SlideShare a Scribd company logo
Lesson 49: The Risks of Computing
    • preventing loss or damage to the computer
    • establishing a safe working environment
    • using ergonomics to set up the correct workstation
    • recognizing and protecting your computer from software
      threats
    • understanding what viruses are and how to prevent them
      from damaging your computer




© CCI Learning Solutions Inc.                                  1
Protecting Your Data or Computer
    • Theft
          – Can purchase systems to lock computers in special cabinets or
            use durable cables to tie them to desk
          – Video camera surveillance is very effective for areas with large
            number of computers like central offices and network rooms
          – Do not leave portable devices unattended at any time when in
            public areas




© CCI Learning Solutions Inc.                                                  2
Protecting Your Data or Computer
    • Damage
          – Avoid temporary setups as likely to become more permanent than
            intended
          – Place monitors on stable desks and position wiring appropriately
          – Ensure system unit positioned on flat surface with ample space
            behind and around for air circulation
          – Regularly remove any dust buildup in computer and fan
          – Position all wires so people do not trip over them
          – Do not expose computer devices to extreme heat
            or cold, or moisture
          – Be careful how handling devices to not inadvertently damage
            them


© CCI Learning Solutions Inc.                                                  3
Protecting Your Data or Computer
    • Data Loss
          – Can lose data through result of hackers, hardware failure, power
            spikes, accidental deletions, or disgruntled employees
          – If provide critical service, should have emergency plan to cope
            with incidents that cause major loss to your system
          – With portable devices, keep device near you when in public
          – Always use passwords to protect documents or data, and keep
            passwords in separate location




© CCI Learning Solutions Inc.                                                  4
Protecting Your Data or Computer
    • Backups
          – Back up data regularly and store copies in separate location
          – Only need to back up data files
          – Every organization should have backup strategy
          – Data should be backed up on removable media
          – The more critical the data, the more often it should be backed up
          – If users store data files on local drives, encourage them to make
            copy on server for daily back up or create backups of their own
          – Encourage users to save files frequently to ensure no data loss
          – Build in backups as part of disaster and recovery plans




© CCI Learning Solutions Inc.                                                   5
Protecting Your Data or Computer
    • Power
          – Computers vulnerable to outages and surges
          – In event of power outage, computer shuts down and not damaged
          – Uninterruptible power supply (UPS) provides some protection
            against total data loss due to power surges
          – Reliable power bar with surge protection can be useful as first
            line of defense
          – Be sure not to plug too many things into power bar




© CCI Learning Solutions Inc.                                                 6
Understanding the Risks of Losing Data
    • Hacker is someone who gains unauthorized access to generally:
          – steal information with intent of selling it
          – destroy data resulting in company’s inability to deliver products, services,
            or projects on time
          – change information, causing embarrassment or to negatively affect
            company’s reputation
    • Protect data with password that:
          – Is logical enough to remember but not obvious for someone else to
            guess
          – Not nickname or name of your spouse, child, or favorite pet
          – Is combination of letters and numbers
          – Changes on regular basis
    • Use different passwords for confidential files or access network or
      Internet
    • Work with security consultant on risk assessment and security plan
© CCI Learning Solutions Inc.                                                          7
Preventing Personal Injuries
    • In wrist, all nerves and blood vessels pass through narrow passage
      between wrist bones called carpal tunnel
          – Repeated stress leads to area being inflamed and painful or carpal
            tunnel syndrome
          – Can also occur at elbow joint
    • Frequent rapid motion can cause repetitive motion injury in hands
    • Sitting for extended periods or sitting with incorrect posture can
      constrict blood flow to legs and apply pressure on nerves
    • Staring at monitor for too long can lead to eye strain
    • Back strain can occur from sitting too long in uncomfortable chair or
      from poor posture when sitting
    • Ergonomics is study of human body in workplace
    • First way to prevent personal injury due to computer use is never to
      work without taking regular breaks
© CCI Learning Solutions Inc.                                                    8
Preventing Personal Injuries
    • Work surface should be stable and resting flat
    • Monitor and keyboard should be directly in front of
      you
    • Top of monitor should be about 2-3″ above your
      eyes
    • Reduce glare or reflection on screen
    • Place documents in document holder next to
      monitor
    • When seated, position arms so wrists are straight and
      flat, and arms close to body
    • Keep feet flat on floor or use foot rest
    • Take regular breaks to move about, stretch, and give eyes rest
    • Guidelines also apply to notebook and handheld mobile devices
    • Always test ergonomic products to determine its validity
          – Ensure there is research to support value of product

