SlideShare a Scribd company logo
1 of 26
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
Chapter 14B
Taking Protective
Measures
Avoiding Identity Theft
• Guard your papers
– Shred unneeded papers
– Pick up you mail quickly
– Check statements immediately
– Keep records for 3 years
Avoiding Identity Theft
• Guard your personal information
– Be wary giving out information
– Avoid giving account numbers
– Never give personal information in e-mail
– Ensure online shopping is secure
Avoiding Identity Theft
• Look at the big picture
– Review your credit report yearly
– Develop an efficient filing system
– Know your liability limits
Protecting Your Privacy
• Keep marketers at bay
– Be wary filling out forms
– Guard your primary email address
• Have a ‘spam account’ for forms
Protecting Your Privacy
• Know your legal rights
– 1966 Freedom of Information Act
– 1970 Fair Credit Reporting Act
– Privacy Act of 1974
– 1986 Electronic Communications Act
– Financial Modernization Act of 1999
– 2001 USA Patriot Act
Managing Cookies and Spyware
• Dealing with cookies
– Browsers provide settings to block cookies
– No cookies to all cookies allowed
– Without cookies some sites crash
– Cookies can be deleted
• Browsers
• Spyware programs
Managing Cookies and Spyware
• Cookie types
– Session cookies
• Cookies for the current site
– Persistent cookies
• Stored on hard drive until deleted
– First-party cookies
• Installed by the current site
– Third-party cookies
• Installed by an ad
Deleting Cookies
Managing Cookies and Spyware
• Removing web bugs and spyware
– Install a spyware removal program
• None are 100% effective, use two
– Install a pop-up blocker
• Are extremely effective
Managing Cookies and Spyware
• Evading spam
– Contact your ISP
– Use mail program’s filters
– Use an anti-spam program
– Use an online account for purchasing
Protection From Malware
• Viruses and worms
– Purchase a good anti-virus product
– Keep the product updated
– Keep your OS up to date
Protecting Your System
• Limit physical access
– Easiest way to harm or steal data
– Build an account for each user
– Require a password for access
• Software and hardware password
Protecting Your System
• Use a firewall
– Protects from unauthorized remote use
– Makes your computer invisible
– Cost between $0 and $80
Protecting Your System
• Backup often
– Backup is a copy of a file
– Restore replaces a file on disk
– Organizations backup at least daily
– Home users should backup weekly
System Events
• OS generates messages for events
• Provides clues about computer health
• Can alert to potential problems
• Windows includes the Event Viewer
Event Viewer
Handling Storage Media
• Store media in the proper container
– Floppy disks in a hard case
– CD should be in a sleeve
– Thumb disks should be closed
Handling Storage Media
• Avoid magnetism
– Magnets erase the contents of disks
– Magnets found in
• Speakers
• Televisions and CRT monitors
• Radios
Handling Storage Media
• Heat and cold
– Avoid extreme temperatures
• Heat expands media
• Cold contracts media
– Floppies and CD-ROMs are susceptible
Handling Storage Media
• Moisture
– Do not use wet media
– CDs can be wiped off
– Floppy disks must dry for days
Handling Storage Media
• Dust, dirt, and fingerprints
– Dirty or scratched media will fail
– Handle media by the edge
– Clean CDs with gentle strokes
Storing Computer Equipment
• Never store near large electronics
• Store in dry, climate controlled rooms
• Plan for natural disasters
• Stack equipment safely
Keeping Your Computer Clean
• Computers should be spotless
• Avoid eating or smoking at computer
• Clean the dust from inside the system
• Change the filters if present
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
Chapter 14B
End of Chapter

More Related Content

Similar to Intro ch 14_b

Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15ayahye
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.pptasm071149
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 

Similar to Intro ch 14_b (20)

Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Harshit security
Harshit securityHarshit security
Harshit security
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 

More from محمد گلزار (13)

