Free Essay

How to Make a Computer Safe

In:

Submitted By malvykay
Words 619
Pages 3
How to make computer safe

Nowadays people’s lives revolve around computers Internet shopping, internet banking, storage of valuable information communication, to site a few. The need to secure and protect the computer comes to be of great importance.
Make the computer safe from what? * From hackers * Viruses, internet worms. * Corrupt registry, pc errors * Crashing of hard drive, operating system failure * Unauthorized users, spies * Online threats * Internet scams * Protection against pornographic material * Physical damage

WAYS TO MAKE THE COMPUTER SAFE

1. FIREWALL: Because the internet is a public network, any connected computer can find and connect to any other connected computer. A firewall is a barrier between the internet and your own computer or network.

A firewall protects you against: * Hackers breaking into your computer. * Worms – types of viruses that spread from computer to computer over the internet. * Some outgoing traffic originating from a virus infection.
Solution: Check if your Windows Firewall is switched on.

2. Viruses and Spyware: A virus is a file written with the sole intention of doing harm, or for criminal activity. There are many types of virus.

The Risks
Viruses and spyware can attack your computer via the following means: * Opening infected email attachments such as .exe files. * Opening infected files from web-based digital file delivery companies (for example YouSendIt, Dropbox). * Visiting corrupt websites. * Via the internet, undetected by the user (worms are an example of this). * Macros in application documents (word processing, spreadsheets etc). * USB connected devices (eg memory sticks, external hard drives, MP3 players). * CDs/DVDs.

Viruses and spyware can cause very serious consequences including: * Identity theft. * Fraud. * Deletion, theft and corruption of data. * A slow or unusable computer.

SOLUTION: Antivirus Software
It is vital to keep your antivirus software up to date in order to provide the most complete protection 3. Backups:
The information held on your computer may be irreplaceable. Regularly backing up your data will ensure that you have more than one copy.
The Risks
Get started ... * Hardware failure (for example, hard drive failure is a frequent occurrence). * Accidental file deletion. * Theft. * Fire, flood, accidental damage. * Catastrophic virus or spyware infections. * File deletion during operating system upgrades.
SOLUTION:

* Ensure that all your important data is backed up regularly to a safe place. * Ensure that your backed up data will always be retrievable when you need it. * Backup information on external hardrive, DVD or back up on online storage Cloud Backup on websites like DropBox.

4. Passwords:
Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password.

Choosing the Best Passwords: * Always use a password. * Choose a password with a combination of upper and lower case letters, numbers and keyboard symbols such as @ # $ % ^ & * ( ) _ +. (for example SP1D3Rm@n – a variation of spiderman, with letters, numbers, upper and lower case). However, be aware that some of these punctuation marks may be difficult to enter on foreign keyboards. * Choose a password containing at least eight characters. However, longer passwords are harder for criminals to guess or break.

5. Spam and Scam emails: email is both an excellent communication tool and also a way that companies can inform you about their latest products and services. However, email is frequently used to deliver unwanted material which is at best, annoying and at worst, malicious – causing considerable harm to your computer and yourself.

Solution: * Always be vigilant when receiving or responding to emails. * Make sure your spam filter is always switched on to minimise the risks

Similar Documents

Premium Essay

Importance of Firewall

...Importance of Firewall The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed to pass through...

Words: 529 - Pages: 3

Free Essay

Keylogg Detector

...How to detect if a Keylogger is installed? - Microsoft Answers 1 of 8 Applies To: Windows Windows Vista http://answers.microsoft.com/en-us/windows/forum/windows_vista-sec... Security, Privacy, and User Accounts Question Secure_Leonilo asked on August 22, 2010 How to detect if a Keylogger is installed? Hi, I would like to get some help... I suspect that the computer I use at work probably has a keylogger installed. Could you recommend an online, free, and reliable tool to detect keylogger? Please recommend a couple of tools, so I can try them in case one doesn't detect anything. On the other hand... is it possible to know where the log files generated by the keylogger are sent to? As far as I know, they are sent to an email address that belongs to the person who has installed the keylogger on someone else's computer, so that he can see all the victim types. I suspect that I got keylogger installed from a work partner. thanks a lot in advance! Reply Reply with quote Report abuse Email updates Answer A. User replied on August 22, 2010 Was this helpful? 1 Vote Try these Programs: If necessary, do all the work inSafe Mode with Networking. To get intoSafe Mode with Networking, tap F8 right at Power On / Startup, and use UP arrow key to get toSafe Mode with Networking from list of options, then hit ENTER. Read all info below before starting: http://www.malwarebytes.org/mbam.php Malwarebytes is as the name says, a Malware Remover...