© CCI Learning Solutions Inc.                                          9
Identifying Software Threats
    • Includes viruses, worms, and spyware
    • Numerous tools you can use to protect computer against
      these threats
    • Spyware
          – Software program designed to collect information about you,
            about where and what you are browsing on Internet without your
            permission
          – Purpose is usually to identify you as target for sales of product or
            service that often is not real




© CCI Learning Solutions Inc.                                                      10
Understanding Viruses
    • All viruses come into computer through files shared on
      network or Internet
    • Computer program that moves from computer to
      computer by attaching itself to other files
          – Generally not harmful to computer directly although some are
            very destructive and can ruin data
    • Common type appears as e-mail from someone with valid
      e-mail address with attachment
          – Opening attachment actually releases virus which then sends
            copies of itself out to everyone on contact list
    • New virus programs created regularly


© CCI Learning Solutions Inc.                                              11
Understanding Viruses
    Boot Sector                 Infects system when read from infected boot disk; virus
                                writes to master boot sector which loads into
                                computer’s memory.
    Program or                  Part of file used to start program which loads into
    File                        computer’s memory.
    Macro                       Looks like macro file that runs in specific program, but
                                actually attaches to default settings which infects every
                                new or open file in that program.
    Multipartite                Similar to boot sector or program except it generally
                                infects both areas. Two most common malicious
                                program types:
                                Worms Duplicates and sends to anyone in recipient’s
                                      contact list.
                                Trojan Remains “hidden” and harmless until triggered by
                                Horses action.
© CCI Learning Solutions Inc.                                                               12
Understanding Viruses
    • Purchase copy of latest version or use trial version of antivirus
      program and install on computer
    • Once program installed, and before anything else, scan computer for
      any possible viruses that could be resident
    • Make sure you subscribe to antivirus program to get notices of
      updates to virus and spyware definitions and patches
    • Schedule virus scan to occur every time you start computer
    • Save any files you download to folder other than data folder and scan
      these files before opening
    • Set up antivirus program to scan e-mail as they arrive
    • If you share files using portable devices, scan any files you receive
      and any files you plan to give to others



© CCI Learning Solutions Inc.                                                 13
Understanding Viruses
    • See messages, prompts, or displays never seen before
    • Notice computer seems to be running slower or suddenly having
      problems with programs
    • Certain software applications no longer work
    • Hear random sounds or music never heard before
    • Names of disks or files seem to have changed, but you did not do it
    • Computer seems to contain more or fewer files than before
    • Error messages indicating file is missing, usually a program file.
    • You get messages with attachments from people you do not know.
    • You begin to get many messages with attachments from people you
      know but the subject line has a “RE:” or “FW” prefix, even though you
      have not sent those people anything.


© CCI Learning Solutions Inc.                                               14
Understanding Viruses
    • When you put flash drive or CD into drive, use antivirus
      program to scan portable device, even if there are no
      programs on it
    • If you receive e-mail with attachments, never open attachment
      without first scanning it
    • If you suspect virus on your system, try going to antivirus
      program’s Web site and running online scan of computer
          – Web site scan program contains all latest protection patterns and should
            be able to catch anything on your system but not included in antivirus
            program
    • Can also take computer to technical specialist to work with you
      to scan drives in system for any potential viruses, and then
      look for resolutions to remove or quarantine the viruses

© CCI Learning Solutions Inc.                                                      15
Understanding Viruses
    • When antivirus program running, it scans files you select
          – When it finds virus or threat, will notify you and give option to quarantine
            or remove
    • If choose quarantine, file with virus put in quarantined or vault
      area where it is prevented from infecting other files
    • If choose to remove file, antivirus program permanently
      deletes this file from your system
    • If finds virus that cannot be removed, will still quarantine file
          – Note virus name and go to antivirus program’s Web site to find removal
            tool
    • Occasionally look at virus history, go to quarantine and delete
      files there


© CCI Learning Solutions Inc.                                                              16
Review Questions
  1. What should you avoid when using a portable computer device?
     a. Leaving your PDA on a hot, sandy beach
     b. Leaving your password-protected notebook in your college
        dormitory room
     c. Carrying your cellular phone while getting into a hot tub
     d. Any of the above
     e. a or c
  2. You can set up a safe working environment by:
     a. Ensuring no cables or wires cross a common pathway for people
        to trip over
     b. Ensuring the computer and monitor sit on a stable platform
     c. Using a power bar that has surge protection
     d. Any of the above
     e. b or c
© CCI Learning Solutions Inc.                                       17
Review Questions
  3. What are some strategies you can apply to prevent your password
     being discovered?
          a. Change it on a frequent basis
          b. Use a combination of letters or numbers
          c.       Use a logical but less obvious word
          d. Use different passwords for files and logon IDs
          e. Any of the above




