineering: When people trick you
into revealing your password
Downloading files o...
Precautions you can take:

Email security:
Be careful where you post/submit
your email id on public forums.
Share it only ...
At a cyber café:

Never surf from a cyber café if you are keying in
any sensitive data. The computer may have a
program ru...
At home:


Most companies regularly release patches for security
holes in their software products. Always keep your
operat...
Better safe than sorry


If you stick to the above principle,
 you can avoid most of the online
              dangers.


 ...
• An Initiative by:
  – Dheeraj Mehrotra
     • www.computerscienceexpertise.com
     • (TOWARDS QUALITY IT LITERACY FOR A...
•
    Read a BLOG on QUALITY IN
    EDUCATION:
    http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/


    Visi...
Upcoming SlideShare
Loading in...5
×

Cyber Security

788

Published on

A must for all computer users. An initiative by computerscienceexpertiseDOTcom

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
788
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
97
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Security

  1. 1. Computing Ethics Towards Safe Computing By: Dheeraj Mehrotra www.computerscienceexpertise.com computerscienceexpertise.com Towards Quality IT Literacy
  2. 2. computerscienceexpertise.com Towards Quality IT Literacy
  3. 3. Ensure you have the latest updates. Install updates and security patches on all servers, desktop and laptop PCs. computerscienceexpertise.com Towards Quality IT Literacy
  4. 4. Reduce the risk of viruses. There are numerous things you can do to protect your computer and your network against viruses. Using anti-virus software and keeping it current is the first step, computerscienceexpertise.com Towards Quality IT Literacy
  5. 5. Use Windows Security Centre to manage your settings. Get a clear picture of the security settings on your PC using the single, unified view provided in the Windows Security Centre. computerscienceexpertise.com Towards Quality IT Literacy
  6. 6. Download internet files from trusted sources only. If you're unsure if the files you want to download are safe, consider downloading them to a disk separate from your hard drive, such as a CD or floppy. Then you can scan the files with your virus scanner. computerscienceexpertise.com Towards Quality IT Literacy
  7. 7. Use password encryption to protect Office files. Improved encryption technology has strengthened password security in Word 2003 and Excel 2003 and extends password encryption to PowerPoint 2003. Look under the Tools menu in each of these three programs to activate password protection. This is an effective way to restrict access to confidential business information. computerscienceexpertise.com Towards Quality IT Literacy
  8. 8. Clean your hard drive before you discard a PC. If you're getting a new PC or notebook and your old one is being discarded, be sure to remove any sensitive business or personal information before you let it go. This doesn't mean simply deleting files and emptying your Recycle Bin. Your options include reformatting the hard drive or acquiring software that wipes it clean. computerscienceexpertise.com Towards Quality IT Literacy
  9. 9. Use a firewall. If your company uses always-on broadband to connect to the internet, install a firewall as a basic line of defence against outside intruders. computerscienceexpertise.com Towards Quality IT Literacy
  10. 10. Never surf the web from a server. As the command centre for your entire network, a server typically stores critical business information. computerscienceexpertise.com Towards Quality IT Literacy
  11. 11. Be smart about passwords. Always use strong passwords that are at least eight characters long and a combination of lower and upper case letters, numbers and symbols. Don't use the same password repeatedly and make it a point to change your passwords frequently. computerscienceexpertise.com Towards Quality IT Literacy
  12. 12. Create secure, original passwords. Creating unique passwords is one of the easiest ways for consumers to ensure their privacy and security online. computerscienceexpertise.com Towards Quality IT Literacy
  13. 13. Avoid deceptive attempts to trick you into revealing credit card numbers, bank accounts, passwords or other personal information. computerscienceexpertise.com Towards Quality IT Literacy
  14. 14. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information. computerscienceexpertise.com Towards Quality IT Literacy
