SlideShare a Scribd company logo
1 of 13
Download to read offline
แžŸแžถแž€แž›แžœแžทแž‘แŸ’แž™แžถแž›แŸแž™แž”แž”แŸ€แž›แž”แŸ’แžšแžถแž™
แž˜แžปแžแžœแžทแž‡แŸ’แž‡แžถแŸˆ
INFORMATION
SECURITY AND
LEGAL FRAMEWORK
แžŸแžถแžŸแŸ’แžšแŸ’แžŸแžถแžถแž…แžถแžšแž™แž™แŸ–โ€‹โ€‹แžขแžผโ€‹แž•แžถแž“แŸ‹โ€‹แžŽแžถแžšแžทแž‘แŸ’แž’
แž”แŸ’แžšแž”แž’แžถแž“แž”แž‘แŸ’แŸ– โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹แžšแž”แž”แŸ€แž”แž€แžถแžšแž–แžถแžšแž‘แŸ’แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแž“แž€แžชแž™แž™แž˜แžถแž“แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แž”แŸ’แžšแž€แžปแž˜แž‘แŸ’แžธแŸ–โ€‹แŸจโ€‹
แžŽแžปแž”โ€‹ แž”แžŸแž„แž แžปแž„
แž˜แžปแžปแŸ† แžœแžŽแžŽแŸ‡
แžŸแžปแžปแŸ† แžปแŸ†แž„ แžŸแžปแž’แžถ
แž‚แž„แŸ‹ แžšแžนแž‘แŸ’แž’แžธ
แž แžถแž€แŸ‹แžŸแžปแžแž”แž แž„
2/25
แž˜แžถแžแŸ’แžทแž€แžถแžš
แŸก. แž€แžถแžšแžŽแŸ‚แž“แžถแŸ†แžชแŸ’แž™แžŸแŸ’แž‚แžถ แž›แŸ‹แžขแŸ’แžœแžธแž‡แžถแžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–แž‘แžทแž“แž“แž“แŸแž™?
แŸข.โ€‹ แž€แžถแžšแž”แžšแž”แžธแžšแžถแžŸแŸ‹แž”แž›แžแžŸแž˜แŸ’แž„แžถ แžแŸ’แŸ‹
แŸฃ.โ€‹ แž€แžถแžšแžŠแžถแŸ†แž” แžธแž„แž€แž˜แŸ’แž˜แžœ แžทแž’แžธ
แŸค. แž€แžถแžšแž”แž’แžœแžธแž”แž…แŸ’แž…แžปแž”แž”แž“แž“แž€แžถแž›แž“แžผแžœแž€แž˜แŸ’แž˜แžœ แžทแž’แžธแžŽแžŠแž›แž”แžšแž”แžธแžšแžถแžŸแŸ‹
แŸฅ. แž€แžถแžšแžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž‡แžถแž˜แŸ’แžฝแž™แž“แžนแž„แžฏแž€แžŸแŸ’แž‚แžš แžฌแžŽแžœแž”แžŸแŸ’แž‚แž™ แž”แŸ…แž”แž›แžธแžขแŸ’แžปแžธแž“แž”แž’แžธแžŽแŸ‚แžแŸ’
แŸฆ. แž€แžถแžšแž”แž’แžœแžธโ€‹ Encrypt แž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แŸง.โ€‹ แž€แžถแžš Back up แž‘แžทแž“แž“แž“แŸแž™แž‘แžปแž€
แŸจ.โ€‹ แž€แžถแžšแžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž‡แžถแž˜แŸ’แžฝแž™แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แŸฉ. Scan แž“แžผแžœแžšแžถแž›แŸ‹แžงแžปโ€‹โ€‹แž”แž€แžšแŸ‚แŸ แžŽแžŠแž›แžขแŸ’แž˜แž€แž”แžšแž”แžธแžšแžถแžŸแŸ‹แž‡แžถแž˜แŸ’แžฝแž™แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แŸกแŸ . แžšแžแŸ’แžผแžœแžšแž€แžขแŸ’แž˜แž€แž”แž”แž…แŸ’แž…แž€แž”แž‘แžŸแž”แž–แž›แžขแŸ’แž˜แž€แž˜แŸ’แžทแž“แž…แŸ’แžถแžŸแŸ‹ แžฌ แž‡แžฝแž”แž“แžนแž„แž”แž‰แŸ’แž แžถ แžถแžแŸ’แŸ‹แž”แž„แž‘แžทแž“แž“แž“แŸแž™
