SlideShare a Scribd company logo
Understanding security and
safe computing
Protect your computer
Understanding security and
safe computing
If you connect to the Internet, allow other people to
use your computer, or share files with others,
you should take steps to protect your computer
from harm. Why? Because there are computer
criminals (sometimes called hackers) who attack
other people's computers. These people can
attack directly, by breaking into your computer
through the Internet and stealing your personal
information, or indirectly, by creating malicious
software to harm your computer.
Protect your computer
i. These are ways to help protect your computer against potential
security threats:
ii. Firewall. A firewall can help protect your computer by preventing
hackers or malicious software from gaining access to it.
iii. Windows Update. Windows can routinely check for updates for your
computer and install them automatically.
iv. Virus protection. Antivirus software can help protect your computer
against viruses, worms, and other security threats.
v. Spyware and other malware protection. Antispyware software can
help protect your computer from spyware and other potentially
unwanted software.
Use a firewall
A firewall is software or hardware that checks information coming from the
Internet or a network and then either turns it away or allows it to pass
through to your computer, depending on your firewall settings. In this way, a
firewall helps prevent hackers and malicious software from gaining access
to your computer.
Windows Firewall is built into Windows and is turned on automatically.
If you run a program such as an instant messaging program or a multiplayer
network game that needs to receive information from the Internet or a
network, the firewall asks if you want to block or unblock (allow) the
connection. If you choose to unblock the connection, Windows Firewall
creates an exception so that the firewall won't bother you when that program
needs to receive information in the future.
How a firewall works
firewall works
Use virus protection
 Viruses, worms, and Trojan horses are programs created
by hackers that use the Internet to infect vulnerable
computers. Viruses and worms can replicate themselves
from computer to computer, while Trojan horses enter a
computer by hiding inside an apparently legitimate
program, such as a screen saver. Destructive viruses,
worms, and Trojan horses can erase information from your
hard disk or completely disable your computer. Others
don't cause direct damage, but worsen your computer's
performance and stability.
 Antivirus programs scan e mail and other files on your‑
computer for viruses, worms, and Trojan horses. If one is
found, the antivirus program either quarantines (isolates) it
or deletes it entirely before it damages your computer and
files.
Use virus protection
 Windows does not have a built-in
antivirus program, but your computer
manufacturer might have installed one.
If not, go to the Windows 7 security
software providers website to find an
antivirus program.
 Because new viruses are identified
every day, it's important to select an
antivirus program with an automatic
update capability. When the antivirus
software is updated, it adds new
viruses to its list of viruses to check
for, helping to protect your computer
from new attacks. If the list of viruses
is out of date, your computer is
vulnerable to new threats. Updates
usually require an annual subscription
fee. Keep the subscription current to
receive regular updates.
Warning
If you do not use antivirus software, you expose your computer to damage from
malicious software. You also run the risk of spreading viruses to other
computers.
Use spyware protection
Spyware is software that can display advertisements,
collect information about you, or change settings on your
computer, generally without appropriately obtaining your
consent. For example, spyware can install unwanted
toolbars, links, or favorites in your web browser, change
your default home page, or display pop-up ads
frequently. Some spyware displays no symptoms that
you can detect, but it secretly collects sensitive
information, such as the websites you visit or the text
you type. Most spyware is installed through free software
that you download, but in some cases simply visiting a
website results in a spyware infection.
Use spyware protection
To help protect your computer from spyware, use an
antispyware program. This version of Windows has a
built-in antispyware program called Windows Defender,
which is turned on by default. Windows Defender alerts
you when spyware tries to install itself on your computer.
It also can scan your computer for existing spyware and
then remove it.
Because new spyware appears every day, Windows
Defender must be regularly updated to detect and guard
against the latest spyware threats. Windows Defender is
updated as needed whenever you update Windows. For
the highest level of protection
Update Windows automatically
Microsoft regularly offers important updates to Windows
that can help protect your computer against new viruses
and other security threats. To ensure that you receive
these updates as quickly as possible, turn on automatic
updating. That way, you don't have to worry that critical
fixes for Windows might be missing from your computer.
Updates are downloaded behind the scenes when you're
connected to the Internet. The updates are installed at
3:00 A.M. unless you specify a different time. If you turn
off your computer before then, you can install updates
before shutting down. Otherwise, Windows will install
them the next time you start your computer.
Update Windows
automatically
Thank You
Presented by MUKUL
Source : Microsoft Windows