  15. 15. Avoid Phishing What is phishing? Phishing means sending an e-mail that falsely claims to be from a particular enterprise (like your bank) and asking for sensitive financial information. Phishing is sending out a 'bait' in the form of a spoofed e-mail that closely mimics most bank notifications. The fraudulent mail is socially engineered to convince recipients to divulge sensitive information such as credit card numbers, PIN, social security numbers and some such information as per the experts. computerscienceexpertise.com Towards Quality IT Literacy
  16. 16. Practice basic e-mail and downloading quot;street smarts.quot; Most viruses are transmitted as e-mail attachments. computerscienceexpertise.com Towards Quality IT Literacy
  17. 17. Avoid opening e-mail attachments that contain quot;.vbs,quot; quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file extensions. Files that end in these extensions are most likely to contain some sort of virus. computerscienceexpertise.com Towards Quality IT Literacy
  18. 18. Be wary of e-mail messages that ask for personal or financial information such as user names and passwords, credit card numbers, and other sensitive personal information, especially those that are alarming and upsetting in tone. computerscienceexpertise.com Towards Quality IT Literacy
  19. 19. Do not click any links inside an e- mail that is suspected to be spoofed. Instead, go directly to the valid company's site then log on from there or call the company directly. computerscienceexpertise.com Towards Quality IT Literacy
  20. 20. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers computerscienceexpertise.com Towards Quality IT Literacy
  21. 21. Knowledge is still the best protection from getting scammed. It is important to educate oneself on Internet fraud. computerscienceexpertise.com Towards Quality IT Literacy
  22. 22. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers computerscienceexpertise.com Towards Quality IT Literacy
  23. 23. Visit websites by typing the URL directly into the address bar. Make sure any site you reveal information to uses encryption. computerscienceexpertise.com Towards Quality IT Literacy
  24. 24. Check credit card and bank statements routinely. Notify authorities if you suspect any abuses of your personal information. computerscienceexpertise.com Towards Quality IT Literacy
  25. 25. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information. computerscienceexpertise.com Towards Quality IT Literacy
  26. 26. Keep your passwords strong, and keep them in your head. computerscienceexpertise.com Towards Quality IT Literacy
  27. 27. BACK UP THE HARD DRIVE REGULARLY: Backing up files will not prevent exposure or damage from a virus but it can minimize the consequences. computerscienceexpertise.com Towards Quality IT Literacy
  28. 28. INSTALL ANTI VIRUS SOFTWARE: Make sure that you have antivirus software installed and that it is up to date. computerscienceexpertise.com Towards Quality IT Literacy
  29. 29. Don't share your password with anyone, and don't write it down - the only secure place for your password is in your head. computerscienceexpertise.com Towards Quality IT Literacy
  30. 30. USE GOOD PASSWORDS: Use Good Passwords. Do NOT allow a password to be blank or empty. computerscienceexpertise.com Towards Quality IT Literacy
  31. 31. SCAN EVERY FILE DOWNLOADED FROM THE INTERNET BEFORE USING OR OPENING IT: Another way computers are infected is from files downloaded from the internet. If you scan every file every time immediately after it is downloaded, the risk of being infected is greatly reduced computerscienceexpertise.com Towards Quality IT Literacy
  32. 32. BE WARY OF PUTTING YOUR DISK INTO OTHER COMPUTERS. If you use other computers such as a colleague’s computer, these computers may not be protected. Make sure you scan any disk that has been in another computer as soon as you insert it into your computer. computerscienceexpertise.com Towards Quality IT Literacy
  33. 33. computerscienceexpertise.com Towards Quality IT Literacy
  34. 34. SCAN YOUR HARD DISK REGULARLY FOR VIRUSES. computerscienceexpertise.com Towards Quality IT Literacy
  35. 35. Get anti-virus software. Use it. Keep it up to date. computerscienceexpertise.com Towards Quality IT Literacy
  36. 36. If you can't trust the source you're downloading from, you can't trust the file. computerscienceexpertise.com Towards Quality IT Literacy
  37. 37. Don't leave a computer you're logged into unattended or unprotected. computerscienceexpertise.com Towards Quality IT Literacy
  38. 38. 3. When considering what services should be running on your system, here are a few easy rules of thumb: If you don't know what it is or what it does, don't turn it on. In most every case, if you find out later that you need it, you can go back and turn it on. If it's on, and you don't need it, turn it off. If it's off, and you don't need it, don't turn it on. computerscienceexpertise.com Towards Quality IT Literacy
