SlideShare a Scribd company logo
1 of 14
Understanding security and
safe computing
Protect your computer
Understanding security and
safe computing
If you connect to the Internet, allow other people to
use your computer, or share files with others,
you should take steps to protect your computer
from harm. Why? Because there are computer
criminals (sometimes called hackers) who attack
other people's computers. These people can
attack directly, by breaking into your computer
through the Internet and stealing your personal
information, or indirectly, by creating malicious
software to harm your computer.
Protect your computer
i. These are ways to help protect your computer against potential
security threats:
ii. Firewall. A firewall can help protect your computer by preventing
hackers or malicious software from gaining access to it.
iii. Windows Update. Windows can routinely check for updates for your
computer and install them automatically.
iv. Virus protection. Antivirus software can help protect your computer
against viruses, worms, and other security threats.
v. Spyware and other malware protection. Antispyware software can
help protect your computer from spyware and other potentially
unwanted software.
Use a firewall
A firewall is software or hardware that checks information coming from the
Internet or a network and then either turns it away or allows it to pass
through to your computer, depending on your firewall settings. In this way, a
firewall helps prevent hackers and malicious software from gaining access
to your computer.
Windows Firewall is built into Windows and is turned on automatically.
If you run a program such as an instant messaging program or a multiplayer
network game that needs to receive information from the Internet or a
network, the firewall asks if you want to block or unblock (allow) the
connection. If you choose to unblock the connection, Windows Firewall
creates an exception so that the firewall won't bother you when that program
needs to receive information in the future.
How a firewall works
firewall works
Use virus protection
 Viruses, worms, and Trojan horses are programs created
by hackers that use the Internet to infect vulnerable
computers. Viruses and worms can replicate themselves
from computer to computer, while Trojan horses enter a
computer by hiding inside an apparently legitimate
program, such as a screen saver. Destructive viruses,
worms, and Trojan horses can erase information from your
hard disk or completely disable your computer. Others
don't cause direct damage, but worsen your computer's
performance and stability.
 Antivirus programs scan e mail and other files on your‑
computer for viruses, worms, and Trojan horses. If one is
found, the antivirus program either quarantines (isolates) it
or deletes it entirely before it damages your computer and
files.
Use virus protection
 Windows does not have a built-in
antivirus program, but your computer
manufacturer might have installed one.
If not, go to the Windows 7 security
software providers website to find an
antivirus program.
 Because new viruses are identified
every day, it's important to select an
antivirus program with an automatic
update capability. When the antivirus
software is updated, it adds new
viruses to its list of viruses to check
for, helping to protect your computer
from new attacks. If the list of viruses
is out of date, your computer is
vulnerable to new threats. Updates
usually require an annual subscription
fee. Keep the subscription current to
receive regular updates.
Warning
If you do not use antivirus software, you expose your computer to damage from
malicious software. You also run the risk of spreading viruses to other
computers.
Use spyware protection
Spyware is software that can display advertisements,
collect information about you, or change settings on your
computer, generally without appropriately obtaining your
consent. For example, spyware can install unwanted
toolbars, links, or favorites in your web browser, change
your default home page, or display pop-up ads
frequently. Some spyware displays no symptoms that
you can detect, but it secretly collects sensitive
information, such as the websites you visit or the text
you type. Most spyware is installed through free software
that you download, but in some cases simply visiting a
website results in a spyware infection.
Use spyware protection
To help protect your computer from spyware, use an
antispyware program. This version of Windows has a
built-in antispyware program called Windows Defender,
which is turned on by default. Windows Defender alerts
you when spyware tries to install itself on your computer.
It also can scan your computer for existing spyware and
then remove it.
Because new spyware appears every day, Windows
Defender must be regularly updated to detect and guard
against the latest spyware threats. Windows Defender is
updated as needed whenever you update Windows. For
the highest level of protection
Update Windows automatically
Microsoft regularly offers important updates to Windows
that can help protect your computer against new viruses
and other security threats. To ensure that you receive
these updates as quickly as possible, turn on automatic
updating. That way, you don't have to worry that critical
fixes for Windows might be missing from your computer.
Updates are downloaded behind the scenes when you're
connected to the Internet. The updates are installed at
3:00 A.M. unless you specify a different time. If you turn
off your computer before then, you can install updates
before shutting down. Otherwise, Windows will install
them the next time you start your computer.
Update Windows
automatically
Thank You
Presented by MUKUL
Source : Microsoft Windows

More Related Content

What's hot

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

What's hot (20)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
internet security
internet securityinternet security
internet security
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
New internet security
New internet securityNew internet security
New internet security
 

Similar to Understanding security and safe computing

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your ComputerBikashPayeng
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 

Similar to Understanding security and safe computing (20)

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Virus
VirusVirus
Virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 

More from Mukul Kumar

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their UsesMukul Kumar
 
History of computers
History of computersHistory of computers
History of computersMukul Kumar
 
Computer communication
Computer communicationComputer communication
Computer communicationMukul Kumar
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elementsMukul Kumar
 
