Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Information security wikipedia , lookup
Security-focused operating system wikipedia , lookup
Mobile security wikipedia , lookup
Unix security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Cyberattack wikipedia , lookup
Password strength wikipedia , lookup
Computer security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Computer Security Preventing and Detecting Unauthorized Use of Your Computer Computer Security • Is the process of preventing and detecting unauthorized use of your computer • Prevention measures help you to stop unauthorized users from accessing any part of your computer system. • Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. Computer Security at School Windows L + L Windows L • Use this keystroke EVERY TIME you leave your classroom. • Why? – Only you or a network administrator can access the workstation. – Prevents unauthorized attempts to access your computer. Passwords • These are the keys you use to access any information you have stored on our network or any other network. – Z Drive – Infinite Campus – K12 E-mail Passwords • What makes a strong password? – Make it lengthy. – Combine letters, numbers, and symbols. – Use words or phrases that are easy for you to remember, but difficult for others to guess. Passwords • Create a strong, memorable password in 5 steps: – Think of a sentence you can remember. – Check if the computer supports the pass phrase directly. – If not, convert it to a password. – Add complexity. – Finally, substitute some special characters. Passwords • Password strategies to avoid: – Avoid sequences or repeated characters. – Avoid using only look-alike substitutions of numbers or symbols. – Avoid your login name. – Avoid dictionary words in any language. – Avoid using online storage. – Use more than one password everywhere. Passwords • One last note: – Do not ever give out your password in an e-mail! •No one affiliated with the State of South Dakota or Lead-Deadwood School District will ever ask for your username or password via e-mail. Preventing Unauthorized Use of Your School Computer • Use your login for your machine. • Use the student login for student machines. • Do not let a student use a machine that you are logged into currently. • Why? Computer Security at Home Types of Computer Security • Data Security • Personal Information or Break-In Security Data Security • Avoid losing information stored on your computer when something unexpected happens by: – Backing up your data (files, pictures, videos) on a flash drive, CD, or external hard drive. – Use surge protectors. Personal Information Security • There are a variety of methods, that when used together, can keep your personal information safe. Personal Information Safety • • • • Keep your firewall turned on. Use updated antivirus software. Use updated antispyware technology. Perform basic computer maintenance. – Install updates • Don’t open files from strangers. • Password protect your computer. Antivirus and Antispyware • Norton, McAfee, Symantec – Be sure to install updates every month or more frequently. • AVG • AD-Aware • CCleaner