3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

16
3/31/12 1 Practicing Safe Computing Brian Cox 3/31/12

Transcript of 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

Page 1: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 1

Practicing Safe Computing

Brian Cox

3/31/12

Page 2: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 2

Practicing Safe Computing

• Develop a Plan

• Type of Connection

• Login Tokens

• VPN Software

• Computer Type

• Power Backup

• Data Backup

Page 3: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 3

Practicing Safe Computing

Develop a Plan

Computers breakdown, hard drives crash, internet connections stop working, do you have a plan on what you will do if something goes wrong? What if you are in the then middle of a trade and gotta get out? What are you going to do?

Have you even thought of how to recover.

Page 4: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 4

Practicing Safe Computing

Develop a Plan

I know of a couple that have included their data recovery plan in their business plan.

Maybe you should too.

Page 5: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 5

Practicing Safe Computing

Ken Hodor points out that the DSL connection is part of the telephone system that by regulation is required to be 99.9+% reliability.

The performance of then connection is more constant as well. DSL is less likely to be affected at peak times.

Security is likely to be greater with DSL since the connections are wired directly to the phone company offices where the traffic on cable are shared with other users in the area.

DSL or Cable

Page 6: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 6

Practicing Safe Computing

Ken Hodor also says “use a hardwire Internet connection to an DSL modem and do not use wireless due to security issues.

It would be very troublesome if someone stole your login and password. There have been many security breaches of wireless networks.

I will only use a wireless network in extreme cases. There are several neighborhood wireless networks that I can pick up if absolutely necessary.”

Hardwired or Wireless

Page 7: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 7

Practicing Safe Computing

Log-in tokens

Tokens are a device that provides changing digits that are used as part of your sign-in sequence.

TOS will supplyone to you ifrequested.

Page 8: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 8

Practicing Safe Computing

VPN software

Secure VPNs use tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by preventing message alteration

Google VPN to learn more.

Page 9: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 9

Practicing Safe Computing

Ken knows a lot, he also says “Use 2-portable computers with large high resolution screens (1600 x 1200 or higher).

These already have built in battery back up just in case power goes down and you have double modular redundancy.

For a big display buy a large LCD monitor. This way you can get 2 displays on one machine.”

One additional plus is if your connection at home goes down, you can pick up your machine a find the nearest Starbuck or MacDonald's.

Computer Type

Page 10: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 10

Practicing Safe Computing

A UPS will provide power to your computer if the home power fails.

A UPS (Uninterruptable Power Supply) provides AC power in the event that the AC power in your home fails. The backup power is provided by batteries. The length of the power backup depends on the size of your batteries.

The backup time is typically 5 to 30 minutes, but allows you to shut down your computer in an orderly manner.

Check out office supply locations such as Staples.

Power Backup

Page 11: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 11

Practicing Safe Computing

Your computer contains critical personal data that in many cases, is irreplaceable.

If you hard drive fails and you don’t have a copy of then all your data can be lost. This includes financial records, person records, photos and more.

Besides picking the correct connection, the correct computer type, hard drives occur. You must have a method to archive your data regularly.

Data Backup

Page 12: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 12

Practicing Safe Computing

Archive Software Backup

There is a archival format call “RAR” that is useful in archive files (adrive.com)

Page 13: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 13

Practicing Safe Computing

You should backup your data an external source. I recommends an External USB drive. You can get 1TB often for less than $100.

Data Backup(external hard drive)

Page 14: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 14

Practicing Safe Computing

Excellent if you more than one computers, or want to store lots of archival data including video and music.

For more info:http://tinyurl.com/network-drive

Data Backup(Network drive A.K.A NAS)

Page 15: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 15

Practicing Safe Computing

There are services on line that allow you to store your data in secure internet data locations. Typical services:

Mozy (http:mozy.com)Carbonite (http://www.carbonite.com)IDrive (http://www.idrive.com)

Data Backup(Internet)

Page 16: 3/31/121 Practicing Safe Computing Brian Cox 3/31/12.

3/31/12 16

Practicing Safe Computing

Your data is precious and in many case irreplaceable. If your data link is broken or your computer fails to work, losses because of pending trades can cost you a lot of money.

Take the necessary steps and prevent this from happening.

What is your plan?

Summary