Information securityInformation security
Some files contain sensitive data Some files contain sensitive data
like ( research for new product , like ( research for new product ,
management accounts )management accounts )
so we should protect it so we should protect it
We must protect data against
Lose data
Hackers
viruses
Lose data
The Importance of shutting down your The Importance of shutting down your
ComputerComputer
When you are using a windows , its When you are using a windows , its
important to remember that switching off important to remember that switching off
the computer or losing power (power the computer or losing power (power
cut) can cause lose data , to protect cut) can cause lose data , to protect
against this you should save your work against this you should save your work
regularly regularly
When you shutdown your computer you When you shutdown your computer you
data will save automatically data will save automatically
UPS ( Un – interruptible power supply )UPS ( Un – interruptible power supply )
Its device which you can Its device which you can
attached to your attached to your
computer which will computer which will
guard against power guard against power
cuts cuts
It contains a batteries It contains a batteries
which will keep your which will keep your
computer alive along computer alive along
enough for you to use enough for you to use
the shutdown the shutdown
Back upBack up
The most important thing that you The most important thing that you
store on your computer is store on your computer is
information. information.
Often the contents of a hard disk Often the contents of a hard disk
can represent years of work. can represent years of work.
If the hard disk stops working one If the hard disk stops working one
day you could lose all those day you could lose all those
years of work. years of work.
For this reason it is VITAL that For this reason it is VITAL that
you take regular backups of the you take regular backups of the
information that is stored on the information that is stored on the
computer. computer.
Organize your computer for more Organize your computer for more
efficient backupsefficient backups
Complete vs. incremental backupsComplete vs. incremental backups
Use 'off-site' storageUse 'off-site' storage
Beware of 'open files‘Beware of 'open files‘
Hackers
Access rightAccess right
Are intended to protect a company intellectual propertyAre intended to protect a company intellectual property
Determine which files individuals can read or change on Determine which files individuals can read or change on
the networkthe network
You can access to the network by using User name and You can access to the network by using User name and
PasswordPassword
User ID and PasswordUser ID and Password
A user ID is normally use to log in to a computer or A user ID is normally use to log in to a computer or
computer networkcomputer network
Use a password which is only known to youUse a password which is only known to you
The password guarantees that no one can access The password guarantees that no one can access
network and impersonate you network and impersonate you
The idea of access rights is that you only have the ability The idea of access rights is that you only have the ability
to connect to or share devices which you have authority to connect to or share devices which you have authority
to use to use
Using a secure passwordUsing a secure password
Is important to chose a password which Is important to chose a password which
can not be easily guessed by other people can not be easily guessed by other people
It should be at least 8 characters and It should be at least 8 characters and
contain mixture of number and wordcontain mixture of number and word
You should to change your password You should to change your password
regularly regularly
What if your laptop stolenWhat if your laptop stolen
You must have a back up to You must have a back up to
your important file to your important file to restore itrestore it
You must make a password to You must make a password to
your laptopyour laptop
to prevent to prevent misuse the misuse the
confidential dataconfidential data
VirusVirus
Computer VirusComputer Virus
What are computer What are computer
viruses?viruses?
How infect your How infect your
computercomputer
How do you protect How do you protect
computers from computers from
attacks attacks
Anti virus updateAnti virus update