21
Computer Security Presented By : Ebtihal Mohammed AL-Amro

Computer Security Presented By : Ebtihal Mohammed AL-Amro

Embed Size (px)

Citation preview

Page 1: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Computer Security

Presented By : Ebtihal Mohammed AL-Amro

Page 2: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Introduction

In this presentation I’ll explain to you The Principal Threats that affect on your computer and how can protect our computers from these threats, and how can we deal with it.

Page 3: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Computer Security

Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system.

Page 4: Computer Security Presented By : Ebtihal Mohammed AL-Amro

The Principal Threats

HackingHacking1

VirusesViruses2

SpamSpam3

SpywareSpyware4

Page 5: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Hacking

“Illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems”

Page 6: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Hacking Examples

Worm

worms are programs which reproduce by copying themselves over and over, using up resources and sometimes slowing down the systems

Logic BombLogic Bomb

Code which will trigger a particular form of 'attack' when a designated condition is met. For instance, a logic bomb could delete all files on Dec. it does not make copies of itself

It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than what it claims to do, usually something malicious

Trojan HorseTrojan Horse

Page 7: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Viruses

Software programs capable of reproducing themselves and usually capable of causing great harm to files or other programs on the same computer.

Page 8: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Spam

Is an unsolicited mail message offering goods or services often with immoral content.

Page 9: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Spyware

Computer programs that gathers and reports information about a computer user without the user's knowledge or consent.

Page 10: Computer Security Presented By : Ebtihal Mohammed AL-Amro

7 Tips to Protect your computer7 Tips

Use an Internet “firewall”Use an Internet “firewall”

Keep your operating system up to date

Install and maintain antivirus software

Install and maintain antispyware software

Back up your important files and information

Use hard to guess Password

Think before you click

Page 11: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Use an Internet firewallUse an Internet firewall

A firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network.

Page 12: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Use an Internet firewallUse an Internet firewall

Page 13: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Keep your operating system up to date

Install all security updates as soon as they are available.

Automatic updates provide the best protection.

Page 14: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Install and maintain antivirus software

Antivirus software can detect and destroy computer viruses before they can cause damage

you should to keep the antivirus software up to date to be effective

Don’t let it expire

Page 15: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Some Antivirus programs

Page 16: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Install and maintain antispyware software

Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information.

Page 17: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Back up your important files and information

You can use the backup utility in Windows to copy the important files and data on your hard drive and archive it on another hard drive, a disk, a CD, a DVD, or another computer. If your hard drive is erased or damaged, you can easily restore the data from the archived copy.

Page 18: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Use hard to guess Password

Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network.

Virtually ineffective if people do not protect their passwords.

The golden rules, or policies for passwords are:

Make passwords as meaningless as possible Change passwords regularly Don’t let any one knows your password

Page 19: Computer Security Presented By : Ebtihal Mohammed AL-Amro

Think before you click

Don’t open e-mail attachments unless you know what they contain and who sent them.

Only download files from websites you trust.

Always use the red “X” in the corner of a pop-up screen. Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC.

Page 20: Computer Security Presented By : Ebtihal Mohammed AL-Amro

References

Six steps to computer security •HP.com

10 tips to computer security By Cheryl Allebrand •Bankrate.com

Simple Steps to Protect Your Computer By Rick Hellewell • DigitalChoke.com

Internet Security Threats Lexicon By xtra Tiny

Page 21: Computer Security Presented By : Ebtihal Mohammed AL-Amro