แŸกแŸก. แžฏแž€แžŸแŸ’แž‚แžšแž”แŸ„แž„
3/25
แž”แŸ„แž›แž”แžปแŸ†แžŽแž„
แž”แžšแž€แžถแž™แž–แžธแžขแŸ’แž“แž€แžถแž“แž”แžšแŸ€แž“แž”แž˜แŸ’แž”แžšแŸ€แž“แž”แž“แŸแŸ‡แž” แžธแž™ แžขแŸ’แž“แž€แž“แžทแž„แž”แž…แŸ’แŸแŸ‡แžขแŸ’แžถแŸ†แž–แžธแž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžถแž“แŸ„แŸ‰แžถ แž„แž›แžข
แž”แžšแž”แžธแž”แžŸแžธแžš แž‡แžถแž„แž”แž“แŸแŸ‡แž”แŸ…แž”แž‘แŸ€แžแŸ’ แžขแŸ’แž“แž€แž“แžทแž„แžŠแžนแž„แž–แžธแžœ แžทแž’แžธแž€แžถแžšแž–แžถแžš, แž€แžถแžšแž‡แžถแžŸแžœแžถแž„แž”แž•แŸแž„แŸ—แžŽแžŠแž›แž”แž’แžœแžธแžชแŸ’แž™แž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž˜แŸ’แž„แž“แžŸแžปแžœแžแŸ’แžแžท
แž—แžถแž–, แž™แž›แŸ‹แžŠแžนแž„แžขแŸ’แžถแŸ†แž–แžธ แž€แžถแžšแž”แžšแž”แžธแžšแžถแžŸแŸ‹ email, แž“แžทแž„ แžฏแž€แžŸแŸ’แž‚แžšแž”แž•แŸแž„แŸ—แž”แŸ…แž”แž›แžธ แžขแŸ’แžปแžธแž“แž”แž’แžธแžŽแŸ‚แžแŸ’แŸ”
แŸ„แŸ‰แžถ แž„แžŽแžถแž˜แŸ’แžทแž‰ แžขแŸ’แž“แž€แž“แžทแž„แžŠแžนแž„แž–แžธแž—แžถแž–แžแžปแžŸแž‚แŸ’แž“แž“ แžšแžœแžถแž„ Simple password, Better password, and the
Excellent password โ€‹ แž€แžถแžšแž•แŸแž–แžœแž•แžถแž™แž“แžผแžœ แžŽแžœแž”แžŸแŸ’แž‚แž™แžŽแžŠแž›แž‚แžฝแž‡แžถแžŸแžœแžถแž„ แŸ”
แž‡แžถแž…แŸ’แžปแž„แž”แžšแž€แžถแž™แžขแŸ’แž“แž€แžขแžถแž…แŸ’แž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€ แžถแž“แž”แŸ„แž™แžแž›แžฝแž“แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž•แŸ’แž‘แž‘ แž›แŸ‹แžแžถแž˜แŸ’แžœ แžทแž’แžธแžŸแŸ’แž‚แžŸแŸ’แžšแžŸแžแž„แžถ
แž™แŸ— แžŽแžŠแž›แž”แž™แžธแž„แžถแž“แž”แžšแŸ€แž“ แž”แŸ…แž€แž“แžปแž„ Slide แž”แž“แŸแŸ‡ แž“แžทแž„แž‡แžถแž–แžทแž”แžŸแžŸแž”แŸ…แž”แž‘แŸ€แžแŸ’แž”แž“แŸแŸ‡ แžขแŸ’แž“แž€แž“แžทแž„แž”แž…แŸ’แŸแŸ‡แž–แžธแžœ แžทแž’แžธแžŸแŸ’แž‚แžŸแŸ’แžšแžŸแžแž”แŸ„แŸแŸ‡แžšแžŸแŸ’แž‚แž™
แž”แž‰แŸ’แž แžถ แž”แŸ…แž”แž–แž›แž‡แžฝแž” แž“แžนแž„ แž€แžถแžšแžถแžแŸ’แŸ‹แž”แž„แž‘แžทแž“แž“แž“แŸแž™แž”แž•แŸแž„แŸ— แŸ”
4/25
แŸก. แž€แžถแžšแžŽแŸ‚แž“แžถแŸ†แžชแŸ’แž™แžŸแŸ’แž‚แžถ แž›แŸ‹แžขแŸ’แžœแžธแž‡แžถแžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–แž‘แžทแž“แž“แž“แŸแž™?
แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–แž‘แžทแž“แž“แž“แŸแž™ แž‚แžบแž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž˜แŸ’แžทแž“แžชแŸ’แž™แž˜แŸ’แž„แž“แž€แžถแžšแž”แž•แŸ’แž‘แž› แž‰แŸ‹แž–แžธ แž”แž˜แŸ’แž”แžšแžถแž‚, แžขแŸ’แž“แž€แž”แžถแŸ†แž•แŸ’แž‘แž› แž‰แŸ‹,โ€‹ แžฌ แžขแŸ’แž˜แž€แž›แžฝแž…แŸ’
แžœแžถแž™แžšแž”แž แžถแžšแž”แž•แŸแž„แž”แž‘แŸ€แžแŸ’โ€‹แŸ” แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžถแŸ†แž„ Software แž“แžทแž„ Hardware แž‡แžถแž”แžŠแžธแž˜แŸ’แŸ”
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แŸ’แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแž“แž€แžชแž™แž™แž˜แžถแž“แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
5/25
แŸข. แž€แžถแžšแž”แž”แŸ’แžšแž”แžพแž”แŸ’แžšแžถแžŸแŸ‹แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แŸ– แž‚แžบแžขแž“แž€แž”แŸ’แžšแžแŸ’แžผแžœแžแžแŸ’แž”แž”แŸ’แžšแž”แžพแž”แŸ’แžšแžถแžŸแŸ‹ แžฌ แžŠแžถแž€แŸ‹แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แžชแž™แž™แžถแž“แž”แŸ’แžšแžแŸ’แžนแž˜แž”แŸ’แžšแžแŸ’แžผแžœ แŸ”
แž”แž”แŸ’แžšแž”แžพแž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แžชแž™แž™แžถแž“แž™แŸ‰แžถแž„แž”แž แžถแž…แžŽแžถแžŸแŸ‹ แŸจ แžแŸ’แžฝแžขแž€แž™แžŸแžš แž”แž”แžพแž”แž”แŸ’แžšแž…แžพแž“แž‡แŸ’แž„แž”แž“แŸ‡แž€แžถแž“แŸ‹แžแžแŸ’แž”แŸ’แžšแž”แž”แžŸแžพแžš
แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แžแŸ‚แž›แž”แž”แŸ’แžšแž”แžพแž”แŸ’แžšแžแŸ’แžผแžœแžšแžฝแž˜แž”แž‰แŸ’แž‡แžผแž›แŸ„แžถแŸ‚แžผแž‡แŸ’แŸ– แžขแž€แž™แžŸแžšแž’แžปแŸ†, แžขแž€แž™แžŸแžšแžแŸ’แžผแž…, แž”แž›แž,โ€‹โ€‹ แž“แžทแž„ แžแŸ’แžฝแžขแž€แž™แžŸแžšแž”แž•แž™แžŸแž„แž”แž‘แŸ’แŸ€แžแŸ’โ€‹ แŸ”
- 8 = 8 characters minimum length
- 4 = 1 lower case + 1 upper case + 1 number + 1 special character.
