Loading

Module 1: Computer Security and Privacy

Notes
Study Reminders
Support
Text Version

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

Module Summary
* MODULE SUMMARY Module Summary Scroll down to read
each description.

Introduction to Computer Security and Privacy

Your computer needs protection from various security and privacy
threats. The threats can be in the form of:

* Natural disasters
* Human errors or accidents
* Malicious acts like theft, unauthorized access by computer hackers, or
virus attacks

Both standalone computers and computers on a network face these threats.
You need to take some security measures to protect your computer's
hardware, software, and data.

[Introduction to Computer Security and Privacy]

Protecting Your Computer

You need to protect your computer and the data stored on it from various
security and privacy threats. Take the following measures to protect the
operating system, software, and data on your computer:

* Implement user identification.
* Set username and password.
* Keep passwords secure.
* Use lock combination.
* Encrypt data to prevent unauthorized access.
* Back up data in another storage device.
* Update system and vulnerable software.

The computers connected to a network or to the Internet require some more
security measures than standalone computers. For computers connected to a
network, some good practices are:

* Use updated security software.
* Protect your computer against hacking and spyware.
* Clear history and cache periodically.
* Delete cookies periodically.
* Perform online transactions only on secure sites.
* Never give out your personal history to a Web site.
* Enable and configure security components in the Windows Security
Center.
* Disable active content.
* Use security help from your ISPs.

E-mail attachments can be carriers of viruses or worms. Some security
measures that you should follow while using e-mail or chat are:

* Use updated security software.
* Avoid opening e-mail messages that have attachments.
* Delete junk e-mail messages or spam messages.
* Delete unsolicited commercial e-mail messages.
* Protect yourself from phishing.
* Limit chat activity to the people you know.

[Protecting Your Computer]

Protecting Your Family from Security Threats

To protect the privacy of your computer, you can take some safety
measures, such as:

* Shield your identity.
* Regularly check your computer's security status.
* Run virus scans daily.
* Use antispyware software.
* Perform online transactions on secure Web sites with reputable vendors.
* Report abuse to ISP.
* Eliminate or reduce spam.
* Encrypt sensitive e-mail to prevent unauthorized access.

[Protecting Your Family from Security Threats]

Keeping Your Computer Secure and Updated

Proper security settings on your computer can prevent and detect
unauthorized access of your computer through the Internet. The Windows
Security Center provides the following security settings:

* Internet Options
* Windows Firewall
* Automatic Updates
* Malware Protection

For better security of your computer, check the security settings and
modify them if required.The measures that you can take to keep your
computer up-to-date are:

* Keep your computer updated by downloading necessary security updates
from the Microsoft Update Web site.
* Configure Automatic Updates to enable your computer automatically
download and install security updates.

[Keeping Your Computer Secure and Updated]

Computer Ethics

The owner of an intellectual property has the exclusive rights to use
the property. The copyright laws protect the rights toward intellectual
properties. Copyright violation can be in the form of the following:

* Plagiarism
* Software piracy
* Unauthorized download of copyrighted material from Web sites

There are some legal ways to use copyrighted materials. To legally use
copyrighted material:

* Make limited use of copyrighted material for educational purposes and
mention the source.
* Provide references or links to a copyrighted material, instead of
copying it.
* Seek and gather permission to use the material from the copyright
owner.

The Internet provides you with the facility to get involved in illegal
and unethical activities, such as defaming someone, gambling, or buying
items that are illegal to buy or sell in your country. Therefore, be aware
of local and international laws before indulging in any such activity.

[Computer Ethics]