More Related Content

PPTX
Empowerment Technology Lesson 2
PPTX
Computing and ethics
PPT
Ten Important Rules
PPTX
List of Malwares
PPT
Computer Security and safety
PPTX
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
PPT
Protect
Empowerment Technology Lesson 2
Computing and ethics
Ten Important Rules
List of Malwares
Computer Security and safety
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Protect

What's hot (20)

PPTX
HELE 4 Lesson 2: Safe and Responsible Use of ICT
PPTX
INTERNET SAFETY FOR KIDS
PPT
Promote Education Internet Security
PPTX
Internet Threats
PPT
Viruses and Spyware
PDF
Empowerment Technologies - Online Safety, Ethics and Etiquette
PPTX
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
PPTX
Internet Security
PPTX
Online safety, Security, Ethics and Etiquette
PPT
internet security
PPTX
Online safety and security
PDF
Security Awareness Training
PPT
Computer Malware
PPTX
Internet safety guide
PPTX
Home and Business Computer Security 2014
PPTX
Internet Threats
PDF
How To Protect From Malware
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPTX
Rules of Netiquette
PPT
New internet security
HELE 4 Lesson 2: Safe and Responsible Use of ICT
INTERNET SAFETY FOR KIDS
Promote Education Internet Security
Internet Threats
Viruses and Spyware
Empowerment Technologies - Online Safety, Ethics and Etiquette
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
Internet Security
Online safety, Security, Ethics and Etiquette
internet security
Online safety and security
Security Awareness Training
Computer Malware
Internet safety guide
Home and Business Computer Security 2014
Internet Threats
How To Protect From Malware
Tutorial 09 - Security on the Internet and the Web
 
Rules of Netiquette
New internet security
Ad

Similar to Understanding security and safe computing (20)

PPTX
IS100 Week 11
PPTX
Computer Security 101
PPT
Computers.ppt
PPT
How To Protect Your Computer
PPT
computer_security.ppt
PDF
security By ZAK
PPTX
Defensive measure of virus
PPTX
How To Protect Your Home PC
PPT
Keeping Your Children, your information and your equiptment safe
PPTX
Internet security
PPT
PDF
IT Security.pdf
PDF
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
PDF
INT 1010 05-3.pdf
DOCX
PPTX
Issues and precautions related to ict
PPT
networkmanagementandsecurity-160406183558.ppt
PPTX
Safe computing (Tips & Tricks)
PPT
Network management and security
PPT
11 Computer Privacy
IS100 Week 11
Computer Security 101
Computers.ppt
How To Protect Your Computer
computer_security.ppt
security By ZAK
Defensive measure of virus
How To Protect Your Home PC
Keeping Your Children, your information and your equiptment safe
Internet security
IT Security.pdf
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
INT 1010 05-3.pdf
Issues and precautions related to ict
networkmanagementandsecurity-160406183558.ppt
Safe computing (Tips & Tricks)
Network management and security
11 Computer Privacy
Ad

More from Mukul Kumar (20)

PPTX
Some Medicinal plants & Their Uses
PPTX
The solid state
PPTX
Printers
PPTX
History of computers
PPTX
Computer communication
PPTX
General principles and processes of isolation of elements
PPTX
Wireless computing
PPTX
Microsoft office word 2007
PPT
Computer generations
PPSX
Effects of drug abuse and addiction
PPSX
Effects of drug abuse and addiction
PPT
Getting started with paint
PPT
Parts of computer
PPT
E‑mail
PPSX
Golden Temple Picture Collection
PPSX
Introducing power point 2007
PPSX
Cyber crime
DOCX
What is direct X ?
PPSX
What is direct X ?
PPSX
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan
Some Medicinal plants & Their Uses
The solid state
Printers
History of computers
Computer communication
General principles and processes of isolation of elements
Wireless computing
Microsoft office word 2007
Computer generations
Effects of drug abuse and addiction
Effects of drug abuse and addiction
Getting started with paint
Parts of computer
E‑mail
Golden Temple Picture Collection
Introducing power point 2007
Cyber crime
What is direct X ?
What is direct X ?
Shri harmandir sahib (Golden Temple) By Sahabad Gurbani Keertan

