Computer Security Presented By : Ebtihal Mohammed AL-Amro.
-
Upload
walter-webb -
Category
Documents
-
view
217 -
download
0
Transcript of Computer Security Presented By : Ebtihal Mohammed AL-Amro.
![Page 1: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/1.jpg)
Computer Security
Presented By : Ebtihal Mohammed AL-Amro
![Page 2: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/2.jpg)
Introduction
In this presentation I’ll explain to you The Principal Threats that affect on your computer and how can protect our computers from these threats, and how can we deal with it.
![Page 3: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/3.jpg)
Computer Security
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system.
![Page 4: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/4.jpg)
The Principal Threats
HackingHacking1
VirusesViruses2
SpamSpam3
SpywareSpyware4
![Page 5: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/5.jpg)
Hacking
“Illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems”
![Page 6: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/6.jpg)
Hacking Examples
Worm
worms are programs which reproduce by copying themselves over and over, using up resources and sometimes slowing down the systems
Logic BombLogic Bomb
Code which will trigger a particular form of 'attack' when a designated condition is met. For instance, a logic bomb could delete all files on Dec. it does not make copies of itself
It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than what it claims to do, usually something malicious
Trojan HorseTrojan Horse
![Page 7: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/7.jpg)
Viruses
Software programs capable of reproducing themselves and usually capable of causing great harm to files or other programs on the same computer.
![Page 8: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/8.jpg)
Spam
Is an unsolicited mail message offering goods or services often with immoral content.
![Page 9: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/9.jpg)
Spyware
Computer programs that gathers and reports information about a computer user without the user's knowledge or consent.
![Page 10: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/10.jpg)
7 Tips to Protect your computer7 Tips
Use an Internet “firewall”Use an Internet “firewall”
Keep your operating system up to date
Install and maintain antivirus software
Install and maintain antispyware software
Back up your important files and information
Use hard to guess Password
Think before you click
![Page 11: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/11.jpg)
Use an Internet firewallUse an Internet firewall
A firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network.
![Page 12: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/12.jpg)
Use an Internet firewallUse an Internet firewall
![Page 13: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/13.jpg)
Keep your operating system up to date
Install all security updates as soon as they are available.
Automatic updates provide the best protection.
![Page 14: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/14.jpg)
Install and maintain antivirus software
Antivirus software can detect and destroy computer viruses before they can cause damage
you should to keep the antivirus software up to date to be effective
Don’t let it expire
![Page 15: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/15.jpg)
Some Antivirus programs
![Page 16: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/16.jpg)
Install and maintain antispyware software
Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information.
![Page 17: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/17.jpg)
Back up your important files and information
You can use the backup utility in Windows to copy the important files and data on your hard drive and archive it on another hard drive, a disk, a CD, a DVD, or another computer. If your hard drive is erased or damaged, you can easily restore the data from the archived copy.
![Page 18: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/18.jpg)
Use hard to guess Password
Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network.
Virtually ineffective if people do not protect their passwords.
The golden rules, or policies for passwords are:
Make passwords as meaningless as possible Change passwords regularly Don’t let any one knows your password
![Page 19: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/19.jpg)
Think before you click
Don’t open e-mail attachments unless you know what they contain and who sent them.
Only download files from websites you trust.
Always use the red “X” in the corner of a pop-up screen. Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC.
![Page 20: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/20.jpg)
References
Six steps to computer security •HP.com
10 tips to computer security By Cheryl Allebrand •Bankrate.com
Simple Steps to Protect Your Computer By Rick Hellewell • DigitalChoke.com
Internet Security Threats Lexicon By xtra Tiny
![Page 21: Computer Security Presented By : Ebtihal Mohammed AL-Amro.](https://reader033.fdocuments.us/reader033/viewer/2022051401/5697bfd41a28abf838caca96/html5/thumbnails/21.jpg)