© CCI Learning Solutions Inc.                                          18
Review Questions
  4. Which is an area of concern when working with computers?
          a. Wrist
          b. Blood Flow
          c.       Repetitive Motions
          d. Back Strain
          e. Any of the above
          f.       a or c
  5. If you do not have an antivirus program installed on your system yet,
     you can go online to the Web site of an antivirus program developer
     to use their online scanning tool.
          a. True               b. False



© CCI Learning Solutions Inc.                                           19

More Related Content

What's hot

Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
rashmi1234
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
abe8512000
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
Dave Arvin
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
Faruk_Hossen
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
Ldc
LdcLdc
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 

What's hot (20)

Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer virus
Computer virusComputer virus
Computer virus
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Ldc
LdcLdc
Ldc
 
anti_virus
anti_virusanti_virus
anti_virus
 

Viewers also liked

School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
laurengilbert34
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
Dawn Miller
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
Lilia Pașa
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
Lilia Pașa
 
L48 slides
L48 slidesL48 slides
L48 slides
sgibson28
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
TatynaO
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
1davidjordan1
 
L47 slides
L47 slidesL47 slides
L47 slides
sgibson28
 
L44 slides
L44 slidesL44 slides
L44 slides
sgibson28
 
L46 slides
L46 slidesL46 slides
L46 slides
sgibson28
 
Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)ametsmm
 
L45 slides
L45 slidesL45 slides
L45 slides
sgibson28
 
Cherepovets
CherepovetsCherepovets
Cherepovets
TatynaO
 
конкурс ереповец
конкурс ереповец конкурс ереповец
конкурс ереповец
TatynaO
 
When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution
Margarita Iosif
 
L43 slides
L43 slidesL43 slides
L43 slides
sgibson28
 
L42 slides
L42 slidesL42 slides
L42 slides
sgibson28
 
L50 slides
L50 slidesL50 slides
L50 slides
sgibson28
 

Viewers also liked (18)

School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
 
L48 slides
L48 slidesL48 slides
L48 slides
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
 
L47 slides
L47 slidesL47 slides
L47 slides
 
L44 slides
L44 slidesL44 slides
L44 slides
 
L46 slides
L46 slidesL46 slides
L46 slides
 
Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)
 
L45 slides
L45 slidesL45 slides
L45 slides
 
Cherepovets
CherepovetsCherepovets
Cherepovets
 
конкурс ереповец
конкурс ереповец конкурс ереповец
конкурс ереповец
 
When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution
 
L43 slides
L43 slidesL43 slides
L43 slides
 
L42 slides
L42 slidesL42 slides
L42 slides
 
L50 slides
L50 slidesL50 slides
L50 slides
 

Similar to L49 slides

Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
Plus91 Technologies Pvt. Ltd.
 
L05 slides
L05 slidesL05 slides
L05 slides
Ann Bentley
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
mahaliacaraan
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Mis
MisMis
Mis
misecho
 
Internet
InternetInternet
Internet
youssefchefcher
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
lnatanzenebe21
 
Information security
Information securityInformation security
Information security
Shanthamallachar D B
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Cyber security
Cyber securityCyber security
Cyber security
Arjun Chetry
 
Mis
MisMis
Mis
misecho
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 

Similar to L49 slides (20)

Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
L05 slides
L05 slidesL05 slides
L05 slides
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Internet
InternetInternet
Internet
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Information security
Information securityInformation security
Information security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mis
MisMis
Mis
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 