Wireless computing
Wireless computingWireless computing
Wireless computingMukul Kumar
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007Mukul Kumar
 
Computer generations
Computer generationsComputer generations
Computer generationsMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addictionMukul Kumar
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paintMukul Kumar
 
Parts of computer
Parts of computerParts of computer
Parts of computerMukul Kumar
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture CollectionMukul Kumar
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007 Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?Mukul Kumar
 
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib  (Golden Temple) By Sahabad Gurbani KeertanShri harmandir sahib  (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani KeertanMukul Kumar
 

More from Mukul Kumar (20)

Some Medicinal plants & Their Uses
Some Medicinal plants & Their UsesSome Medicinal plants & Their Uses
Some Medicinal plants & Their Uses
 
The solid state
The solid stateThe solid state
The solid state
 
Printers
PrintersPrinters
Printers
 
History of computers
History of computersHistory of computers
History of computers
 
Computer communication
Computer communicationComputer communication
Computer communication
 
General principles and processes of isolation of elements
General principles and processes of isolation of elementsGeneral principles and processes of isolation of elements
General principles and processes of isolation of elements
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
Microsoft office word 2007
Microsoft office word 2007Microsoft office word 2007
Microsoft office word 2007
 
Computer generations
Computer generationsComputer generations
Computer generations
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Getting started with paint
Getting started with paintGetting started with paint
Getting started with paint
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
E‑mail
E‑mailE‑mail
E‑mail
 
Golden Temple Picture Collection
Golden Temple Picture CollectionGolden Temple Picture Collection
Golden Temple Picture Collection
 
Introducing power point 2007
Introducing power point 2007 Introducing power point 2007
Introducing power point 2007
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 
What is direct X ?
What is direct X ?What is direct X ?
What is direct X ?
 
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib  (Golden Temple) By Sahabad Gurbani KeertanShri harmandir sahib  (Golden Temple) By Sahabad Gurbani Keertan
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Understanding security and safe computing

  • 1. Understanding security and safe computing Protect your computer
  • 2. Understanding security and safe computing If you connect to the Internet, allow other people to use your computer, or share files with others, you should take steps to protect your computer from harm. Why? Because there are computer criminals (sometimes called hackers) who attack other people's computers. These people can attack directly, by breaking into your computer through the Internet and stealing your personal information, or indirectly, by creating malicious software to harm your computer.
  • 3. Protect your computer i. These are ways to help protect your computer against potential security threats: ii. Firewall. A firewall can help protect your computer by preventing hackers or malicious software from gaining access to it. iii. Windows Update. Windows can routinely check for updates for your computer and install them automatically. iv. Virus protection. Antivirus software can help protect your computer against viruses, worms, and other security threats. v. Spyware and other malware protection. Antispyware software can help protect your computer from spyware and other potentially unwanted software.
  • 4. Use a firewall A firewall is software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings. In this way, a firewall helps prevent hackers and malicious software from gaining access to your computer. Windows Firewall is built into Windows and is turned on automatically. If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won't bother you when that program needs to receive information in the future.
  • 7. Use virus protection  Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from your hard disk or completely disable your computer. Others don't cause direct damage, but worsen your computer's performance and stability.  Antivirus programs scan e mail and other files on your‑ computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.
  • 8. Use virus protection  Windows does not have a built-in antivirus program, but your computer manufacturer might have installed one. If not, go to the Windows 7 security software providers website to find an antivirus program.  Because new viruses are identified every day, it's important to select an antivirus program with an automatic update capability. When the antivirus software is updated, it adds new viruses to its list of viruses to check for, helping to protect your computer from new attacks. If the list of viruses is out of date, your computer is vulnerable to new threats. Updates usually require an annual subscription fee. Keep the subscription current to receive regular updates.
  • 9. Warning If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.
  • 10. Use spyware protection Spyware is software that can display advertisements, collect information about you, or change settings on your computer, generally without appropriately obtaining your consent. For example, spyware can install unwanted toolbars, links, or favorites in your web browser, change your default home page, or display pop-up ads frequently. Some spyware displays no symptoms that you can detect, but it secretly collects sensitive information, such as the websites you visit or the text you type. Most spyware is installed through free software that you download, but in some cases simply visiting a website results in a spyware infection.
  • 11. Use spyware protection To help protect your computer from spyware, use an antispyware program. This version of Windows has a built-in antispyware program called Windows Defender, which is turned on by default. Windows Defender alerts you when spyware tries to install itself on your computer. It also can scan your computer for existing spyware and then remove it. Because new spyware appears every day, Windows Defender must be regularly updated to detect and guard against the latest spyware threats. Windows Defender is updated as needed whenever you update Windows. For the highest level of protection
  • 12. Update Windows automatically Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating. That way, you don't have to worry that critical fixes for Windows might be missing from your computer. Updates are downloaded behind the scenes when you're connected to the Internet. The updates are installed at 3:00 A.M. unless you specify a different time. If you turn off your computer before then, you can install updates before shutting down. Otherwise, Windows will install them the next time you start your computer.
  • 14. Thank You Presented by MUKUL Source : Microsoft Windows