แž€แžถแžšแžแž€แžแž”แŸ’แžšแž”แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹ แž‡แŸ’แžœแžถแž€แžถแžšแž”แžแžผแžšแžแŸ‚แž›แž”แŸ’แžšแŸ„แž“แŸ‹แžแžแŸ’แž”แžแžผแžšแž”แžŠแžถแž™แž€แžถแžšแž”แž”แž„แž€แžพแž“แžแžถแž˜แž›แžปแŸ†แžŠแžถแž”แŸ‹ แŸ”
แžงแž‘แžถแž แžšแžŽแŸแŸ– password1 แž”แž–แž›แž”แžแžผแžšแž”แŸ…แž‡แŸ’ password2 แŸ”
แž”แžแžผแžš แžฌ แžแž€แžแž”แŸ’แžšแž”แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹โ€‹แžšแž”แžŸแŸ‹แžขแž“แž€แžšแž™แŸ‡แž”แž–แž› แŸฆแžแžแž˜แžแž„โ€‹ แŸ”
แž‡แŸ’แžŸแžœแžถแž„แž€แžถแžšแžŸแžšแž”แžŸแžšแž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แžšแž”แžŸแŸ‹แžขแž“แž€แž”แŸ…แž”แž›แžพแž”แŸ’แžšแž€แžŠแžถแžŸ แžฌแž€แžถแžšแž€แžแŸ’แŸ‹แž”แŸ’แžšแžแžถแž…แžปแŸ†แžŽแžถแžปแŸ†แž”แž•แž™แžŸแž„แŸ—
แž‡แŸ’แžŸแžœแžถแž„แž€แžถแžšแžชแž™แž™แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แž”แŸ…แž“แžšแžŽแžถแž˜แžถแžถแž€แŸ‹ แžšแžถแž”แŸ‹แž”แž‰แŸ’แž‡แžผแž›แž‘แžถแžปแŸ†แž„ แž˜แžทแžแŸ’แž แž“แžทแž„โ€‹ แž”แŸ’แžšแž‚แžฝแžŸแžถแžšแžšแž”แžŸแŸ‹แžขแž“แž€
แž‡แŸ’แžŸแžœแžถแž„แž€แžถแžšแž”แž”แŸ’แžšแž”แžพแž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แŸ‚แžผแž…แŸ„แžถแž”แŸ…แž”แž›แžพ Web sโ€‹โ€‹it แž”แž•แž™แžŸแž„แŸ„แžถ แŸ‚แžผแž…แž‡แŸ’แŸ– แž”แž›แžพ Email แž“แžทแž„ แž”แž›แžพ Yahooโ€ฆแŸ”
แž‡แŸ’แžŸแžœแžถแž„แž€แžถแžšแžœแžถแž™แž”แž›แžแžŸแž˜แžถแžถแžแŸ’แŸ‹แž”แŸ…แž”แž–แž›แž˜แžถแž“แž”แž‚แž”แŸ… แž”แž‚แžขแžถแž…แž”แž˜แžพแž›แž“แžทแž„แž…แžถแžปแŸ†แžถแž“แž™แŸ‰แžถแž„แž„แžถแž™แŸ”
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แŸ’แž„แž“แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
6/25
แž€แžปแžถแŸ†แž”แž•แž‰แžธแžšแž”แž›แžแžŸแž˜แŸ’แž„แžถ แžแŸ’แŸ‹แžšแž”แžŸแŸ‹แžขแŸ’แž˜แž€แž”แŸ…แžแžถแž˜แŸ’ แžขแŸ’แžปแžธแžŽแž˜แŸ’แŸ‰แžถแž›......
แž‡แžถแžŸแžœแžถแž„แž€แžถแžšแž”แžšแž”แžธแžšแžถแžŸแŸ‹ Remember password แž”แŸ…แž”แž›แžธ Browser โ€‹แž”แžšแž–แžถแŸแŸ‡แž”แŸ…แž”แž–แž›แž˜แŸ’แž„แž“แžขแŸ’แž“แž€แž”แžšแž”แžธแž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹
แžขแŸ’แž“แž€ แž”แž–แž›แž”แž‚แž”แžšแž”แžธ Browser แž”แž“แŸแŸ‡แž”แž‚แžขแžถแž…แŸ’แžŠแžนแž„แž“แžทแž„แž›แžฝแž…แŸ’แž”แž›แžแžŸแž˜แŸ’แž„แžถ แžแŸ’แŸ‹แžขแŸ’แž“แž€ แžฌ แž”แŸ…แž”แž–แž›แžขแŸ’แž“แž€แž”แžšแž”แžธแž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžขแŸ’แž˜แž€แž”แž•แŸแž„ แŸ”
แž–แžทแž“แžทแžแŸ’แž™แž”แž›แžแžŸแž˜แŸ’แž„แžถ แžแŸ’แŸ‹แŸ–
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แŸ’แž“แž“แŸ’แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แžถแž“แŸ’แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
7/25
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แŸ’แž“แž“แŸ’แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แžถแž“แŸ’แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แŸฃ. แž€แžถแžšแžŠแžถแŸ†แž” แžธแž„แž€แž˜แŸ’แž˜แžœ แžทแž’แžธ
แž”แž™แžธแž„แžšแžแŸ’แžผแžœแžŠแžถแŸ†แž” แžธแž„แž€แž˜แŸ’แž˜แžœ แžทแž‘แžธแž€แž˜แŸ’แž„แž… แžแŸ’แŸ‹แž”แž˜แŸ’แž”แžšแžถแž‚ แžŠแžผแž…แŸ’แž‡แžถแŸ– Symantecโ€™s Norton Antivirus, McAfee, Kaspersky,
Webroot, Avira-Antivirus, Avast and more.
