Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

User wareness


Published on

User awareness

Published in: Technology
  • Be the first to comment

  • Be the first to like this

User wareness

  1. 1. Computer Security
  2. 2. Index <ul><li>Introduction to computer security issues </li></ul><ul><ul><li>Common Security Threats </li></ul></ul><ul><li>Operating System and Internet security </li></ul><ul><ul><li>ActiveX </li></ul></ul><ul><ul><li>Tools for Internet Security </li></ul></ul><ul><li>Wireless security </li></ul><ul><li>Email Security </li></ul><ul><li>Social networking sites and chat groups </li></ul><ul><li>Q&A </li></ul>
  3. 3. Introduction to computer security issues What is Computer Security? Why should you care?
  4. 4. Common Security Threats Malware Worm Spyware Adware Phishing Botnet Zombies Trojan Virus
  5. 5. <ul><li>Install and use Anti-Virus programs </li></ul><ul><li>Keep your system patched </li></ul><ul><li>Use care when reading emails with attachments </li></ul><ul><li>Install and use a Firewall Program </li></ul><ul><li>Make backups of important files and folders. </li></ul><ul><li>Use strong passwords </li></ul><ul><li>Use care when downloading and installing programs </li></ul><ul><li>Install and use a File Encryption Program and Access Controls </li></ul><ul><li>Install and use a Hardware Firewall </li></ul><ul><ul><li>What is the Hardware Firewall? </li></ul></ul><ul><ul><li>How does it function? </li></ul></ul>Internet Security
  6. 6. <ul><li>Routers </li></ul><ul><li>Anti-virus programs </li></ul><ul><li>Firewalls </li></ul><ul><li>Anti-spyware </li></ul><ul><li>Browser choice </li></ul>Tools for Internet Security
  7. 7. With the emergence of wireless networks as a preferred mode of connectivity to the server, Wireless Security has assumed greater significance in the recent times. Wireless Security Wireless security Risks Even mobiles are attacked by virus today
  8. 8. Best Practices in Wireless Security Encryption techniques Regular network security audits Good security measurements like wired network Don't fall victim to virus hoaxes. These hoaxes spread needless alarm and may even tell you to delete perfectly legitimate files.
  9. 9. What are the dangers of using email? How Do I protect myself from Fraudulent Emails? Tools to protect oneself against security attack by email Email Security .exe .bat .pif .vbs .scr .com Be careful while opening an Attachment of this file extension Don’t open any e-mail attachments that you are not sure about, even if it looks like it came from a friend.
  10. 10. <ul><li>What are the security issues on Social networking sites? </li></ul><ul><ul><ul><ul><li>Limitation of Personal Information </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Privacy setting on the website </li></ul></ul></ul></ul><ul><ul><ul><ul><li>The threat of social engineering </li></ul></ul></ul></ul><ul><ul><ul><ul><li>The Defamation Threat </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Identity Theft </li></ul></ul></ul></ul><ul><ul><li>How to protect oneself from security risks at social networking sites </li></ul></ul><ul><ul><li>Best practices (security related) at social networking sites and online chat groups rooms. </li></ul></ul>Social networking sites and chat groups
  11. 11. A THLON Computer Security <ul><li>Q & A </li></ul>© ATHLON car lease 2008