Best practices of computer security
Upcoming SlideShare
Loading in...5
×
 

Best practices of computer security

on

  • 1,666 views

Sample of a webinar about computer threats and defense.

Sample of a webinar about computer threats and defense.
http://www.qabiria.com/index.php/en/courses.html

Statistics

Views

Total Views
1,666
Views on SlideShare
1,650
Embed Views
16

Actions

Likes
0
Downloads
53
Comments
0

2 Embeds 16

http://www.slideshare.net 9
http://www.qabiria.com 7

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Best practices of computer security Best practices of computer security Presentation Transcript

  • Best practices of computer security a webinar by Qabiria Studio S.L.N.E. http://www.qabiria.com www.qabiria.com
  • Contents  Why security is so important?  What are the real threats?  What can you do as a defense? Active and passive security Data backup www.qabiria.com
  • How safe are you?  Users’ awareness  Law vacuum  Identify vulnerabilities  Organize defense  Maintain a responsible behaviour www.qabiria.com
  • What is at risk?  Our time  Our money  Our data  Our privacy  Our identity www.qabiria.com
  • Vulnerabilities  Where do attacks come from?  How do crime works online?  Vandalism  Microsoft’s responsibilities www.qabiria.com
  • Women and children first…  Alternatives to Windows  Risks of piracy  Advantages of open-source solutions  Free support  Readiness  Peer review guaranteed  User- instead of profit-oriented solutions www.qabiria.com
  • Better safe than sorry  Strenghten the weakest link  Don’t be an easy mark  Never lower your guard  Verify the authenticity of instructions before following them www.qabiria.com
  • Authentification  The safe password doesn’t exist  10 characters = ~600.000.000.000 attempts  Time + brute force = any password  Chocolate bar = 70%+ of passwords (source: BBC)  The risk of keylogger  Password recovery www.qabiria.com
  • External factors  Power surges  Lightnings  Negligence  Theft/fire  Interferences www.qabiria.com
  • Thank you For further information: http://www.qabiria.com All our training courses: http://www.qabiria.com/index.php/en/courses.html www.qabiria.com