แžšแžแŸ’แžผแžœแž”แž”แžธแž€ Window Firewall แž‡แžถแž“แžทแž…แŸ’แž…
แž€แžปแžถแŸ†แž”แžšแž”แžธแžšแžถแžŸแŸ‹ Autorun แž”แŸ…แž€แž“แžปแž„แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แž‡แžถแžŸแžœแžถแž€แžถแžšแžŠแžถแŸ†แž” แžธแž€แž˜แŸ’แž˜แžœ แžทแž’แžธแžŽแžŠแž˜แŸ’แžทแž“แžŸแŸ’แž‚แžถ แž›แŸ‹โ€‹ แžœแžถแžขแžถแž…แŸ’แž”แŸ‰แžถแŸแŸ‡แž–แžถแž›แŸ‹แžŠแž›แŸ‹แž‘แžทแž“แž“แž“แŸแž™ แžฌ แž€แžปแžถแŸ†แž–แž™แžผแž‘แžš แŸแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
8/25
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แŸ’แž“แž“แŸ’แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แžถแž“แŸ’แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แŸค. แž€แžถแžšแž”แž’แžœแžธแž”แž…แŸ’แž…แžปแž”แž”แž“แž“แž€แžถแž›แž“แžผแžœแž€แž˜แŸ’แž˜แžœ แžทแž’แžธแžŽแžŠแž›แž”แžšแž”แžธแžšแžถแžŸแŸ‹แž”แŸ…แžแžถแž˜แŸ’ Version แžแž–แžŸแŸ‹แŸ—
แžšแžแŸ’แžผแžœแž”แž’แžœแžธแž”แž…แŸ’แž…แžปแž”แž”แž“แž“แž—แžถแž–แž“แžผแžœแž€แž˜แŸ’แž˜แžœ แžทแž’แžธแžŽแžŠแž›แž”แžšแž”แžธแžšแžถแžŸแŸ‹แžŠแžผแž…แŸ’แž‡แžถแŸ–
Kaspersky
Avira
Avast
Browser Firefox
Windows
Microsoft
Apple Mac Computer
โ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ..
โ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆโ€ฆ..
9/25
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แŸ’แž“แž“แŸ’แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แžถแž“แŸ’แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แŸฅ. แž€แžถแžšแžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž‡แžถแž˜แŸ’แžฝแž™แž“แžนแž„แžฏแž€แžŸแŸ’แž‚แžš แžฌแžŽแžœแž”แžŸแŸ’แž‚แž™ แž”แŸ…แž”แž›แžธแžขแŸ’แžปแžธแž“แž”แž’แžธแžŽแŸ‚แžแŸ’
แžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž“แžผแžœแžฏแž€แžŸแŸ’แž‚แžšแžŽแžŠแž›แžขแŸ’แž“แž€ download (file, Picture, events link)
แžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž“แžผแžœแžฏแž€แžŸแŸ’แž‚แžšแžŽแžŠแž›แžขแŸ’แž“แž€ download
แž€แžปแžถแŸ†แž”แž•แž‰แžธแžšแžฏแž€แžŸแŸ’แž‚แžš แžฌ แž–แžแŸ’แŸแž˜แŸ’แž„แž“แž•แŸ’แž‘แž‘ แž›แŸ‹แžแž›แžฝแž“แž”แž•แžแžŸแž•แŸ’แž‘แž แžŸแŸ‹แž”แŸ…แž”แž›แžธแžขแŸ’แžปแžธแž“แž”แž’แžธแžŽแŸ‚แžแŸ’
แž€แžปแžถแŸ†แž…แŸ’แžปแž…แŸ’โ€‹ แžฌ แž”แŸ’แž›แžธแž™แžแŸ’แž”แž”แŸ…แžœ แžทแž‰แž”แž”แžธแžŸแžทแž“แž˜แŸ’แžทแž“แž…แžถแŸ†แžถแž…แŸ’แŸ‹
แž›แžปแž” email แžŽแžŠแž›แž˜แŸ’แžทแž“แžŸแŸ’แž‚แžถ แž›แŸ‹แž”แž…แž›
แž€แžปแžถแŸ†แž…แŸ’แžผแž›แž”แž›แž„โ€‹ แžฌ แž€แžถแžšแž•แŸแž–แžœแž•แžถแž™ web sit แž”แž•แžแžŸแž•แŸ’แž‘แž แžŸแŸ‹แžŠแžผแž…แŸ’แž‡แžถแŸ– web sit แžŽแžŠแž›แžชแŸ’แž™แž”แž™แžธแž„แž…แŸ’แžผแž›แž”แž›แž„แž” แžธแž™แžˆแŸ’แž˜แŸแŸ‡
แžšแž„แžถแžœ แž“แŸ‹แž‡แžถแž”แžŠแžธแž˜แŸ’แŸ”
10/25
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แŸ’แž“แž“แŸ’แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แžถแž“แŸ’แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แŸฆ.แž€แžถแžšแž”แž’แžœแžธโ€‹ Encrypt แž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ–โ€‹
