9781435483712_PPT_ch02 - Cyber Safety Chapter 2: Basic...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 2: Basic Security Procedures Copyright by EC-Council All rights Objectives  Appreciate the importance of security in daily routines  Understand how to harden your operating system and deploy patches  Configure update schedules for your operating system  Disable unnecessary services Copyright by EC-Council All rights Objectives (contd.)  Create strong passwords  Disable guest account access  Convert folders into private folders  Understand macro security settings in common Microsoft Office applications Copyright by EC-Council All rights Case Example  Jean has recently purchased a personal computer  She gets it preinstalled with MS Windows XP home edition and has purchased other software she would need  Jean is eager to connect to the Internet and access her e-mail  She connects to the ISP and when online, begins chatting with a friend  Approximately an hour later, she finds her machine responding erratically and it restarts on its own Copyright by EC-Council All rights Introduction  This chapter explains:  Some of the basic security procedures or practices one can adopt to address security proactively  How to take charge of the security settings on your personal computer Copyright by EC-Council All rights Why You Should Worry About Computer Security  Regular computer user in small office or home environments needs to have a greater awareness of security  Personal information  Information collected that applies to a person (or corporation) and would be considered private...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 24

9781435483712_PPT_ch02 - Cyber Safety Chapter 2: Basic...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online