  39. 39. Oath by kids: I will not give out any personal information online without my parents' permission. This includes my name, phone number, address, e- mail, location of my school, my parents' work address/ telephone numbers and credit card numbers, and my picture. This goes for anywhere on the Internet, including e-mail, chat rooms, newsgroups - even Web sites that promise me free stuff or prizes, or on Web pages that I make myself. computerscienceexpertise.com Towards Quality IT Literacy
  40. 40. Oath by kids: When using the Internet, I will always use a pretend name or nickname that doesn't reveal whether I'm a boy or a girl. computerscienceexpertise.com Towards Quality IT Literacy
  41. 41. Oath by kids: When creating a password, I will make one up that is hard to guess but easy for me to remember. To avoid having it stolen, I will never reveal it to anyone (except my parents) - not even my best friend. computerscienceexpertise.com Towards Quality IT Literacy
  42. 42. Oath by kids: I will not respond to any message that makes me uncomfortable. I will show an adult right away. computerscienceexpertise.com Towards Quality IT Literacy
  43. 43. Oath by kids: I will arrange to meet a friend I have made on the Internet ONLY if one of my parents has been informed and will be present. computerscienceexpertise.com Towards Quality IT Literacy
  44. 44. Oath by kids: I will not send an insulting or rude message to anyone online. This is called quot;flamingquot; and it is not good Netiquette. computerscienceexpertise.com Towards Quality IT Literacy
  45. 45. Oath by kids: I will not open e-mail, files, links, pictures or games from people that I don't know or trust. I will always ask an adult first. computerscienceexpertise.com Towards Quality IT Literacy
  46. 46. What you need to worry about: Email frauds: Emails that cheat you of huge sums of money by offering fantastic overseas financial schemes and promising great returns nasty or obscene emails People hacking into your account People publishing your personal details (name, photograph, telephone numbers) on dating or pornographic sites without your consent Identity theft: When people steal your personal information computerscienceexpertise.com Towards Quality IT Literacy
  47. 47. THINGS YOU NEED TO WORRY ABOUT: Social engineering: When people trick you into revealing your password Downloading files or attachments that may have Trojans (destructive programs that masquerade as benign applications) Clicking on links that can pick up your personal details. Losing money while shopping online computerscienceexpertise.com Towards Quality IT Literacy
  48. 48. Precautions you can take: Email security: Be careful where you post/submit your email id on public forums. Share it only with known people. Do not download attachments or files received through emails sent by unknown persons. computerscienceexpertise.com Towards Quality IT Literacy
  49. 49. At a cyber café: Never surf from a cyber café if you are keying in any sensitive data. The computer may have a program running in the background that is storing all your information. Be careful of inquisitive surfers around. Always logout of all your messengers and any mailbox you have open, before you leave. computerscienceexpertise.com Towards Quality IT Literacy
  50. 50. At home: Most companies regularly release patches for security holes in their software products. Always keep your operating systems and software you regularly use (like browsers, instant messengers, email programs, media players) updated by downloading these patches. Never click on links that say, 'download software' unless you are absolutely sure of the content. Never click on pop-ups that say, 'Click here for more information' computerscienceexpertise.com Towards Quality IT Literacy
  51. 51. Better safe than sorry If you stick to the above principle, you can avoid most of the online dangers. computerscienceexpertise.com Towards Quality IT Literacy
  52. 52. • An Initiative by: – Dheeraj Mehrotra • www.computerscienceexpertise.com • (TOWARDS QUALITY IT LITERACY FOR ALL) computerscienceexpertise.com Towards Quality IT Literacy
  53. 53. • Read a BLOG on QUALITY IN EDUCATION: http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/ Visit: www.computerscienceexpertise.com The Quality IT learning Portal for All computerscienceexpertise.com Towards Quality IT Literacy
  1. Gostou de algum slide específico?

    Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

×