Download PowerPoint Presentation - Lead

yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Malware wikipedia , lookup

Information security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cyberattack wikipedia , lookup

Password strength wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer Security
Preventing and Detecting
Unauthorized Use of Your Computer
Computer Security
• Is the process of preventing and detecting
unauthorized use of your computer
• Prevention measures help you to stop
unauthorized users from accessing any part of
your computer system.
• Detection helps you to determine whether or
not someone attempted to break into your
system, if they were successful, and what they
may have done.
Computer Security at School
Windows L
+ L
Windows L
• Use this keystroke EVERY TIME you
leave your classroom.
• Why?
– Only you or a network administrator can
access the workstation.
– Prevents unauthorized attempts to access
your computer.
• These are the keys you use to access
any information you have stored on our
network or any other network.
– Z Drive
– Infinite Campus
– K12 E-mail
• What makes a strong password?
– Make it lengthy.
– Combine letters, numbers, and symbols.
– Use words or phrases that are easy for you
to remember, but difficult for others to
• Create a strong, memorable password
in 5 steps:
– Think of a sentence you can remember.
– Check if the computer supports the pass phrase
– If not, convert it to a password.
– Add complexity.
– Finally, substitute some special characters.
• Password strategies to avoid:
– Avoid sequences or repeated characters.
– Avoid using only look-alike substitutions of
numbers or symbols.
– Avoid your login name.
– Avoid dictionary words in any language.
– Avoid using online storage.
– Use more than one password everywhere.
• One last note:
– Do not ever give out your password in an
•No one affiliated with the State of South Dakota
or Lead-Deadwood School District will ever ask
for your username or password via e-mail.
Preventing Unauthorized Use of Your
School Computer
• Use your login for your machine.
• Use the student login for student
• Do not let a student use a machine that
you are logged into currently.
• Why?
Computer Security at Home
Types of Computer Security
• Data Security
• Personal Information or Break-In
Data Security
• Avoid losing information stored on your
computer when something unexpected
happens by:
– Backing up your data (files, pictures,
videos) on a flash drive, CD, or external
hard drive.
– Use surge protectors.
Personal Information Security
• There are a variety of methods, that
when used together, can keep your
personal information safe.
Personal Information Safety
Keep your firewall turned on.
Use updated antivirus software.
Use updated antispyware technology.
Perform basic computer maintenance.
– Install updates
• Don’t open files from strangers.
• Password protect your computer.
Antivirus and Antispyware
• Norton, McAfee, Symantec
– Be sure to install updates every month or
more frequently.
• AD-Aware
• CCleaner