แž‚แžบแž‡แžถแž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž”แŸ…แž€แž“แžปแž„แž€แžšแŸ‚แžธ แžŽแžŠแž›แž‘แžทแž“แž“แž“แŸแž™แžšแžแŸ’แžผแžœแžถแž“แž”แž‚แž›แžฝแž…แŸ’แŸ” แžงแž‘ แžšแŸ‚แŸ แŸ– แž”แž”แžธแžŸแžทแž“ Hard
Disk แžฌ USB Flash Drive แžšแž”แžŸแŸ‹แžขแŸ’แž˜แž€แžšแžแŸ’แžผแžœแžถแž“แž”แž‚แž›แžฝแž…แŸ’ แž”แž“แŸแŸ‡แž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž˜แŸ’แžทแž“แžšแžแŸ’แžผแžœแžถแž“แž”แž‚แž”แž˜แŸ’แžธแž›แž”แž‘ แž”แž”แžธ
แžŸแžทแž“แžขแŸ’แž˜แž€ Encrypted.
แŸง.โ€‹ แž€แžถแžš Back up แž‘แžทแž“แž“แž“แŸแž™แž‘แžปแž€แŸ–
แž‚แžบแž‡แžถแž€แžถแžš Back up แž‘แžทแž“แž“แž“แŸแž™แž‘แžปแž€ แž“แžทแž„ แžŸแŸ’แž‚แž€แž›แž”แž„แž€แž“แžปแž„แž€แžถแžš Restore or Recoverโ€‹ แžœแžถแžšแž˜แŸ’แž€แžœ แžทแž‰ แžแžถแž”แžแŸ’แžธแž‘แžทแž“แž“แž“แŸแž™
แžŽแžŠแž›แž”แž™แžธแž„แžถแž“ Back up แž‘แžปแž€แž”แž“แŸแŸ‡แžขแžถแž…แŸ’แž”แžšแž”แžธแžšแžถแžŸแŸ‹แžถแž“แžŽแžŠแžšแžš แžบแž”แž‘แŸ”
แŸจ.โ€‹ แž€แžถแžšแžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“แž‡แžถแž˜แŸ’แžฝแž™แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แžšแžแŸ’แžผแžœแŸ„แž€แŸ‹แž”แž›แžแžŸแž˜แŸ’แž„แžถ แžแŸ’แŸ‹แž”แŸ…แž”แž›แžธแžŸแž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แž”แŸ…แž”แž–แž›แžŽแžŠแž›แžขแŸ’แž˜แž€แžˆแŸ’แž”แŸ‹แž”แžšแž”แžธแžšแžถแžŸแŸ‹ แžšแžแŸ’แžผแžœแž”แžทแžแŸ’แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžš
11/25
แž€แžถแžšแž€แžถแžšแž–แžถแžšแž‘แžทแž“แž“แž“แŸแž™แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แžชแŸ’แž™แž˜แŸ’แž„แž“แžŸแžปแžœแžแŸ’แžแžทแž—แžถแž–
แŸฉ.แž€แžถScan แž“แžผแžœแžšแžถแž›แŸ‹แžงแžปโ€‹โ€‹แž”แž€แžšแŸ‚แŸ แžŽแžŠแž›แžขแŸ’แž˜แž€แž”แžšแž”แžธแžšแžถแžŸแŸ‹แž‡แžถแž˜แŸ’แžฝแž™แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แžขแŸ’แž“แž€แžšแžแŸ’แžผแžœ Scan Drive แž“แž“ แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž€แž“แžปแž„โ€‹ แŸกแžŸแžถแž แŸแž˜แŸ’แžแž„
แžขแŸ’แž“แž€แžšแžแŸ’แžผแžœ Scan แž“แžผแžœแžšแžถแž›แŸ‹แžงแž”แž€แžšแŸ‚แŸ แžŽแžŠแž›แž”แŸ„แžแŸ’แž”แžšแž”แžธแž‡แžถแž˜แŸ’แžฝแž™แž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€
แžงแž‘ แžšแŸ‚แŸ แŸ– แž€แžถแžšแž”แžšแž”แžธ USB Flash, Memoryโ€ฆโ€ฆ
แŸกแŸ . แžšแžแŸ’แžผแžœแžšแž€แžขแŸ’แž˜แž€แž”แž”แž…แŸ’แž…แž€แž”แž‘แžŸแž”แž–แž›แžขแŸ’แž˜แž€แž˜แŸ’แžทแž“แž…แŸ’แžถแžŸแŸ‹ แžฌ แž‡แžฝแž”แž“แžนแž„แž”แž‰แŸ’แž แžถ แžถแžแŸ’แŸ‹แž”แž„แž‘แžทแž“แž“แž“แŸแž™
แž”แŸ…แž”แž–แž›แžขแŸ’แž˜แž€แž˜แŸ’แž„แž“แž˜แŸ’แžทแž“แžŠแžนแž„แž…แŸ’แžถแžŸแŸ‹แž–แžธแžงแž”แž€แžšแŸ‚แŸ แžŽแžถแž˜แŸ’แžฝแž™ แžŠแžผแž…แŸ’แž‡แžถแŸ– แž”แžš แžธแžŸแžถแž“ USB Flash แžขแŸ’แž“แž€แžšแžแŸ’แžผแžœแžšแž”แžปแž„แžšแž”แž™แŸแžแŸ’แž“
แž” แžธแž™แžขแŸ’แž“แž€แžšแžแŸ’แžผแžœแž”แŸ…แž–แžทแž—แžถแž€แžถแž‡แžถแž˜แŸ’แžฝแž™แž“แžทแž„ แžขแŸ’แž“แž€แž”แž”แž…แŸ’แž…แž€แž”แž‘แžŸแž‡แžถแž˜แŸ’แžปแž“แžŸแžทแž“แŸ”
