How to protect your computer Presenter : Adnan ILS English
Purpose of this Presentation <ul><li>To provide to you an overview of how to protect computers: </li></ul><ul><li>* Preven...
Preventive Maintenance <ul><li>Preventive maintenance can extend the life of the components, protect data, and improve com...
2  Disk Management   <ul><li>By regularly using error-checking and defragmentation programs and continually managing free ...
Security <ul><li>Types of attacks to computer security: </li></ul><ul><li>Physical:  </li></ul><ul><ul><li>Theft, damage, ...
Protecting Equipment <ul><li>Since stealing the whole PC is the easiest way to steal data, physical computer equipment mus...
Viruses, Worms, and Trojan Horses <ul><li>A computer  virus  is software code that is deliberately created by an attacker....
Web Security ActiveX , Java ,JavaScript <ul><ul><li>Adware  displays advertising, usually in a popup window. </li></ul></u...
Summary <ul><li>-  Regularly use the  Preventive Maintenance Techniques and the disk management tools. </li></ul><ul><li>-...
Q and A <ul><li>Thank you </li></ul>
Upcoming SlideShare
Loading in …5
×

How To Protect Your Computer

596 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
596
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
33
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

How To Protect Your Computer

  1. 1. How to protect your computer Presenter : Adnan ILS English
  2. 2. Purpose of this Presentation <ul><li>To provide to you an overview of how to protect computers: </li></ul><ul><li>* Preventive Maintenance Techniques </li></ul><ul><li>* Disk Management </li></ul><ul><li>* Security </li></ul>
  3. 3. Preventive Maintenance <ul><li>Preventive maintenance can extend the life of the components, protect data, and improve computer performance. </li></ul><ul><li>Preventive maintenance includes: </li></ul><ul><ul><li>Clean internal components. </li></ul></ul><ul><ul><li>Clean the case. </li></ul></ul><ul><ul><li>Inspect computer components </li></ul></ul>
  4. 4. 2 Disk Management <ul><li>By regularly using error-checking and defragmentation programs and continually managing free disk space you can maintain a healthy hard drives. </li></ul>
  5. 5. Security <ul><li>Types of attacks to computer security: </li></ul><ul><li>Physical: </li></ul><ul><ul><li>Theft, damage, or destruction to computer equipment. </li></ul></ul><ul><li>Data: </li></ul><ul><ul><li>Removal, corruption, denial of access, unauthorized access, or theft of information. </li></ul></ul>
  6. 6. Protecting Equipment <ul><li>Since stealing the whole PC is the easiest way to steal data, physical computer equipment must be secured. </li></ul>
  7. 7. Viruses, Worms, and Trojan Horses <ul><li>A computer virus is software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter or destroy information. </li></ul><ul><li>A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network. </li></ul><ul><li>A Trojan horse is technically a worm and is named for its method of getting past computer defenses by pretending to be something useful. </li></ul>
  8. 8. Web Security ActiveX , Java ,JavaScript <ul><ul><li>Adware displays advertising, usually in a popup window. </li></ul></ul><ul><ul><li>Grayware or malware is a file or program other than a virus that is potentially harmful. Many grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide attackers with access to personal information. </li></ul></ul><ul><ul><li>Spyware , a type of grayware, is distributed without any user intervention of knowledge. Spyware monitors computer activity then sends the information back to the organization responsible for launching the spyware. </li></ul></ul><ul><ul><li>Phishing is a form of social engineering where the attacker pretends to represent a legitimate outside organization. The attacker might ask for verification of information, such as a password or username, to supposedly prevent some terrible consequence from occurring. </li></ul></ul><ul><li>Spam is unsolicited email that can be used to send harmful links or deceptive content. </li></ul><ul><li>Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites. </li></ul><ul><li>Anti-virus software is designed to detect, disable, and remove before they infect a computer. Also an options in e-mail software, popup blockers, and common indications of spam to combat these. </li></ul>
  9. 9. Summary <ul><li>- Regularly use the Preventive Maintenance Techniques and the disk management tools. </li></ul><ul><li>- Use anti-virus software, options in e-mail software, popup blockers, and common indications of spam to combat these. </li></ul><ul><li>- Update your OS and anti-virus every day . </li></ul>
  10. 10. Q and A <ul><li>Thank you </li></ul>

×