Download PowerPoint Presentation - Lead

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Malware wikipedia , lookup

Information security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cyberattack wikipedia , lookup

Password strength wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Computer Security
Preventing and Detecting
Unauthorized Use of Your Computer
Computer Security
• Is the process of preventing and detecting
unauthorized use of your computer
• Prevention measures help you to stop
unauthorized users from accessing any part of
your computer system.
• Detection helps you to determine whether or
not someone attempted to break into your
system, if they were successful, and what they
may have done.
Computer Security at School
Windows L
+ L
Windows L
• Use this keystroke EVERY TIME you
leave your classroom.
• Why?
– Only you or a network administrator can
access the workstation.
– Prevents unauthorized attempts to access
your computer.
Passwords
• These are the keys you use to access
any information you have stored on our
network or any other network.
– Z Drive
– Infinite Campus
– K12 E-mail
Passwords
• What makes a strong password?
– Make it lengthy.
– Combine letters, numbers, and symbols.
– Use words or phrases that are easy for you
to remember, but difficult for others to
guess.
Passwords
• Create a strong, memorable password
in 5 steps:
– Think of a sentence you can remember.
– Check if the computer supports the pass phrase
directly.
– If not, convert it to a password.
– Add complexity.
– Finally, substitute some special characters.
Passwords
• Password strategies to avoid:
– Avoid sequences or repeated characters.
– Avoid using only look-alike substitutions of
numbers or symbols.
– Avoid your login name.
– Avoid dictionary words in any language.
– Avoid using online storage.
– Use more than one password everywhere.
Passwords
• One last note:
– Do not ever give out your password in an
e-mail!
•No one affiliated with the State of South Dakota
or Lead-Deadwood School District will ever ask
for your username or password via e-mail.
Preventing Unauthorized Use of Your
School Computer
• Use your login for your machine.
• Use the student login for student
machines.
• Do not let a student use a machine that
you are logged into currently.
• Why?
Computer Security at Home
Types of Computer Security
• Data Security
• Personal Information or Break-In
Security
Data Security
• Avoid losing information stored on your
computer when something unexpected
happens by:
– Backing up your data (files, pictures,
videos) on a flash drive, CD, or external
hard drive.
– Use surge protectors.
Personal Information Security
• There are a variety of methods, that
when used together, can keep your
personal information safe.
Personal Information Safety
•
•
•
•
Keep your firewall turned on.
Use updated antivirus software.
Use updated antispyware technology.
Perform basic computer maintenance.
– Install updates
• Don’t open files from strangers.
• Password protect your computer.
Antivirus and Antispyware
• Norton, McAfee, Symantec
– Be sure to install updates every month or
more frequently.
• AVG
• AD-Aware
• CCleaner