L49 slides

  • 1. Lesson 49: The Risks of Computing • preventing loss or damage to the computer • establishing a safe working environment • using ergonomics to set up the correct workstation • recognizing and protecting your computer from software threats • understanding what viruses are and how to prevent them from damaging your computer © CCI Learning Solutions Inc. 1
  • 2. Protecting Your Data or Computer • Theft – Can purchase systems to lock computers in special cabinets or use durable cables to tie them to desk – Video camera surveillance is very effective for areas with large number of computers like central offices and network rooms – Do not leave portable devices unattended at any time when in public areas © CCI Learning Solutions Inc. 2
  • 3. Protecting Your Data or Computer • Damage – Avoid temporary setups as likely to become more permanent than intended – Place monitors on stable desks and position wiring appropriately – Ensure system unit positioned on flat surface with ample space behind and around for air circulation – Regularly remove any dust buildup in computer and fan – Position all wires so people do not trip over them – Do not expose computer devices to extreme heat or cold, or moisture – Be careful how handling devices to not inadvertently damage them © CCI Learning Solutions Inc. 3
  • 4. Protecting Your Data or Computer • Data Loss – Can lose data through result of hackers, hardware failure, power spikes, accidental deletions, or disgruntled employees – If provide critical service, should have emergency plan to cope with incidents that cause major loss to your system – With portable devices, keep device near you when in public – Always use passwords to protect documents or data, and keep passwords in separate location © CCI Learning Solutions Inc. 4
  • 5. Protecting Your Data or Computer • Backups – Back up data regularly and store copies in separate location – Only need to back up data files – Every organization should have backup strategy – Data should be backed up on removable media – The more critical the data, the more often it should be backed up – If users store data files on local drives, encourage them to make copy on server for daily back up or create backups of their own – Encourage users to save files frequently to ensure no data loss – Build in backups as part of disaster and recovery plans © CCI Learning Solutions Inc. 5
  • 6. Protecting Your Data or Computer • Power – Computers vulnerable to outages and surges – In event of power outage, computer shuts down and not damaged – Uninterruptible power supply (UPS) provides some protection against total data loss due to power surges – Reliable power bar with surge protection can be useful as first line of defense – Be sure not to plug too many things into power bar © CCI Learning Solutions Inc. 6
  • 7. Understanding the Risks of Losing Data • Hacker is someone who gains unauthorized access to generally: – steal information with intent of selling it – destroy data resulting in company’s inability to deliver products, services, or projects on time – change information, causing embarrassment or to negatively affect company’s reputation • Protect data with password that: – Is logical enough to remember but not obvious for someone else to guess – Not nickname or name of your spouse, child, or favorite pet – Is combination of letters and numbers – Changes on regular basis • Use different passwords for confidential files or access network or Internet • Work with security consultant on risk assessment and security plan © CCI Learning Solutions Inc. 7
  • 8. Preventing Personal Injuries • In wrist, all nerves and blood vessels pass through narrow passage between wrist bones called carpal tunnel – Repeated stress leads to area being inflamed and painful or carpal tunnel syndrome – Can also occur at elbow joint • Frequent rapid motion can cause repetitive motion injury in hands • Sitting for extended periods or sitting with incorrect posture can constrict blood flow to legs and apply pressure on nerves • Staring at monitor for too long can lead to eye strain • Back strain can occur from sitting too long in uncomfortable chair or from poor posture when sitting • Ergonomics is study of human body in workplace • First way to prevent personal injury due to computer use is never to work without taking regular breaks © CCI Learning Solutions Inc. 8
  • 9. Preventing Personal Injuries • Work surface should be stable and resting flat • Monitor and keyboard should be directly in front of you • Top of monitor should be about 2-3″ above your eyes • Reduce glare or reflection on screen • Place documents in document holder next to monitor • When seated, position arms so wrists are straight and flat, and arms close to body • Keep feet flat on floor or use foot rest • Take regular breaks to move about, stretch, and give eyes rest • Guidelines also apply to notebook and handheld mobile devices • Always test ergonomic products to determine its validity – Ensure there is research to support value of product © CCI Learning Solutions Inc. 9
  • 10. Identifying Software Threats • Includes viruses, worms, and spyware • Numerous tools you can use to protect computer against these threats • Spyware – Software program designed to collect information about you, about where and what you are browsing on Internet without your permission – Purpose is usually to identify you as target for sales of product or service that often is not real © CCI Learning Solutions Inc. 10
  • 11. Understanding Viruses • All viruses come into computer through files shared on network or Internet • Computer program that moves from computer to computer by attaching itself to other files – Generally not harmful to computer directly although some are very destructive and can ruin data • Common type appears as e-mail from someone with valid e-mail address with attachment – Opening attachment actually releases virus which then sends copies of itself out to everyone on contact list • New virus programs created regularly © CCI Learning Solutions Inc. 11
