DEVICE MANAGEMENT AND SECURITY NTM 1700/1702
LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise. 2. Students will protect local devices from security threats including viruses, malware, and adware using current best practices and technologies. NTM
CYBERCRIME Hacker/hacking Piggybacking Identify theft Rogue Wi-Fi hotspots Acceptable use policies NTM
COMPUTER VIRUS Small software program that spreads from one device to another NTM
WHAT DOES IT DO? Interferes with computer operation May corrupt or delete data May delete entire hard drive NTM
HOW IS IT SPREAD? Via attachments Funny images Greeting cards Audio or video files Via instant messaging messages Internet downloads Hid in pirated software NTM
IS MY COMPUTER INFECTED? Runs slower than usual Stops responding or locks up frequently Crashes and restarts every few minutes Applications do not work properly (distorted menus/dialog boxes) Drives are not accessible Items do not print correctly See unusual error messages NTM us/windows/does-computer-have- virus#1TC=windows-7 us/windows/does-computer-have- virus#1TC=windows-7 t-security-center/threats/mac
HOW TO REMOVE? Need some type of virus removal tool Keep it updated Run full scans on the computer NTM
HOW DOES AN ANTIVIRUS PROGRAM INOCULATE A PROGRAM FILE? NTM Records information about program Attempts virus file removal Uses information to detect if virus tampers with file Quarantines infected files Keeps file in separate area of hard disk
BUILT-IN ANTIVIRUS PROGRAMS NTM Windows Defender IOS Gatekeeper protection#1TC=windows-7
ANTIVIRUS PROGRAMS NTM software- review.toptenreviews. com/ AVG ANTIVIRUS AVAST PRO ANTIVIRUS MCAFEE VIRUSSCAN NORTON ANTIVIRUS G DATA ANTIVIRUS BULLGUARD ANTIVIRUS
PREVENTION Never open an attachment containing an executable file from an . Executable extensions include Exe Com vbs An executable file can cause damage Scan all downloaded programs or files NTM
WORMS Programs that Reproduce Execute independently Travel across network connections Key difference from virus Virus dependent Host file Boot sector NTM
NTM
TROJAN HORSE Appear to be useful software/infects computer when application is run What do they do? Annoy Malicious Create a backdoor May erase a hard drive Do not self-replicate or infect other files NTM
LOGIC BOMB A virus triggered by certain logical conditions such as opening a file NTM
CLICKJACKING Runs malicious software when a button, graphic, or link is clicked NTM
MACRO VIRUS Embedded virus in a Microsoft Office document – runs when macro enabled NTM
WHAT IS MALWAREMALWARE Programs acting without user knowledge that deliberately alter the computer’s operations NTM security/malware-removal.aspx
SPYWARE NTM Don’t just install Anti-spyware Be sure to run it often
ADWARE NTM
SCAREWARE NTM
ROOTKIT Program that hide on computer Allows remote access Take full control Change settings Monitor activity Access files Execute programs NTM
WEB BUGS Invisible images or html code hidden within a web page or that can be used to transmit information back to the source of the bug. NTM
NETWORKS Zombie/Botnet War driving Router Security NTM
MOBILE DEVICES Jailbreaking Rooting NTM
WHAT CAN YOU DO? Security features in the MS Windows security center/Mac Enable Internet firewall Antispyware software Antivirus software Automatic updates NTM
KEYS TO REMEMBER Turn on the firewall Keep antivirus software up-to-date Keep operating system software up-do-date Keep up-to-date antispyware software Know what you are installing and what it will do Carefully read all disclosures before installing Scan all downloaded programs for malware NEVER run macros in a document unless you know what they do NTM
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702