DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting Your Computer & Your Information
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
Computer Viruses.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Return to the PC Security web page Lesson 5: Dealing with Malware.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CONTENTS What is Virus ? Types of computer viruses.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
VIRUS.
Computer Skills and Applications Computer Security.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Device Management and Security
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
Presentation transcript:

DEVICE MANAGEMENT AND SECURITY NTM 1700/1702

LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise. 2. Students will protect local devices from security threats including viruses, malware, and adware using current best practices and technologies. NTM

CYBERCRIME Hacker/hacking Piggybacking Identify theft Rogue Wi-Fi hotspots Acceptable use policies NTM

COMPUTER VIRUS Small software program that spreads from one device to another NTM

WHAT DOES IT DO? Interferes with computer operation May corrupt or delete data May delete entire hard drive NTM

HOW IS IT SPREAD? Via attachments Funny images Greeting cards Audio or video files Via instant messaging messages Internet downloads Hid in pirated software NTM

IS MY COMPUTER INFECTED? Runs slower than usual Stops responding or locks up frequently Crashes and restarts every few minutes Applications do not work properly (distorted menus/dialog boxes) Drives are not accessible Items do not print correctly See unusual error messages NTM us/windows/does-computer-have- virus#1TC=windows-7 us/windows/does-computer-have- virus#1TC=windows-7 t-security-center/threats/mac

HOW TO REMOVE? Need some type of virus removal tool Keep it updated Run full scans on the computer NTM

HOW DOES AN ANTIVIRUS PROGRAM INOCULATE A PROGRAM FILE? NTM Records information about program Attempts virus file removal Uses information to detect if virus tampers with file Quarantines infected files Keeps file in separate area of hard disk

BUILT-IN ANTIVIRUS PROGRAMS NTM Windows Defender IOS Gatekeeper protection#1TC=windows-7

ANTIVIRUS PROGRAMS NTM software- review.toptenreviews. com/ AVG ANTIVIRUS AVAST PRO ANTIVIRUS MCAFEE VIRUSSCAN NORTON ANTIVIRUS G DATA ANTIVIRUS BULLGUARD ANTIVIRUS

PREVENTION Never open an attachment containing an executable file from an . Executable extensions include Exe Com vbs An executable file can cause damage Scan all downloaded programs or files NTM

WORMS Programs that Reproduce Execute independently Travel across network connections Key difference from virus Virus dependent Host file Boot sector NTM

NTM

TROJAN HORSE Appear to be useful software/infects computer when application is run What do they do? Annoy Malicious Create a backdoor May erase a hard drive Do not self-replicate or infect other files NTM

LOGIC BOMB A virus triggered by certain logical conditions such as opening a file NTM

CLICKJACKING Runs malicious software when a button, graphic, or link is clicked NTM

MACRO VIRUS Embedded virus in a Microsoft Office document – runs when macro enabled NTM

WHAT IS MALWAREMALWARE Programs acting without user knowledge that deliberately alter the computer’s operations NTM security/malware-removal.aspx

SPYWARE NTM Don’t just install Anti-spyware Be sure to run it often

ADWARE NTM

SCAREWARE NTM

ROOTKIT Program that hide on computer Allows remote access Take full control Change settings Monitor activity Access files Execute programs NTM

WEB BUGS Invisible images or html code hidden within a web page or that can be used to transmit information back to the source of the bug. NTM

NETWORKS Zombie/Botnet War driving Router Security NTM

MOBILE DEVICES Jailbreaking Rooting NTM

WHAT CAN YOU DO? Security features in the MS Windows security center/Mac Enable Internet firewall Antispyware software Antivirus software Automatic updates NTM

KEYS TO REMEMBER Turn on the firewall Keep antivirus software up-to-date Keep operating system software up-do-date Keep up-to-date antispyware software Know what you are installing and what it will do Carefully read all disclosures before installing Scan all downloaded programs for malware NEVER run macros in a document unless you know what they do NTM

DEVICE MANAGEMENT AND SECURITY NTM 1700/1702