• Tidak ada hasil yang ditemukan

module4_computersecurity1.ppt 2878KB Jun 23 2011 01:01:20 PM

N/A
N/A
Protected

Academic year: 2017

Membagikan "module4_computersecurity1.ppt 2878KB Jun 23 2011 01:01:20 PM"

Copied!
30
0
0

Teks penuh

(1)

Computer Security 1

(2)

Computer Security 1

Computer Security 1 includes two lessons:

(3)

Lesson 1

Objectives

After completing this lesson, you will be able to:

Explain what the terms security and privacy mean as

they apply to computing.

Identify the various threats prevalent in the world of

(4)

Definitions

Computer threat: Any factor that can damage your

computer or the data on it.

floods and hurricanes

accidental or intentional loss and tampering

Computer security: Deals with the measures that you can

take to avoid such damage to the computer and its data.

Installing computers in secure locationsBacking up data

(5)

Definitions

Computer privacy means that your data, such as

personal files and e-mail messages, is not accessible by anyone without your permission.

Computer privacy deals with the measures that you can

(6)

Natural Threats

Categories

Natural Disasters

Fire

Extreme Hot or Cold

Voltage Problems

Solutions

Backing up Data

Install Computer in

Secure Location

Controlling Operating

Environment

Surge Protection

Uninterruptible Power

(7)

Human Threats

Categories

Hackers

Virtual Theft

Viruses, Worms &

Trojan Horses

Spyware

Internet Scams

Online Predators

Solutions

Data Storage in Safe

Locations

Virus and Spyware

Protection

(8)
(9)

Lesson 2

Objectives

After completing this lesson, you will be able to:

Identify several common methods for protecting

the operating system, software, and data on

your computer.

Identify the various means of securing online

and network transactions.

Identify the common measures for securing

(10)

Protecting Your Computer

1. Implement user identification 2. Set a username and password 3. Keep passwords secure

4. Lock your computer

5. Install protective software 6. Encrypt data

7. Back up data

(11)
(12)

Protecting Your Computer

(13)

Protecting Your Computer

(14)

Protecting Your Computer

(15)

Protecting Your Computer

(16)

Protecting Your Computer

Set a password (cont.)

(17)

Protecting Your Computer

Lock your computer

Press:

Ctrl Alt Delete keys

at the same time

Click here to change

(18)

Install protective software

Antivirus

AVG free http://free.avg.com/

AVAST

free http://www.avast.com/eng/avast_4_home.html

McAfee

(19)

Install protective software

AntiSpyware

Windows Defender free

http://www.microsoft.com/windows/products/winfamily/defender/defa ult.mspx

Ad-Aware free http://www.lavasoft.com/McAfee

(20)

Install protective software

(21)

Encrypt data

(22)
(23)
(24)
(25)
(26)
(27)
(28)

Secure online and network

transactions

1.

Use strong passwords

2.

Protect against hacking and spyware

3.

Clear history and cache periodically

4.

Delete cookies periodically

5.

Avoid sharing personal information

6.

Make online transactions on secure sites

7.

Configure security components

8.

Disable active content

(29)

Ensure e-mail and instant

messaging security

1. Avoid opening e-mail with attachments 2. Do not respond to junk mail

3. Do not respond to unsolicited commercial mail 4. Protect yourself from phishing

5. Chat with known people only

(30)

Referensi

Dokumen terkait

KEMEI{TRIAN PENDIDIKAN DAN KEBUDAYAAN TII\IVERSITAS NBGERI YOGYAKARTA. FAKULTAS MATEMATIKA DAN ILMU PENGETAHUAN

3) Pembuktian kualifikasi untuk menilai pengalaman yang sejenis dan besaran nilai pekerjaan yang sesuai dengan nilai pekerjaan yang akan dikompetisikan dilakukan dengan melihat

Tahapan klarifikasi dokumen penawaran dan pembuktian dokumen kualifikasi ini merupakan bagian dari evaluasi dokumen, sehingga apabila peserta lelang tidak menghadiri undangan

Berdasarkan Surat Perintah Tugas Kepala Bagian Layanan Pengadaan Barang dan Jasa Sekretariat Daerah Kota Makassar Nomor 027.05/065.6/SPT-BLP/V/2017 tanggal 18 Mei 2017,

Paket Pengadaan Pekerjaan ini terbuka untuk Penyedia Barang/Jasa yang mempunyai Kualifikasi Bidang Barang/Jasa sub bidang Alat2..

Sementara aliran Mātūridiyah Bukhārā yang juga digolongkan ke dalam pemikiran teologi tradisional berpendapat bahwa dua dari keempat hal tersebut di atas yakni

Wahyu pertama yang turun kepada Nabi Muhammad saw adalah surah ..... Wahyu pertama turun kepada Nabi Muhammad saw ketika beliau berada di

Metoda evaluasi yang dipakai adalah sistem gugur dengan ambang batas teknis baik pada unsur-unsur maupun nilai total teknis dimana setiap dokumen yang dinyatakan tidak