Words: 3159 - Pages: 13

Free Essay

Business

...Task 1 – Understand how health and safety legislation and regulations affect a business working environment Create a business report, in a professional format; you are to explain the legal requirements and regulations for ensuring the health, safety and security of those employed in the business. This should include details of the legislation which would apply, starting with the Health and Safety at Work Act 1974 and others. After describing the main legislations you should report on how the legal requirements can be implemented. This should include reference to workplace policies, reporting procedures, management responsibilities, harmful work practices and individual responsibility Business legal requirements and regulations for health and safety requirements and regulations in the work place health and safety at Tesco The Health and Safety at Work Act 1974 Act sets out the overall responsibilities which businesses and mainly Asda have to follow with regards to employees and members of the public. Employees also need to take responsibilities for themselves and for each other. These responsibilities include looking after the business and people working in the business to ensure everyone at their work place is safe. For example in the business and the staff follow the Act by my making the organisations follow these acts about the health and safety and to make sure the business are in a good safe working environment and everyone at that work place is safe and treat in good...

Words: 1602 - Pages: 7

Free Essay

Strategic Plan I

...of the business. In this paper I will define my business, products, services, and customers by developing a mission statement. I will create a vision for this business that clearly demonstrates my decision on what I want my business to become in the future. I will define my guiding principles of my business by considering the topics of culture, social responsibility, and ethics. I will analyze how the vision, mission, and values that guide my business’s strategic direction. I will evaluate how the business addresses customers’ needs and critique how they achieve competitive advantage. Mission and Vision Statement Mr. D’s Cyber Café, unlike similar café’s, will provide a unique atmosphere for communication and entertainment though the use of high speed Internet. Mr. D’s Cyber Café is the answer to the public’s demand for easy access for communication and large volume of information found on the Internet, affordable cost for entertainment and in such a way that will not leave them socially, economically, or politically isolated. Mr. D’s Cyber Café is to provide the community with a safe, social, educational, and entertaining atmosphere for people of all ages through the use of worldwide communication. The vision statement for Mr. D’s Cyber Café is as follows. To become the leading Internet Cyber Café in the Lincoln County region with a commitment to meet or even exceeds the customers’ needs and satisfaction. Mr. D’s Cyber Café aims to be the safest and most trusted Internet Cyber...

Words: 1293 - Pages: 6

Premium Essay

Hgfhg

...Threats to Information Security and it’s Measures Abstract Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats. Introduction Computer technology is more and more ubiquitous; the penetration of computer in society is a welcome step towards modernization but society needs to be better equipped to grapple with challenges associated with technology. New hacking techniques are used to penetrate in the network and the security vulnerabilities which are not often discovered create difficulty for the security professionals in order to catch hackers. The difficulties of staying up to date with security issues within the realm of IT education are due to the lack of current information. The recent research is focused on bringing quality security training combined with rapidly changing technology. Online networking security is to provide...

Words: 1669 - Pages: 7

Premium Essay

Health And Social Care Level 3 Unit 2 D1

...customer data etc. The smart scan for this application allows the user to combine antivirus, software updates, network security and performance scans into one. There is a Wi-Fi inspector where the user can find any problems that may be putting your computer system at risk (done by using the network scan tool). If the user has any “risky” files in which they want to run, Avast have a sandbox feature which allows the user to put the file into a safe space and run it from there and won’t affect the PC in any way as the file has been isolated. Real site is a feature that informs the user whether the website is real and safe to visit. There is an Anti-spam feature that removes any phishing emails from you and your employees inbox. And finally there is the Rescue disk feature where if the user has a special external drive they are able to scan the computer before the OS starts up, this can help combat deep rooted malware that could be damaging your computer. Overall this piece of software for 20 devices costs over, £428.60 for 1 year, £643.00 for 2 years and £771.60 for 3 years. SolarWinds...