  • 12. Understanding Viruses Boot Sector Infects system when read from infected boot disk; virus writes to master boot sector which loads into computer’s memory. Program or Part of file used to start program which loads into File computer’s memory. Macro Looks like macro file that runs in specific program, but actually attaches to default settings which infects every new or open file in that program. Multipartite Similar to boot sector or program except it generally infects both areas. Two most common malicious program types: Worms Duplicates and sends to anyone in recipient’s contact list. Trojan Remains “hidden” and harmless until triggered by Horses action. © CCI Learning Solutions Inc. 12
  • 13. Understanding Viruses • Purchase copy of latest version or use trial version of antivirus program and install on computer • Once program installed, and before anything else, scan computer for any possible viruses that could be resident • Make sure you subscribe to antivirus program to get notices of updates to virus and spyware definitions and patches • Schedule virus scan to occur every time you start computer • Save any files you download to folder other than data folder and scan these files before opening • Set up antivirus program to scan e-mail as they arrive • If you share files using portable devices, scan any files you receive and any files you plan to give to others © CCI Learning Solutions Inc. 13
  • 14. Understanding Viruses • See messages, prompts, or displays never seen before • Notice computer seems to be running slower or suddenly having problems with programs • Certain software applications no longer work • Hear random sounds or music never heard before • Names of disks or files seem to have changed, but you did not do it • Computer seems to contain more or fewer files than before • Error messages indicating file is missing, usually a program file. • You get messages with attachments from people you do not know. • You begin to get many messages with attachments from people you know but the subject line has a “RE:” or “FW” prefix, even though you have not sent those people anything. © CCI Learning Solutions Inc. 14
  • 15. Understanding Viruses • When you put flash drive or CD into drive, use antivirus program to scan portable device, even if there are no programs on it • If you receive e-mail with attachments, never open attachment without first scanning it • If you suspect virus on your system, try going to antivirus program’s Web site and running online scan of computer – Web site scan program contains all latest protection patterns and should be able to catch anything on your system but not included in antivirus program • Can also take computer to technical specialist to work with you to scan drives in system for any potential viruses, and then look for resolutions to remove or quarantine the viruses © CCI Learning Solutions Inc. 15
  • 16. Understanding Viruses • When antivirus program running, it scans files you select – When it finds virus or threat, will notify you and give option to quarantine or remove • If choose quarantine, file with virus put in quarantined or vault area where it is prevented from infecting other files • If choose to remove file, antivirus program permanently deletes this file from your system • If finds virus that cannot be removed, will still quarantine file – Note virus name and go to antivirus program’s Web site to find removal tool • Occasionally look at virus history, go to quarantine and delete files there © CCI Learning Solutions Inc. 16
  • 17. Review Questions 1. What should you avoid when using a portable computer device? a. Leaving your PDA on a hot, sandy beach b. Leaving your password-protected notebook in your college dormitory room c. Carrying your cellular phone while getting into a hot tub d. Any of the above e. a or c 2. You can set up a safe working environment by: a. Ensuring no cables or wires cross a common pathway for people to trip over b. Ensuring the computer and monitor sit on a stable platform c. Using a power bar that has surge protection d. Any of the above e. b or c © CCI Learning Solutions Inc. 17
  • 18. Review Questions 3. What are some strategies you can apply to prevent your password being discovered? a. Change it on a frequent basis b. Use a combination of letters or numbers c. Use a logical but less obvious word d. Use different passwords for files and logon IDs e. Any of the above © CCI Learning Solutions Inc. 18
  • 19. Review Questions 4. Which is an area of concern when working with computers? a. Wrist b. Blood Flow c. Repetitive Motions d. Back Strain e. Any of the above f. a or c 5. If you do not have an antivirus program installed on your system yet, you can go online to the Web site of an antivirus program developer to use their online scanning tool. a. True b. False © CCI Learning Solutions Inc. 19

Editor's Notes

  1. Pg466Objective3-4.2.1, 3-4.2.3Discuss with the class why it is so important that a company minimize the potential loss of any data for the company, including the points made in the book about reputation, history, and client confidence.Make sure students understand how hackers can wind up with access to company data and who these people might be.Include in your discussion about passwords some of the logical things to include in choosing a password, e.g., minimum 8 characters, should include special character or casing, etc.
  2. Pg467Objective 3-4.2.4Spyware is more prevalent today and continues to be a concern as it crops up more and more in areas that may appear to be safe. Ensure students understand why it is important to have a tool that helps to reduce the amount of spyware that can occur from being online. Viruses and worms are discussed next so it isn’t necessary to spend a lot of time on these at this point.
  3. Pg471As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  4. Pg471As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  5. Pg471As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.