แž”แž”แžธแžŸแžทแž“แžขแŸ’แž˜แž€แžถแžแŸ’แŸ‹แž”แž„แŸ‹แž‘แžทแž“แž“แž“แŸแž™ แžฌแž€แžปแžถแŸ†แž–แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แž˜แŸ’แž„แž“แž”แž‰แŸ’แž แžถ แž”แŸ„แž™แžšแž”แž€แžถแžšแžŽแžถแž˜แŸ’แžฝแž™ แžŠแžผแž…แŸ’แž‡แžถแŸ– แž˜แŸ’แž„แž“แž”แž˜แŸ’แž”แžšแžถแž‚แž”แž’แžœแžธแžชแŸ’แž™
error แž‡แžถแž”แžŠแžธแž˜แŸ’ แžŠแžผแž…แŸ’แž”แž“แŸแŸ‡แžขแŸ’แž“แž€แžšแžแŸ’แžผแžœแž”แŸ…แž‡แžฝแž”แž“แžทแž„แžขแŸ’แž“แž€แž”แž”แž…แŸ’แž…แž€แž”แž‘แžŸโ€‹แŸ”
12/25
แžฏแž€แžŸแžถแžšแž™แŸ„แž„
http://quickbooks.intuit.com/r/money/10-ways-to-protect-your-data-from-hackers/
http://www.online-tech-tips.com/computer-tips/how-to-protect-your-computer-from-hackers-
spyware-and-viruses/
http://gnwda.org/protection.htm
http://www.foxnews.com/tech/2014/05/02/how-to-protect-your-computer-from-viruses-and-
hackers/
13/25

More Related Content

Similar to Case - How to protect your information

แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹
 แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹ แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹Phannarith Ou, G-CISO
ย 
3.Install Avg
3.Install Avg3.Install Avg
3.Install Avgnodo50
ย 
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“
 แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“ แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“Phannarith Ou, G-CISO
ย 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development ProposalPhannarith Ou, G-CISO
ย 
Chapter 1 Introduction to Data Science.pptx
Chapter 1 Introduction to Data Science.pptxChapter 1 Introduction to Data Science.pptx
Chapter 1 Introduction to Data Science.pptxssusere5ddd6
ย 

Similar to Case - How to protect your information (6)

แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹
 แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹ แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“แž“แŸ…แžขแž„แŸ’แž‚แž€แžถแžšแžšแŸ‰แžถแž€แŸ‹
ย 
3.Install Avg
3.Install Avg3.Install Avg
3.Install Avg
ย 
2013 y4-s2-414-group01
2013 y4-s2-414-group012013 y4-s2-414-group01
2013 y4-s2-414-group01
ย 
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“
 แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“ แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“
แž‚แŸ„แž›แž“แž™แŸ„แž”แžถแž™แžŸแž“แŸ’แžแžทแžŸแžปแžแž–แŸแžแŸŒแž˜แžถแž“
ย 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
ย 
Chapter 1 Introduction to Data Science.pptx
Chapter 1 Introduction to Data Science.pptxChapter 1 Introduction to Data Science.pptx
Chapter 1 Introduction to Data Science.pptx
ย 

More from Phannarith Ou, G-CISO

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computerPhannarith Ou, G-CISO
