By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Security, Privacy, and Ethics Online Computer Crimes.
The Internet = A World of Opportunities
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Video Following is a video of what can happen if you don’t update your security settings! security.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Cyber crime & Security Prepared by : Rughani Zarana.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Computer Crimes Career & Technology Education Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Computer Security Keeping you and your computer safe in the digital world.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Unit 4 IT Security Kerris Davies.
Presentation transcript:

By: Matthew Newsome

 The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.  North America, Australia, and Europe are the leading areas in the world with the most internet usage.

Google Chrome- A web browser used by Google. Internet Explore- A internet browser developed by Microsoft Opera- Began in 1994 and was developed by a Norwegian Telecommunications Company. Mozilla Firefox- Second largest internet browser. Netscape- founded by the Mosaic Communications Corporation and second company to emphasize on the term “world wide web” Safari- A graphical web browser developed by apple

 Trojan Horse Virus  Worms (Virus)  Virus  Boot Virus  Stealth Virus  Polymorphic Virus  Macro Virus  The Mobile Virus

 Disguise themselves as useful software from the internet, but most people are fooled and download the virus.  The name Trojan comes from the mythical “Trojan Horse” from the city of Troy.  Two Parts  The Client and Server  Client- disguised and has significant amount of software and this is the type that tricks people.  Server- has a high level of control over your computer that can lead to destruction on your computer.

 A worm is self-replicating and can send copies of itself to other computers that are on the same network.  The Morris worm and Mydoom worms can cause major damage to your computer because of the increased internet traffic and other effects.  Payload- very important.  It is a code that does more than what a worm does. It can delete files on a host system and send documents that you don’t want to send via . “1 in 4 worms spread through infected USB devices.” articles.winferno.com/antivirus/computer-worms/

 A computer code sent by with an attachment.  It causes very harmful effects  Destroying files on your hard disk  The attachment can be sent to everyone in your contact list, which means that the virus is now being spread.  Prevention- Don’t open the file, install anti-virus software to detect and scan the virus.

 Infects the Microsoft Windows Operating Systems  It does not cause files to be deleted nor loss of information.  Spreads through unprotected disks easily  Deletes the original partition table and creates another partition table.

 A computer virus that uses various amounts of mechanisms to avoid detection of antivirus software.  The virus can monitor system activity as well as maintaining a copy of the original unaffected data.

 A polymorphic Virus is used to avoid the pattern recognition from antivirus software.

A virus written in macro language A series of commands and actions that automate tasks. Can be spread through attachments, networks, modems, and of course the internet! Very difficult to detect!

A specific virus that targets cell/mobile phones. The first recorded mobile virus was in June of Types of Mobile Viruses Cabir: Infects Symbian Operating System cell phones Duts: Virus for a Pocket PC Skulls: Related to the Trojan Horse Commwarrior: Can spread through Bluetooth and affects Symbian Operating Systems as well.

 Having privacy while you surf the world wide web is very important and crucial !!!! internet-privacy

 There are many reasons why Facebook is dangerous.  1. When you apply for a job, they look at your profile, no matter how much protection you have on your account.  2. Employers can view images of yourself and you on your friends profiles as well, which means that there really is no means of privacy on your Facebook profile. issues-are-real-some-are-not/

Someone can easily develop an account and impersonate someone else. Facebook encourages cyber stalking because of its lack of privacy settings and how individuals display their personal information on their profiles.

Yes! Because there are thousands of people spying on us throughout any point and time of day. Most cyber based crimes are not reported because there are so many.

 It is impossible to name every single internet criminal because it happens all around the world.  Criminals investigate to steal from you because internet crime has huge advantages with little risks.

 Protection  Windows updates  Software Updates  Anti-Virus Software  Anti-Spyware Software  Hacker Controlled Websites  Firewall  Spam  Data Backup  Password Policies All of these things can help protect you and your computer from hackers to gain internet privacy!

 Lava Soft Ad-aware SE pro 6  Spy Sweeper  Spy Doctor  Norton Internet Security  AVG Anti-Spyware  Counter Spy  McAfee  Trend Micro Anti-Spyware  The Anti-Spy  CA Anti-Spyware  Cyber Defender Anti-Spyware