Computer Security Resource Page

Passwords: Security passwords are the most common method to verify an individual's identity.  Many computers and websites require the use of a user identification number and password to ensure the user is actually the individual attempting to gain access.  However, many individuals use passwords that are easily guessed by malicious intruders.  Here is a video with a few useful tips to help you create a password that is more secure. 


Phishing: Hackers can attempt to trick individuals into revealing their user identification number and password.  A phishing attempt occurs when a malicious hacker sends email messages disguised as a message from a bank or other important entities.  The message is typically written in an urgent manner and encourages the recipient to click on a link to log into the system.  The hacker then captures the information the recipeient enters and can later access their account.  Here is a video explaining phishing and the things you can do to avoid falling victim. 


Virus Protection: Computer viruses are forms of malicious software that are installed on a computer and may result in the loss of computing resources or permanent damage to the computer and data.  Here is a video demonstrating a particularly deceptive method used to infect computers.  


Spyware: Similar to computer viruses, spyware is software that can be installed on your computer without your knowledge.  Spyware captures and reports information about users without their knowledge and consumes computing resources.  Here is a video explaining spyware and how you can remove and avoid spyware. Link. 

Backups: Computer hard drives can fail at any time.  It is important to be prepared for a failed computer or hard drive.  Regular backups ensure that you won't lose any data stored on your computer in the event of a failure.  Here is a video explaining several different methods to create a backup plan for your computer. 


Social Engineering: Malicious attacks are most commonly initiated through social engineering.  Social engineering are the methods used to manipulate people into providing confidential information.  Here is a video describing how social engineering is carried out and how to avoid becoming a victim. 


Firewalls: Firewalls are used to help protect network-connected computers.  Here is a brief video explaining the purpose of firewalls in defending information and computer resources.