Intro ch 07_b
Intro ch 07_bIntro ch 07_b
Intro ch 07_b
 
Intro ch 06_b
Intro ch 06_bIntro ch 06_b
Intro ch 06_b
 
Intro ch 06_a
Intro ch 06_aIntro ch 06_a
Intro ch 06_a
 
Intro ch 05_b
Intro ch 05_bIntro ch 05_b
Intro ch 05_b
 
Intro ch 05_a
Intro ch 05_aIntro ch 05_a
Intro ch 05_a
 
Intro ch 04_b
Intro ch 04_bIntro ch 04_b
Intro ch 04_b
 
Intro ch 04_a
Intro ch 04_aIntro ch 04_a
Intro ch 04_a
 
Intro ch 03_b
Intro ch 03_bIntro ch 03_b
Intro ch 03_b
 
Intro ch 03_a
Intro ch 03_aIntro ch 03_a
Intro ch 03_a
 
Intro ch 02_b
Intro ch 02_bIntro ch 02_b
Intro ch 02_b
 
Intro ch 02_a
Intro ch 02_aIntro ch 02_a
Intro ch 02_a
 
Intro ch 01_b
Intro ch 01_bIntro ch 01_b
Intro ch 01_b
 
Intro ch 01_a
Intro ch 01_aIntro ch 01_a
Intro ch 01_a
 

Intro ch 14_b

  • 1. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
  • 2. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education Chapter 14B Taking Protective Measures
  • 3. Avoiding Identity Theft • Guard your papers – Shred unneeded papers – Pick up you mail quickly – Check statements immediately – Keep records for 3 years
  • 4. Avoiding Identity Theft • Guard your personal information – Be wary giving out information – Avoid giving account numbers – Never give personal information in e-mail – Ensure online shopping is secure
  • 5. Avoiding Identity Theft • Look at the big picture – Review your credit report yearly – Develop an efficient filing system – Know your liability limits
  • 6. Protecting Your Privacy • Keep marketers at bay – Be wary filling out forms – Guard your primary email address • Have a ‘spam account’ for forms
  • 7. Protecting Your Privacy • Know your legal rights – 1966 Freedom of Information Act – 1970 Fair Credit Reporting Act – Privacy Act of 1974 – 1986 Electronic Communications Act – Financial Modernization Act of 1999 – 2001 USA Patriot Act
  • 8. Managing Cookies and Spyware • Dealing with cookies – Browsers provide settings to block cookies – No cookies to all cookies allowed – Without cookies some sites crash – Cookies can be deleted • Browsers • Spyware programs
  • 9. Managing Cookies and Spyware • Cookie types – Session cookies • Cookies for the current site – Persistent cookies • Stored on hard drive until deleted – First-party cookies • Installed by the current site – Third-party cookies • Installed by an ad
  • 11. Managing Cookies and Spyware • Removing web bugs and spyware – Install a spyware removal program • None are 100% effective, use two – Install a pop-up blocker • Are extremely effective
  • 12. Managing Cookies and Spyware • Evading spam – Contact your ISP – Use mail program’s filters – Use an anti-spam program – Use an online account for purchasing
  • 13. Protection From Malware • Viruses and worms – Purchase a good anti-virus product – Keep the product updated – Keep your OS up to date
  • 14. Protecting Your System • Limit physical access – Easiest way to harm or steal data – Build an account for each user – Require a password for access • Software and hardware password
  • 15. Protecting Your System • Use a firewall – Protects from unauthorized remote use – Makes your computer invisible – Cost between $0 and $80
  • 16. Protecting Your System • Backup often – Backup is a copy of a file – Restore replaces a file on disk – Organizations backup at least daily – Home users should backup weekly
  • 17. System Events • OS generates messages for events • Provides clues about computer health • Can alert to potential problems • Windows includes the Event Viewer
  • 19. Handling Storage Media • Store media in the proper container – Floppy disks in a hard case – CD should be in a sleeve – Thumb disks should be closed
  • 20. Handling Storage Media • Avoid magnetism – Magnets erase the contents of disks – Magnets found in • Speakers • Televisions and CRT monitors • Radios
  • 21. Handling Storage Media • Heat and cold – Avoid extreme temperatures • Heat expands media • Cold contracts media – Floppies and CD-ROMs are susceptible
  • 22. Handling Storage Media • Moisture – Do not use wet media – CDs can be wiped off – Floppy disks must dry for days
  • 23. Handling Storage Media • Dust, dirt, and fingerprints – Dirty or scratched media will fail – Handle media by the edge – Clean CDs with gentle strokes
  • 24. Storing Computer Equipment • Never store near large electronics • Store in dry, climate controlled rooms • Plan for natural disasters • Stack equipment safely
  • 25. Keeping Your Computer Clean • Computers should be spotless • Avoid eating or smoking at computer • Clean the dust from inside the system • Change the filters if present
  • 26. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education Chapter 14B End of Chapter

Editor's Notes

  1. Teaching tip Start the lecture reminding students that they should not use pirated software in general. However, using pirated security software is especially dumb. It is equivalent to letting a burglar install the new locks on your house.
  2. Teaching tip Secure online shopping is covered in chapter 10.
  3. Teaching tip The Federal Fair Dept Collections Practices Act allow residents one free credit report a year. Several sites offer pay access to a credit report. Visit www.creditreport.com/report_sample_m.html for a sample report. Visit www.freecreditreport.com for a free report.
  4. Teaching tip Third party cookies are a primary source for spyware.
  5. Teaching tip In 2004 PC World ranked Patrick Kolla’s Spybot and LavaSoft’s AdAware as the best spyware programs available. Both are free downloads. Teaching tip Google, Msn and Yahoo all offer excellent free popup blockers. Additionally the new Mozilla browser FireFox includes a popup blocker. Finally, Windows XP Service Pack 2 installs a popup blocker.
  6. Insider information America Online takes a very aggressive approach about blocking spam. After a certain number of customers mark an email as spam, AOL will refuse to accept email from that sender. Teaching tip Mozilla products include spam software. For Outlook and Eudora users, download MailWasher from www.mailwasher.net/.
  7. Teaching tip The Computing Keynote feature at the end of chapter 14B provides a thorough examination of virus removal. PC World routinely picks either Norton AntiVirus or McAfee AntiVirus as best buys. A decent free product is AntiVir personal edition available for download at www.mailwasher.net/.
  8. Teaching tip Remind students that passwords should be easy to remember but hard to guess.
  9. Teaching tip The built in firewall in XP is not very strong. Many ports remain open. Disable Windows’ Firewall and install a free firewall from Zone Labs instead.
  10. Teaching tip All versions of Windows since 95 have included a good backup utility. Other products include Norton Ghost and EVault InfoStage.
  11. Teaching tip Open the event viewer for demonstration in class. A good method to generate an error is to disable the virus software on the system.
  12. Teaching tip Suggest to your students that the CD’s they burn and store in their car are likely to have a short life.