9781435483712_PPT_ch03 - Cyber Safety Chapter 3: Desktop...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 3: Desktop Security Copyright © by EC-Council All Objectives  Share files  Hide files  Transfer and download files  Back up and restore data Copyright © by EC-Council All Objectives (cont’d.)  Encrypt and decrypt files  Lock your workstation  Use Task Manager to kill suspicious processes  Take precautions while downloading files and DLLs Copyright © by EC-Council All Case Example  Jane has recently joined an equity research firm as a research assistant  Her job involves profiling corporate value and risk issues, and keeping investors informed about their choices  Because of the sensitive nature of her job, Jane must secure her desktop from unauthorized access and take needed precautions to secure her data Copyright © by EC-Council All Introduction  This chapter:  Explores some of the challenges that arise in the workplace when it comes to securing computers and their files  Suggests ways to address these challenges Copyright © by EC-Council All File Sharing  File sharing  Sharing data over a network  Also refers to the users being allotted the same or different levels of access privilege  Important points to keep in mind:  Only folders can be shared—not files  Shared folders are only related to users who access the folder over a network  When a copy of the shared folder is made, only the original shared folder is shared  When the shared folder is moved from its original position, the folder will lose its sharing Copyright © by EC-Council All Default Share  Default share  Method of folder sharing that would not require any specific access permissions apart from the share designation  Can be created locally or on a network  All users of the local machine can have access to the shared folder if the user sets a default local share  When the user sets a default network share in a workgroup setting, all users in the workgroup can access the files Copyright © by EC-Council All Restricted Share  Restricted share  Method of folder sharing that contains more restrictions than a default share  Can be created locally or on a network  User can restrict the number of users who can access the share at a particular given time  User is also allowed to designate specific users who can access the share and allot permissions to control user activity on the share Copyright © by EC-Council All How to Share a Folder Copyright © by EC-Council All Configuring Shared Folder Permissions  Steps to restrict access to your folders: ...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 36

9781435483712_PPT_ch03 - Cyber Safety Chapter 3: Desktop...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online