tailieunhanh - Lecture Management information systems (3rd Edition): Plug it in seven - Rainer, Prince, Watson

Plug IT in 7: Protecting your information assets. In this chapter, the learning objectives are: Explain why it is critical that you protect your information assets, identify the various behavioral actions you can take to protect your information assets, identify the various computer-based actions you can take to protect your information assets. | PLUG IT IN SEVEN Protecting Your Information Assets OUTLINE How to Protect Your Assets: The Basics Behavioral Actions to Protect Your Information Assets Computer-Based Actions to Protect Your Information Assets LEARNING OBJECTIVES Explain why it is critical that you protect your information assets Identify the various behavioral actions you can take to protect your information assets Identify the various computer-based actions you can take to protect your information assets How to Protect Your Assets: The Basics Two types of actions to protect your information assets Behavioral actions Computer-based actions Behavioral Actions to Protect Your Information Assets Never provide personal information to strangers in any format (physical, verbal, or electronic) Securing your credit cards Pay attention to credit card billing cycles Limit debit card usage Do not use a personal mailbox at home or apartment for anything other than catalogs and magazines Cross-cut or confetti-shred mails and old records Sign up with a company that protects personal information Computer-Based Actions to Protect Your Information Assets Determining where people have visited on the internet using your computer The dangers of social networking sites Determining if your computer is infected with malicious software (malware) Computer Actions to Prevent Malware Infections Never Open unrequested attachments to e-mail files Open attachments or web links in e-mails from unknown people Accept files from chat or instant messaging Download files/software over the internet from unknown web sites Download unrequested files/software Test your system to evaluate how well your system is protected from a variety of attacks Computer Actions to Prevent Malware Infections Install Security suite Anti-malware product Antispyware product Monitoring software Content-filtering software Antispam software Proactive intrusion detection and prevention software Manage patches Use a browser other than internet explorer Use an operating system other than windows Protecting Your Portable Devices and Information Prevent the theft Use two-factor authentication Encrypt your data Safety Features in Internet Explorer 9 Protected Mode ActiveX Opt-In Fix My Settings Widows Defender Personal Data Safeguards Personal Data Safeguards Phishing Filter Delete Browsing History Safety Features in Internet Explorer 9 InPrivate Domain Highlighting SmartScreen Filter Add-on Manager Cross-site Scripting Filter A 128-Bit Secure Connection for Using Secure Web Sites Other Actions That You Can Take on Your Computer Detecting worms and Trojan horses Detecting spoofed (fake) web sites Turning off peer-to-peer file sharing Looking for new and unusual files Preparing for personal disasters Restoring backup files Protecting Your Privacy Use strong passwords Adjusting the privacy settings on your computer Surf the web anonymously E-mail anonymously Erasing your Google search history Wireless Security Hide your Service Set Identifier (SSID) Use encryption Filter out Media Access Control (MAC) addresses Limit Internet Protocol (IP) addresses Sniff out intruders Using a public hotspot Test your wireless network Wireless security software

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.