Introduction to Computer Security

Introduction To Computer Security-Free PDF

  • Date:23 Nov 2020
  • Views:13
  • Downloads:0
  • Pages:19
  • Size:400.86 KB

Share Pdf : Introduction To Computer Security

Download and Preview : Introduction To Computer Security

Report CopyRight/DMCA Form For : Introduction To Computer Security


What is Computer,Computer Security is the,protection of computing. systems and the data that,they store or access,Why is Computer Security. Computer Security allows the,University to carry out its mission by. l Enabling people to carry out their jobs,education and research. l Supporting critical business processes,l Protecting personal and sensitive information.
Why do I need to learn about,Computer Security,Isn t this just an IT Problem. Good Security Standards,follow the 90 10 Rule,l 10 of security safeguards are technical. l 90 of security safeguards rely on the,computer user YOU to adhere to good. computing practices,Example The lock on the door is the 10 You. remembering to lock the lock checking to see if the. door is closed ensuring others do not prop the door. open keeping control of the keys etc is the 90,You need both parts for effective security.
What Does This Mean for Me,l This means that everyone who uses a computer. or mobile device needs to understand how to keep,their computer devices and data secure. Information Security is,everyone s responsibility,l Members of the UCSC community are also. responsible for familiarizing themselves and,complying with all University policies procedures. and standards relating to information security,http its ucsc edu policies.
SEC Y Objectives,l Learn good computing security,l Incorporate these practices into your. everyday routine Encourage others to,do so as well. l Report anything unusual Notify your,supervisor and the ITS Support Center if you. become aware of a suspected security,incident 8,The Internet can be. a hazardous place,How many attacks to computers on campus.
do you think take place everyday,l Thousands of attacks per minute. bombard our campus network,l An unprotected,computer can. become infected,or compromised, within a few I just keep finding new ways to break in. seconds after it,is connected to,the network,A compromised computer is a. hazard to everyone else too,not just to you,Quiz A hacked computer can be used.
to select all that apply,a Record keystrokes and steal passwords. b Send spam and phishing emails,c Harvest and sell email addresses and passwords. d Access restricted or personal information on your computer. or other systems that you have access to,e Infect other systems. f Hide programs that launch attacks on other computers. g Illegally distribute music movies and software,h Distribute child pornography. i Generate large volumes of traffic slowing down the entire system. See next page for answer 12,Of course the answer is.
All of the above,A compromised computer can be used. for all kinds of surprising things,Many cyber security threats are. largely avoidable Some key steps,that everyone can take include 1 of 2. l Use good cryptic passwords that can t be easily guessed. and keep your passwords secret, l Make sure your computer devices and applications apps. are current and up to date, l Make sure your computer is protected with up to date.
anti virus and anti spyware software, l Don t click on unknown or unsolicited links or attachments. and don t download unknown files or programs onto your. computer or other devices,Key steps continued 2 of 2. l Remember that information and passwords sent via. standard unencrypted wireless are especially easy,for hackers to intercept. To help reduce the risk look for https in the URL before. you enter any sensitive information or a password,the s stands for secure. Also avoid standard unencrypted email and unencrypted. Instant Messaging IM if you re concerned about privacy. l See ITS Top 10 List and the other links on the training. page for more,Top 10 List http its ucsc edu security top10 html.
Training page http its ucsc edu security training index html cs. Computer Security Isn t this just an IT Problem 6 10 of security safeguards are technical 90 of security safeguards rely on the computer user YOU to adhere to good computing practices Example The lock on the door is the 10 You remembering to lock the lock checking to see if the door is closed ensuring others do not prop the door open keeping control of the keys etc is

Related Books