Chapter 11 HandsOn Activity Securing Your Computer - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Chapter 11 HandsOn Activity Securing Your Computer

Description:

... spyware, and adware is free Internet downloads for software and music or videos. Only download these from a trusted vendor! A disaster recovery plan should be ... – PowerPoint PPT presentation

Number of Views:41
Avg rating:3.0/5.0
Slides: 10
Provided by: richcol
Category:

less

Transcript and Presenter's Notes

Title: Chapter 11 HandsOn Activity Securing Your Computer


1
Chapter 11 Hands-On ActivitySecuring Your
Computer
  • By Rich Colangelo

2
Topics Of Discussion
  • Securing your computer through
  • Business Continuity
  • Intrusion Prevention

3
Business Continuity
  • First most important action is to configure
    Windows to perform automatic updates.
  • Second most important action is to buy and
    install antivirus software from McAfee
    (http//www.mcafee.com/us/) or Symantec (Norton)
    (http//www.symantec.com/index.jsp). Configure
    for regular updates. Scan for viruses on a
    regular basis.
  • Buy and install anitspyware software. Good
    packages include McAfee, Spy Sweeper, CounterSpy
    and Trend Micro Anti-spyware, etc This software
    should be configured to give regular updates.

4
Business Continuity cont
  • The largest sources of viruses, spyware, and
    adware is free Internet downloads for software
    and music or videos.
  • Only download these from a trusted vendor!
  • A disaster recovery plan should be developed.
  • What will you do if your computer is destroyed?
  • Files should be copied to a shared directory on
    another computer on your LAN.

5
Intrusion Prevention
  • Physical security should always be practiced.
    Turn off your computer when not being used. An
    off computer cannot be attached via the Internet
    or a passerby.
  • Windows has multiple user accounts, Administrator
    and Guest. Disable the Guest account and change
    the name of the Administrator account so that
    intruders attacking the computer will not know
    the user names or passwords.

6
Intrusion Prevention cont
  • Turn on Windows Firewall. Firewall software
    prevents other computers from accessing your
    computer. The default setting is usually
    adequate, but changes can be made by clicking on
    Internet Options.
  • Disable unneeded services. Windows was designed
    to support many applications. Many of the
    services are not needed by users, and have become
    intruder targets.

7
Intrusion Prevention cont
  • If you use LAN at home, be certain the router
    connecting you to the Internet is a NAT proxy
    server. NAT proxy servers prevent intruders from
    attacking your computer.
  • If you dont need to share files on your LAN,
    turn off this capability.
  • Avoid phishing attacks. According to a study, 70
    of emails are spam and phishing attacks. Never
    click an email link, instead open a new browser
    and manually enter the correct address.

8
Intrusion Prevention cont
  • Lastly, computers should regularly be scanned for
    vulnerabilities. Symantec, an antivirus maker of
    software, has a website that will scan your
    computer for free. The website will list the
    strengths and weaknesses of your computer. The
    website is www.scan.symantec.com.

9
Questions?
Write a Comment
User Comments (0)
About PowerShow.com