Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Andrea Cucchiara BUA 581 – Cohort K January 11, 2010 Computer Security  Devices
<ul><li>A type of hardware or software device that protects against unauthorized computer access  </li></ul><ul><li>CIA – ...
<ul><li>The internet is a dangerous place  </li></ul><ul><li>Block intruders </li></ul><ul><li>Keep data safe </li></ul><u...
<ul><li>Firewalls  </li></ul><ul><li>Anti-virus software  </li></ul><ul><li>Anti-spyware/malware  </li></ul><ul><li>Logins...
Firewalls <ul><li>A barrier that protects your computer or network from unauthorized access </li></ul><ul><li>Entry throug...
Firewall Devices <ul><li>Hardware </li></ul><ul><ul><li>Wired, Wireless, or Broadband </li></ul></ul><ul><ul><li>Cisco, Mc...
Anti-Virus & Anti-Spyware Software <ul><li>Both Anti-Virus and Anti-Spyware use Heuristic Technology </li></ul><ul><li>Ant...
<ul><li>Anti-Virus </li></ul><ul><ul><li>Norton, McAfee, Symantec, Avira, Kaspersky, Panda, BitDefender  </li></ul></ul><u...
BE SAFE
<ul><li>Audri and Jim Lanford, “How Does a Firewall Work and How Can it Protect Your Compter?”  http://www.scambusters.org...
Upcoming SlideShare
Loading in …5
×

Computer Security Andrea Cucchiara

1,353 views

Published on

Published in: Technology
  • Be the first to comment

Computer Security Andrea Cucchiara

  1. 1. Andrea Cucchiara BUA 581 – Cohort K January 11, 2010 Computer Security Devices
  2. 2. <ul><li>A type of hardware or software device that protects against unauthorized computer access </li></ul><ul><li>CIA – Confidentiality, Integrity, and Authentication/Availability </li></ul><ul><li>Home security vs. large network security </li></ul><ul><li>What security device you choose will depend on what type of information you are trying to project. </li></ul>What is Computer Security?
  3. 3. <ul><li>The internet is a dangerous place </li></ul><ul><li>Block intruders </li></ul><ul><li>Keep data safe </li></ul><ul><li>Protect against viruses, hackers, </li></ul><ul><li>worms, spam, etc. </li></ul><ul><li>Heightened liability and federal </li></ul><ul><li>information security regulations </li></ul>Why do we need security?
  4. 4. <ul><li>Firewalls </li></ul><ul><li>Anti-virus software </li></ul><ul><li>Anti-spyware/malware </li></ul><ul><li>Logins & Passwords </li></ul><ul><li>VPN </li></ul><ul><li>Data/File Encryption </li></ul><ul><li>Most software security can be downloaded for free!! </li></ul>Types of Protection
  5. 5. Firewalls <ul><li>A barrier that protects your computer or network from unauthorized access </li></ul><ul><li>Entry through an access point and filters based on customized settings </li></ul><ul><li>Packet filtering or application/proxy filtering </li></ul><ul><li>Hardware & Software firewalls </li></ul><ul><li>Not 100% protection </li></ul>
  6. 6. Firewall Devices <ul><li>Hardware </li></ul><ul><ul><li>Wired, Wireless, or Broadband </li></ul></ul><ul><ul><li>Cisco, McAfee, Netgear, Juniper, Nortel, Symantec, Fortinet, </li></ul></ul><ul><ul><li>$40 - $80,000 </li></ul></ul><ul><li>Software </li></ul><ul><ul><li>ZoneAlarm Pro, Outpost Firewall, Online Armor, Little Snitch </li></ul></ul><ul><ul><li>$20 - $60 per year for service </li></ul></ul><ul><ul><li>Best Free downloads: Rizar, Gizmos's Freeware, & Comodo </li></ul></ul><ul><ul><li>Microsoft XP & Vista as built in firewall </li></ul></ul>
  7. 7. Anti-Virus & Anti-Spyware Software <ul><li>Both Anti-Virus and Anti-Spyware use Heuristic Technology </li></ul><ul><li>Anti-Virus </li></ul><ul><ul><li>Prevents, detects, and removes viruses . </li></ul></ul><ul><ul><li>Searches database by means of a virus dictionary </li></ul></ul><ul><ul><li>Identifies suspicious behavior </li></ul></ul><ul><ul><li>Viruses will make your computer ill </li></ul></ul><ul><li>Anti-Spyware </li></ul><ul><ul><li>Detects and removes spyware via scan and real-time protection </li></ul></ul><ul><ul><li>Spyware records and broadcasts your activity and data </li></ul></ul>
  8. 8. <ul><li>Anti-Virus </li></ul><ul><ul><li>Norton, McAfee, Symantec, Avira, Kaspersky, Panda, BitDefender </li></ul></ul><ul><ul><li>$20-$60 </li></ul></ul><ul><ul><li>Free versions online (Avast, Avira, AVG) </li></ul></ul><ul><li>Anti-Spyware </li></ul><ul><ul><li>Spyware Doctor, Sunbelt CounterSpy, Norton, BitDefender </li></ul></ul><ul><ul><li>$20-$40 </li></ul></ul><ul><ul><li>Free versions online (Lavasoft Ad-ware, Microsoft Defender, Avast) </li></ul></ul><ul><li>Update your virus and spyware software regularly! </li></ul>Anti-Virus & Anti-Spyware Software
  9. 9. BE SAFE
  10. 10. <ul><li>Audri and Jim Lanford, “How Does a Firewall Work and How Can it Protect Your Compter?” http://www.scambusters.org/firewall.html , accessed January 8, 2010. </li></ul><ul><li>Consumer Search, “Anti-Spyware: Reviews”, March 2009, http:// www.consumersearch.com /anti-spyware-reviews , accessed January 9, 2009. </li></ul><ul><li>Consumer Search, “Firewalls: Reviews”, May 2009, http:// www.consumersearch.com /firewalls , accessed January 8, 2010. </li></ul><ul><li>Jane F. Kinkus, “Computer Security”, Fall 2002, http://www.istl.org/02-fall/internet.html , accessed January 8, 2010. </li></ul><ul><li>Josh Baum, “How Does a Firewall Work?”, http://www.ehow.com/how-does_4795720_a-firewall-work.html , accessed January 8, 2010. </li></ul><ul><li>Lee Koo, “How does antispyware work?”, February 2006, http://forums.cnet.com/5208-10149_102-0.html?threadID=157574 , accessed January 9, 2010. </li></ul><ul><li>Markus Schmall, “Heuristic Techniques in AV Solutions: An Overview”, February 2004, http://www.securityfocus.com/infocus/1542 , accessed January 9, 2010. </li></ul><ul><li>Squidoo, “What Does Anti Spyware Do?”, 2010, http://www.squidoo.com/anti-spyware-2 , accessed January 9, 2010. </li></ul><ul><li>Stephen Moore, “How does a Firewall Work?”, October 2005, http://www.talkbroadband.com/articles/21/3/How-Does-a-Firewall-Work%3F , accessed January 8, 2010. </li></ul>REFERENCES

×