ย 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your websitePhannarith Ou, G-CISO
ย 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From VirusPhannarith Ou, G-CISO
ย 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006Phannarith Ou, G-CISO
ย 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterprisePhannarith Ou, G-CISO
ย 
แžผUnderstanding DNS Spoofing
แžผUnderstanding DNS SpoofingแžผUnderstanding DNS Spoofing
แžผUnderstanding DNS SpoofingPhannarith Ou, G-CISO
ย 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU StudentPhannarith Ou, G-CISO
ย 
Paliment memberlist full-2013-new
Paliment memberlist full-2013-newPaliment memberlist full-2013-new
Paliment memberlist full-2013-newPhannarith Ou, G-CISO
ย 
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸ
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸแž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸ
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸPhannarith Ou, G-CISO
ย 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation DataPhannarith Ou, G-CISO
ย 

More from Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
ย 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
ย 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
ย 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
ย 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
ย 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
ย 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
ย 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
ย 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
ย 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
ย 
แžผUnderstanding DNS Spoofing
แžผUnderstanding DNS SpoofingแžผUnderstanding DNS Spoofing
แžผUnderstanding DNS Spoofing
ย 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
ย 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
ย 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
ย 
P12 r202t8 04-d-dos
P12 r202t8 04-d-dosP12 r202t8 04-d-dos
P12 r202t8 04-d-dos
ย 
Understanding Phishing
Understanding Phishing Understanding Phishing
Understanding Phishing
ย 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
ย 
Paliment memberlist full-2013-new
Paliment memberlist full-2013-newPaliment memberlist full-2013-new
Paliment memberlist full-2013-new
ย 
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸ
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸแž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸ
แž‚แž˜แŸ’แžšแŸ„แž„แž”แž„แŸ’แž€แžพแžแž‚แŸแž แž‘แŸ†แž–แŸแžšแžขแž„แŸ’แž‚แžšแž˜แžถแžŸ
ย 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation Data
ย 

Case - How to protect your information