Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Solutions to

computer security
threats
Done by Jeetamitra Nayak, 11E

11:11PM
n Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section H

There are two


ways of
safeguarding our
computer system
Back to Agenda Page

n Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section H
1. Active Installing and properly using
protection an antivirus software that
includes internet security
which include protection
against threats such as
viruses, Sypware and PC
intrusions – is vital for
proper protection against
the hackers, intruders and
wrongdoers.

Back to Agenda Page


2. Preventive
Measures:
Even though security programs
may actively detect and
eliminate any threats your PC
encounters, you should always
help to prevent these issues from
ever arising.

Back to Agenda Page


Active protection Preventive measures

Solutions to 1) Keep you system up-to-date


Virus, 1) Use Anti-Virus and 2) Use Caution when downloading
Antispyware software
Adware and scan all you system for virus
files on the Internet
3) Be Careful with email
Spyware disconnect infected system Don’t download or open
immediately from you unsolicited email attachments
network Restore the infected Don’t click on link in email
system from clean backup rather type the URL on address
Notify your antivirus vendors bar
so it can ensure its signature Check for security alerts
database is upto-date Disable running of scripts and
2) Download updates regularly cookies
Run frequent full system scan Disconnect from the internet
when you are away
Back to Agenda Page 4) Disable cookie if possible
Active protection Preventive measures

Solutions to Use Anti-Spam Software


Sender Filtering: this method Keep you email address
Spam, allows only messages from your private
Use encrypted connection
approved sender list to reach
Eavesdropping you inbox- all other mail is always if you have to provide
sensitive information i.e.
quarantined for later review. It
HTTPs Install personal
is done on the basis of Digital
firewall on computer
Certificates ( specially
connected to the Internet to
formatted digital information
check incoming and outgoing
issued to website, are used to
information and connections
verify the identify of message Avoid online transaction from
sender) and Digital Signatures ( public network or public Wi-Fi
are way of authenticating the Install protection software
identity of creators or producers such as Internet Security
of digital information) software
Back to Agenda Page
Keyword filtering
Active protection Preventive measures

Solutions to Take the computer offline (it


may reduce the probability of
Phishing and infecting other devices in the Don’t open emails from
unknown sources or click on
same network with malware)
Pharming Backup all files on the hard links embedded in suspect
drive messages
List the information given to Check security guidelines of
phishing scammers (depending website such as PayPal so
on what was leaked one may that you can distinguish
need to change password, block between legitimate and bogus
credit/debit card, BUT DON’T emails
USE THE SAME COMPUTER TO Also rather than clicking on
CONTACT AGENCIES) link you can type general link
Run Antivirus software on you web browser. If you are
Contact Credit Agencies to in double DON’T CLICK
Back to Agenda Page
report any possibilities of
identify theft
Thank you!
(i spent too much time on this)

You might also like