Words: 1281 - Pages: 6

Premium Essay

Computer Hardware Fundamentals

...to disposing of old computers, was making sure all of your personal data was wiped, not about recycling. I think one of the most important things you can do when getting ready to dispose of a computer is to make sure you properly delete all personal information that may be left over on your hard drive. People have computers that “die” or are not able to work anymore, so they might think just throwing them away is safe. But someone who has even a little knowledge about computers can easily open up your laptop or desktop and take out your hard drive. Hooked up to another computer, it would be very easy for them to scan it for personal information. t’s odd to think about replacing a motherboard, because I have actually considered this on personal computers I have owned in the past. But when I talk with some friends who are not as comfortable with changing out hardware, they often times feel so lost because they are not really sure what to look for when purchasing components, such as a motherboard. I think the first thing you need to decide on when shopping for a motherboard, is what is it going to be used for? Are you using your computer for just checking emails and Facebook? Or will you be doing some heavy processing, such as gaming or video editing? I would assume that someone who is actually shopping for a motherboard is doing so because they want to upgrade their computer. So it’s probably a safe bet to assume they will...

Words: 3676 - Pages: 15

Free Essay

Virus

...Abstract The Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor. Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and fun...

Words: 2674 - Pages: 11

Premium Essay

Is3220 Unit 3 Discussion 1

...Sean Shields (15314971) Sean Shields (15314971) 5 Policy’s [Document subtitle] 5 Policy’s [Document subtitle] PASSWORDS POLICY 1.0 Overview All employees and personnel that have access to computer systems must adhere to the password policies defined below in order to protect the security of the network, protect data integrity, and protect computer systems. 2.0 Purpose This policy is designed to protect the organizational resources on the network by requiring strong passwords along with protection of these passwords, and establishing a minimum time between changes to passwords. 3.0 Scope This policy applies to any and all personnel who have any form of computer account requiring a password on the organizational network including but not limited to a domain account and e-mail account. 4.0 Password Protection Never write passwords down. Never send a password through email. Never tell anyone your password. Never reveal your password over the telephone. Never use the "Remember Password" feature of any application programs. If anyone asks for your password, refer them to your IT computer security office. Don't use names of people or places as part of your password. Don't use part of your login name in your password. Don't use parts of numbers easily remembered such as phone numbers, social security numbers, or street addresses. Be careful about letting someone see you type your password. 5.0 Password Requirements Minimum Length - 8 characters Maximum Length...

Words: 1383 - Pages: 6

Premium Essay

Importance of Firewall

...in their network. The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed to pass through...

Words: 1017 - Pages: 5

Free Essay

Security Tips

...responsibilities with their employer when it comes to keeping their computers and data safe. Employers can predict lots of issues and put barriers in place, but with new viruses and new hackers being produced every day there is no way that the security on your employer’s servers and firewalls can catch everything. There are several things that employees can look out for everyday to help prevent their individual computer being attacked and their data being made vulnerable. Internet, e-mail, passwords and sharing data probably rank as the top 4 ways employees allow their information to become exposed. Let us begin by exploring how you can help keep your data safe, while still getting your job done if you require internet access. Basic advice of internet security 101 would be to not download anything that you do not know the source. Pop ups for advertisements are a main source for opening websites or downloading information that has a virus. When viewing websites or downloading information from various websites, look for the SSL symbol. SSL stands for Secure Sockets Layer and the symbol is a little pad lock in the bottom right hand corner of your internet browser. “SSL is the transaction security protocol used by websites to protect online communications. The most common use of SSL is to provide protection for confidential data, such as personal details or credit card information, entered into a website” (“How SSL Certificates Work”, 2011). Without e-mail most businesses...