Recently uploaded (20)

PDF
Business Ethics Teaching Materials for college
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Classroom Observation Tools for Teachers
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
master seminar digital applications in india
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O7-L3 Supply Chain Operations - ICLT Program
Business Ethics Teaching Materials for college
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Classroom Observation Tools for Teachers
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
VCE English Exam - Section C Student Revision Booklet
2.FourierTransform-ShortQuestionswithAnswers.pdf
TR - Agricultural Crops Production NC III.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
master seminar digital applications in india
Week 4 Term 3 Study Techniques revisited.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPH.pptx obstetrics and gynecology in nursing
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O7-L3 Supply Chain Operations - ICLT Program

Understanding security and safe computing

  • 1. Understanding security and safe computing Protect your computer
  • 2. Understanding security and safe computing If you connect to the Internet, allow other people to use your computer, or share files with others, you should take steps to protect your computer from harm. Why? Because there are computer criminals (sometimes called hackers) who attack other people's computers. These people can attack directly, by breaking into your computer through the Internet and stealing your personal information, or indirectly, by creating malicious software to harm your computer.
  • 3. Protect your computer i. These are ways to help protect your computer against potential security threats: ii. Firewall. A firewall can help protect your computer by preventing hackers or malicious software from gaining access to it. iii. Windows Update. Windows can routinely check for updates for your computer and install them automatically. iv. Virus protection. Antivirus software can help protect your computer against viruses, worms, and other security threats. v. Spyware and other malware protection. Antispyware software can help protect your computer from spyware and other potentially unwanted software.
  • 4. Use a firewall A firewall is software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings. In this way, a firewall helps prevent hackers and malicious software from gaining access to your computer. Windows Firewall is built into Windows and is turned on automatically. If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won't bother you when that program needs to receive information in the future.
  • 7. Use virus protection  Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from your hard disk or completely disable your computer. Others don't cause direct damage, but worsen your computer's performance and stability.  Antivirus programs scan e mail and other files on your‑ computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.
  • 8. Use virus protection  Windows does not have a built-in antivirus program, but your computer manufacturer might have installed one. If not, go to the Windows 7 security software providers website to find an antivirus program.  Because new viruses are identified every day, it's important to select an antivirus program with an automatic update capability. When the antivirus software is updated, it adds new viruses to its list of viruses to check for, helping to protect your computer from new attacks. If the list of viruses is out of date, your computer is vulnerable to new threats. Updates usually require an annual subscription fee. Keep the subscription current to receive regular updates.
  • 9. Warning If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.
  • 10. Use spyware protection Spyware is software that can display advertisements, collect information about you, or change settings on your computer, generally without appropriately obtaining your consent. For example, spyware can install unwanted toolbars, links, or favorites in your web browser, change your default home page, or display pop-up ads frequently. Some spyware displays no symptoms that you can detect, but it secretly collects sensitive information, such as the websites you visit or the text you type. Most spyware is installed through free software that you download, but in some cases simply visiting a website results in a spyware infection.
  • 11. Use spyware protection To help protect your computer from spyware, use an antispyware program. This version of Windows has a built-in antispyware program called Windows Defender, which is turned on by default. Windows Defender alerts you when spyware tries to install itself on your computer. It also can scan your computer for existing spyware and then remove it. Because new spyware appears every day, Windows Defender must be regularly updated to detect and guard against the latest spyware threats. Windows Defender is updated as needed whenever you update Windows. For the highest level of protection
  • 12. Update Windows automatically Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating. That way, you don't have to worry that critical fixes for Windows might be missing from your computer. Updates are downloaded behind the scenes when you're connected to the Internet. The updates are installed at 3:00 A.M. unless you specify a different time. If you turn off your computer before then, you can install updates before shutting down. Otherwise, Windows will install them the next time you start your computer.
  • 14. Thank You Presented by MUKUL Source : Microsoft Windows