SlideShare a Scribd company logo
1 of 2
Name:
Computer #:
3.02 Protecting Your Computer and Your Data Notes
Directions: Use the following website training module to respond to each of
the statements in the table.
http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliter
acy/content/eng/courses/2698BE/wrapper.htm
STATEMENT RESPONSE
Topic: Guidelines for Protecting Your Computer
1. List seven (7) guidelines for
safeguarding the operating
environment and data on your
computer.
Implement user identification
Set username and password
Keep password secure
Lock computer
Install and update protective software
Encrypt data
Back up data
2. What is an example of implementing
user identification?
You can give people restrictions and
privileges on the windows vista.
3. List three (3) important tips for
keeping your password secure.
Don’t share password with others
Don’t right password and leave it on the table
or desk
IF YOU THINK THAT THE PASSWORD
HAS BEEN COMPROMISED CHANGE IT
IMMEDIATELY.
4. What do antivirus and antispyware
software do?
Anti-virus detects and removes viruses and
spyware presents in your computer.
5. List two (2) things that a firewall does. Filters out the content that reaches your
computer.
6. Converting your data to an unreadable
form to protect it from unauthorized
access is called?
encryption
Topic: Best Practices for Securing Online and Network Transactions
7. List seven actions you can take to
secure online and network
transactions.
Make sure it is https
Make sure it has ssl
Make sure that there is a padlock icon
Make sure there is a certificate for the website
Make sure the SSL protocol is genuine
Make sure you receive a message confirming
the purchase
Make sure the information you receive is
encrypted
Name:
Computer #:
8. What should a strong password
include?
Combination of uppercase lowercase letters
and numbers and special characters
9. What is your primary defense against
security and privacy threats?
A strong password
10. What is spyware? When a hacker hacks your computer and
moves data from your computer to the
hackers computer
11. Define cache memory. The temporary memory stored in your
computer
12. What should you do on a regular basis
to prevent hackers from accessing
your personal information?
Ensure that it is a secured site and there is a
specific for providing information
13. What prefix indicates that a Web site
is secure?
Https
14. List four components of the Windows
Security Center.
Firewall, automatic Updates, malware
protection, and other security settings
15. Small programs that get installed on
your computer while you are browsing
the Internet.
Cookies
Topic: Measures for Securing E-Mail and Instant Messaging
16. What are five actions you can take to
protect your computer and data when
using e-mail and instant messaging?
Avoid opening the messages
17. The most common pathway for the
spread of computer viruses.
Opening emails from unknown messengers
18. What should you do if you receive
unsolicited messages?
Do not open them respond to them
19. A common activity used to extract
personal information from computer
users and then use the information for
malicious purposes.
Phishing
20. Developing communication with new
and unknown individuals makes you
more vulnerable to what kind of
threats?
Hackers
21. Measures for Protecting Your Computer Game (On Web module)
List your results below.
Avoid Online Threats
 Clear browsing history periodically
 Disable active content
 Protect against hacking and
spyware
 Avoid sharing personal info
Protect Computer Data
 Back up data
 Keep password secure
 Implement user identification
 Install an uptdate protective
software
22. Your Side of the Story:
Directions: Describe any experiences you have had with the topics discussed in this module
about protecting your computer and data. (At least 1 paragraph)

More Related Content

What's hot

How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?Simone Crete
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Computer Security
Computer SecurityComputer Security
Computer Securitysecrettub
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Network security primer
Network security primerNetwork security primer
Network security primeraeroman7
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 

What's hot (20)

How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Internet security tips for Businesses
Internet security tips for BusinessesInternet security tips for Businesses
Internet security tips for Businesses
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security
Network security Network security
Network security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Network Security
Network SecurityNetwork Security
Network Security
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 

Viewers also liked

clothes worksheet
clothes worksheetclothes worksheet
clothes worksheetAna Maestra
 
TAEE 2006: ESTUDIO DE LA CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...
TAEE 2006: ESTUDIO DE LA  CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...TAEE 2006: ESTUDIO DE LA  CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...
TAEE 2006: ESTUDIO DE LA CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...JUAN AGUILAR
 
Práctica 5 letra canción
Práctica 5 letra canciónPráctica 5 letra canción
Práctica 5 letra canciónreina2323
 
The Epoch Times: Montreal New Cinema Film Festival (part 3)
The Epoch Times: Montreal New Cinema Film Festival (part 3)The Epoch Times: Montreal New Cinema Film Festival (part 3)
The Epoch Times: Montreal New Cinema Film Festival (part 3)Frederic Eger
 
Hurricanes vs blues live streaming
Hurricanes vs blues live streamingHurricanes vs blues live streaming
Hurricanes vs blues live streaminginailse
 
Live coverage hurricanes vs blues
Live coverage hurricanes vs bluesLive coverage hurricanes vs blues
Live coverage hurricanes vs bluesinailse
 
Transcript 070112.PDF
Transcript 070112.PDFTranscript 070112.PDF
Transcript 070112.PDFEnrique Sigui
 
DJ_Dominic_Wayne_Resume 2015
DJ_Dominic_Wayne_Resume 2015DJ_Dominic_Wayne_Resume 2015
DJ_Dominic_Wayne_Resume 2015Dominic Wayne
 

Viewers also liked (12)

clothes worksheet
clothes worksheetclothes worksheet
clothes worksheet
 
Bike 100 cc 33 % fuel
Bike 100 cc  33 % fuelBike 100 cc  33 % fuel
Bike 100 cc 33 % fuel
 
Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptual
 
TAEE 2006: ESTUDIO DE LA CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...
TAEE 2006: ESTUDIO DE LA  CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...TAEE 2006: ESTUDIO DE LA  CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...
TAEE 2006: ESTUDIO DE LA CÉLULA SOLAR CON AYUDA DE SIMULADOR PSPICE® Y DE ME...
 