Words: 784 - Pages: 4

Premium Essay

P1 Unit 2 Business Describe the Recruitment Documentation Used in a Selected Organisation

...making sure all the machinery and plant (where manufacturing takes place; labelling, bottling, filling machines etc.) work well and are in good condition. Coca Cola has resources such as different buildings and facilities for eg; They have office buildings to make sure they seem presentable and professional; their office properties have a modern look with a presentable entrance and reception, conference rooms, lecture rooms, also comfortable lounges for the guests and staff at Coca Cola. The Coca Cola head offices have departments like the ICT, human resources, marketing and sales, also finance because these areas will work more efficiently in an office setting which consists of the appropriate equipment, chairs, tables, computers, organised space etc. For example in the ICT departments walking in you may find more hardware than in any other department for eg; marketing and sales. ICT departments are equipped and stocked with a lot of wide screen professional computers, connection to internet, also printers and scanners, equipment other departments might not know how to use. Human resource departments are mainly responsible for employee paper work so their facilities would mostly include desks, a computer, chairs, tables, connection to...

Words: 2682 - Pages: 11

Premium Essay

How Computers Change the Way We Think

...How Computers Change the Way We Think By SHERRY TURKLE The tools we use to think change the ways in which we think. The invention of written language brought about a radical shift in how we process, organize, store, and transmit representations of the world. Although writing remains our primary information technology, today when we think about the impact of technology on our habits of mind, we think primarily of the computer. My first encounters with how computers change the way we think came soon after I joined the faculty at the Massachusetts Institute of Technology in the late 1970s, at the end of the era of the slide rule and the beginning of the era of the personal computer. At a lunch for new faculty members, several senior professors in engineering complained that the transition from slide rules to calculators had affected their students' ability to deal with issues of scale. When students used slide rules, they had to insert decimal points themselves. The professors insisted that that required students to maintain a mental sense of scale, whereas those who relied on calculators made frequent errors in orders of magnitude. Additionally, the students with calculators had lost their ability to do "back of the envelope" calculations, and with that, an intuitive feel for the material. That same semester, I taught a course in the history of psychology. There, I experienced the impact of computational objects on students' ideas about their emotional lives. My class...

Words: 2653 - Pages: 11

Free Essay

P5 of Business Communication

...obtained lawfully and updated. This act makes regulation on disclosure of people’s information. | Santander protects all the information of their customers as it should be confidential and should not be shared with anybody else outside the organisation for personal uses. In order to this, the staff has their own login password and they lock their screens off when they go away to make sure that no one can access it to their customers details. | Freedom Of Information Act 2000 | This act enables people to get their information from council as it is a part of public authority. However, they could be asked to pay money for the costs if it exceeds appropriate limit. The public authority should tell if they have any information and if they do then they must send it to the person who has made a request within 20 working days. | Santander Bank has a lot of information about their customers when they open up a bank account for them and it’s necessary for them to gather information so that they could offer their customers latest products and services. This act enables their customers to make a request of their information pack that Santander Bank holds. Santander Bank should send the details/ information they have to their customers within 20 working days in the requested format. The request must be in writing either letter or an email and should contain the name of the applicant, address and the description of the information required. | Computer Misuse Act 1990 | This Act enacts against...

Words: 1221 - Pages: 5

Free Essay

Case Study

...How does the XO computer provide learning opportunities for children in poor regions of the world? XO computer can help children in poor region of the world by providing more opportunities to study. By an ultra-bright screen readable in daylight; when flipped, it converts to an electronic book reader, children in poor regions where there is no light at night (lack of power) can study not only in the morning but also in the evening. With XO’s special networking, children can download or read more book that they like. What issues could these children encounter if they have an XO laptop? How will cloud computing play an important role in the XO laptop, especially in terms of keeping costs low and data safe? The cost will encourage people in poor countries to make purchase cause it low cost and data safe. In general, what people think about laptop is a fancy and uncontrollable technology divide. However, XO comes with low cost and data safe that even put parent in worries-free zone when they decide to make a purchase. What do you think the typical environment will be like where the XO laptop will be used? XO laptop will provide an environment that full of hunger for knowledge. Children who using XO laptop will try to learn how to use it to communicate with their friends and show up to each other what did they learn from the XO. What issues will users of the XO laptop encounter that are not common in the United States? Not enough information to do research. Hunger for...

Words: 307 - Pages: 2