Best practices of computer security

44 %
56 %
Information about Best practices of computer security
Education

Published on July 21, 2009

Author: qabiria

Source: slideshare.net

Description

Sample of a webinar about computer threats and defense.
http://www.qabiria.com/index.php/en/courses.html

Best practices of computer security a webinar by Qabiria Studio S.L.N.E. http://www.qabiria.com www.qabiria.com

Contents  Why security is so important?  What are the real threats?  What can you do as a defense? Active and passive security Data backup www.qabiria.com

How safe are you?  Users’ awareness  Law vacuum  Identify vulnerabilities  Organize defense  Maintain a responsible behaviour www.qabiria.com

What is at risk?  Our time  Our money  Our data  Our privacy  Our identity www.qabiria.com

Vulnerabilities  Where do attacks come from?  How do crime works online?  Vandalism  Microsoft’s responsibilities www.qabiria.com

Women and children first…  Alternatives to Windows  Risks of piracy  Advantages of open-source solutions  Free support  Readiness  Peer review guaranteed  User- instead of profit-oriented solutions www.qabiria.com

Better safe than sorry  Strenghten the weakest link  Don’t be an easy mark  Never lower your guard  Verify the authenticity of instructions before following them www.qabiria.com

Authentification  The safe password doesn’t exist  10 characters = ~600.000.000.000 attempts  Time + brute force = any password  Chocolate bar = 70%+ of passwords (source: BBC)  The risk of keylogger  Password recovery www.qabiria.com

External factors  Power surges  Lightnings  Negligence  Theft/fire  Interferences www.qabiria.com

Thank you For further information: http://www.qabiria.com All our training courses: http://www.qabiria.com/index.php/en/courses.html www.qabiria.com

Add a comment

Related presentations

Related pages

Indiana University: Best Practices for Computer Security

These instructions describe best practices for securing your computer, accounts, and the data stored on them. Information Security Best Practices contains ...
Read more

10 security best practice guidelines for consumers | ZDNet

10 security best practice guidelines for consumers. ... Don't click on popup windows that tell you that your computer is infected with a virus: ...
Read more

Enterprise Security Best Practices - technet.microsoft.com

Enterprise Security Best Practices ... Any computer within your network that is connected to ... To strengthen your security infrastructure and ...
Read more

"Top 10 List" of Good Computing Practices - UC Santa Cruz

General good computing practices and tips that apply to most people who use a computer. ... Reporting computer security incidents...
Read more

10 Best Practices for Cyber Security in 2016 | ObserveIT

Take a look at the list and see if any of these best practices for cyber security have gotten lost as ... your users on cyber security best practices.
Read more

10 Important Computer Security Practices You Should Follow

There’s no way to make a complete list of all the best computer security practices, so we’re sure we’ve missed some important ones.
Read more

Best Practices for Enterprise Security - msdn.microsoft.com

Data and transaction security is of paramount importance in this age of rapidly expanding commercial and government computer networks and the emerging ...
Read more

Security Best Practices: Stopping malware and other ...

Security Best Practices; ... Best Practices: ... Review mail security and gateway blocking effectiveness.
Read more

Network Security Policy: Best Practices White Paper - Cisco

Network Security Policy: Best Practices White Paper. Download. Print. Available Languages. ... guidelines for improving their security practices, ...
Read more

10 security best practice guidelines for businesses | ZDNet

Here are 10 best practices that provide ... 10 security best practice guidelines for ... Symantec produces some of the security industry's best ...
Read more