Práctica 5 letra canción
Práctica 5 letra canciónPráctica 5 letra canción
Práctica 5 letra canción
 
The Epoch Times: Montreal New Cinema Film Festival (part 3)
The Epoch Times: Montreal New Cinema Film Festival (part 3)The Epoch Times: Montreal New Cinema Film Festival (part 3)
The Epoch Times: Montreal New Cinema Film Festival (part 3)
 
ecocycle
ecocycleecocycle
ecocycle
 
Hurricanes vs blues live streaming
Hurricanes vs blues live streamingHurricanes vs blues live streaming
Hurricanes vs blues live streaming
 
Live coverage hurricanes vs blues
Live coverage hurricanes vs bluesLive coverage hurricanes vs blues
Live coverage hurricanes vs blues
 
Transcript 070112.PDF
Transcript 070112.PDFTranscript 070112.PDF
Transcript 070112.PDF
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
DJ_Dominic_Wayne_Resume 2015
DJ_Dominic_Wayne_Resume 2015DJ_Dominic_Wayne_Resume 2015
DJ_Dominic_Wayne_Resume 2015
 

Similar to A day that will be remembered

Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and securityAwais Haider
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 

Similar to A day that will be remembered (20)

Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Hamza
HamzaHamza
Hamza
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

A day that will be remembered

  • 1. Name: Computer #: 3.02 Protecting Your Computer and Your Data Notes Directions: Use the following website training module to respond to each of the statements in the table. http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliter acy/content/eng/courses/2698BE/wrapper.htm STATEMENT RESPONSE Topic: Guidelines for Protecting Your Computer 1. List seven (7) guidelines for safeguarding the operating environment and data on your computer. Implement user identification Set username and password Keep password secure Lock computer Install and update protective software Encrypt data Back up data 2. What is an example of implementing user identification? You can give people restrictions and privileges on the windows vista. 3. List three (3) important tips for keeping your password secure. Don’t share password with others Don’t right password and leave it on the table or desk IF YOU THINK THAT THE PASSWORD HAS BEEN COMPROMISED CHANGE IT IMMEDIATELY. 4. What do antivirus and antispyware software do? Anti-virus detects and removes viruses and spyware presents in your computer. 5. List two (2) things that a firewall does. Filters out the content that reaches your computer. 6. Converting your data to an unreadable form to protect it from unauthorized access is called? encryption Topic: Best Practices for Securing Online and Network Transactions 7. List seven actions you can take to secure online and network transactions. Make sure it is https Make sure it has ssl Make sure that there is a padlock icon Make sure there is a certificate for the website Make sure the SSL protocol is genuine Make sure you receive a message confirming the purchase Make sure the information you receive is encrypted
  • 2. Name: Computer #: 8. What should a strong password include? Combination of uppercase lowercase letters and numbers and special characters 9. What is your primary defense against security and privacy threats? A strong password 10. What is spyware? When a hacker hacks your computer and moves data from your computer to the hackers computer 11. Define cache memory. The temporary memory stored in your computer 12. What should you do on a regular basis to prevent hackers from accessing your personal information? Ensure that it is a secured site and there is a specific for providing information 13. What prefix indicates that a Web site is secure? Https 14. List four components of the Windows Security Center. Firewall, automatic Updates, malware protection, and other security settings 15. Small programs that get installed on your computer while you are browsing the Internet. Cookies Topic: Measures for Securing E-Mail and Instant Messaging 16. What are five actions you can take to protect your computer and data when using e-mail and instant messaging? Avoid opening the messages 17. The most common pathway for the spread of computer viruses. Opening emails from unknown messengers 18. What should you do if you receive unsolicited messages? Do not open them respond to them 19. A common activity used to extract personal information from computer users and then use the information for malicious purposes. Phishing 20. Developing communication with new and unknown individuals makes you more vulnerable to what kind of threats? Hackers 21. Measures for Protecting Your Computer Game (On Web module) List your results below. Avoid Online Threats  Clear browsing history periodically  Disable active content  Protect against hacking and spyware  Avoid sharing personal info Protect Computer Data  Back up data  Keep password secure  Implement user identification  Install an uptdate protective software 22. Your Side of the Story: Directions: Describe any experiences you have had with the topics discussed in this module about protecting your computer and data. (At least 1 paragraph)
  • 3. Name: Computer #: I have not had any experiences with this topic. I never have been hacked or had a website where I had to make sure to do all of this stuff. How to protect your computer is simple. Install all security settings. And make sure to keep your computer up to date so know hackers can get information.