Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Protecting Your Computer (arbab)

No description

Faham Usman

on 22 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Protecting Your Computer (arbab)

Information Security
Confidential Data
Awareness Campaign
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
Protecting Your Computer
Protect from Computer Threats
Threat to Data
Backup and Recovery
Backup Media
Salim (aeCERT)
For more information
Protecting Your Computer
Protecting Your Computer
Computer has become an essential part of our lives and we use it to perform dozens of tasks e.g. paying bills, online banking transactions, shopping, etc.
These facilities are associated with some risks and so it is very important to take necessary steps to protect your computer.
UAE Stats
Companies are not confident if they can fully recover data if a downtime occurs
Businesses experienced data loss / systems downtime
Hardware failure was leading cause of data loss / system downtime
Risks associated with computers
Online fraud and
Identity theft
File-sharing abuses
Disturbing content
Online fraud and phishing
Virus is a program designed specifically to damage or copy data from your computer.
Trojan is a program that apparently seems legitimate but is actually a malicious program that damages data in a computer and steals sensitive information.

A program that spies on your computer and tracks your activities.
Attackers usually send email to users and compel them to reveal personal informatio or make online transactions.

Emails in which criminals tell you that you have won a huge amount of money and compel you to give them some money in order to receive it.
Criminals gain access to your personal information and use it to steal money, make transactions or perform other similar activities.
Spam are emails which byou have not subscribed, but still receive it.
How to Protect from Computer Threats?
You can protect your computer by using following techniques:
How to Protect from Computer Threats?
You can protect your computer by using following techniques:
Keep your Antivirus program up-to-date. Use free online tools and scanners from trusted sources.

Use known and well-reputed Antivirus programs. Be aware of fake Antivirus programs.
Antivirus software protects your computer from viruses and quarantines anything that is infected.
Desktop Firewall
Operating System Updating
Stops unauthorized inbound connections.
Can also filter outbound connections.
Should keep Desktop Firewall activated.
Updates / patches known vulnerabilities.
Users are required to restart their machines to complete the patch installation.
Should keep OS update settings to automatic download and manual installation.
Software Updating
Updates all software with latest patches.
Since users are usually required to restart their machines, it is recommended to carry out software update during off hours.
Software update process should be carried out by concerned personnel only.
Browser Updating
While using internet, there is a high probability that you end up using a malicious website or download a software that has virus attached with it.
Updating browser provides you one way of using internet securely.
While using internet, there is a high probability that you end up using a malicious website or download a software that has virus attached with it.
Complex Passwords
Frequently change passwords.
You should use complex passwords which are easy to remember but hard to guess.
Username should not be used as part of password.
Every password should contain alphanumeric and special characters.
Use passwords that contain minimum of 8 characters.
Application Download
Downloading applications from internet is one of the biggest threats as the user may be tricked to download application from a source that seems legitimate but actually contains virus/malware with it.
Always download application from legitimate source e.g. if you have to download a smartphone application, download it from its official store (App Store, Google Play, etc.).
Malicious Application
User downloads Application from an unofficial store
Downloads Malicious Application
Fake Antivirus
User downloads fake antivirus

The fake antivirus sends user’s private information to remote system
Encryption provides you a way to protect your data by encoding it in a form that can only be accessed by the person having right encryption key.
The purpose of encryption is to ensure that the data can only be seen and read by intended user.
Backup and Recovery
Backup is an extra copy of your data.
Backup is used when data is corrupted or lost.
The backup strategy defines how often and when the data will be backed up.
Backup and Recovery
Backup and Recovery - Windows
Backup and Recovery - Mac
Backup and Recovery - iCloud
Threat to Data
There are four major threats to data:
Hardware/Software Failure
Natural disaster
Criminal activity
Human error
Backup Media
Hard disk / portable
hard disk
Flash drive / USB
Remote backup
Optical disk (CD/DVD)
Full transcript