CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Let’s Talk About Cyber Security
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Lesson 8: Protecting Yourself Online. Lesson 8 Objectives  Discuss "The Right to Be Forgotten"  Identify ways to minimize the spam you receive  Define.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Video Following is a video of what can happen if you don’t update your security settings! security.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
history, hardware, software, safety, and computer ethics
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 40 Internet Security.
Internet Business Associate v2.0
Instructor Materials Chapter 7 Network Security
Presentation transcript:

CIW Lesson 8 Part B

Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer systems Malware self-replicating program or algorithm that consumes system resources program that appears to be harmless but actually produces harmful results Worm Trojan Illicit Server

Malicious Software continued If you copy a file from a CD that has a virus, the most effective way to prevent the virus for spread is to use program that assumes control of system operations, and damages or destroys data The most effective way to spread viruses is to Virus Send attachments Viruses that reside within the text of an HTML-formatted message are particularly virulent because the user only needs to receive the virus for it to causedamage anti-virus Software to disinfect your hard drive and remove the virus from your system

Spyware & Virus Removal scans disks and programs for the purpose of eliminating software designed to harm computer systems is an application that is secretly placed on a user’s system to gather information and relay it outside parties A disadvantage of using a spyware-detection application is that legitimate applications can be Spyware incorrectly identified as spyware Anti-virus

Firewalls An advantage of connection LAN computers to the internet through a firewall is that users on the LAN can information from the internet, but outside users are access to the LAN is a security barrier that prevents unauthorized access to or from private networks Firewall Desktop firewalls offer protection for an computerindividual The most common business firewall technique is to use a firewall server in conjunction with a proxy server Firewalls are the first line of defense against security breaches because they provide confidentiality LAN data request denied

Updates & Patches A disadvantage of installing program patches and updates is that they may introduce incompatibility issues or new is a file or collection of software tools that resolves system liabilities and improves software performance Update is a major update with significant software improvements that is marketed as new Release is a file of programming code that is inserted into an existing executable program to fix a known problem, or bug Patch It also is designed to provide an immediate, temporary solution security issues

Security Related Ethical & Legal Issues The organization that was formed by the United Nations to protect intellectual proper worldwide is the collectively refers to industrial property and copyrighted works Intellectual Property is when you receive written permission from a copyright owner to use copyright-protected material for your own purposes Licensing Agreement When you do not receive permission from the image creator to copy an image from the Web it is Copyright Infringement is the term for a word, slogan, symbol, name, package design or devise that distinguishes a product from other products Trademark The organization that is responsible for codifying copyright law as it applies to digital information is the Information Infrastructure Task Force (IITF) World Intellectual Property Organization (WIPU)

Typosquatting & Locking your Computer You can use screen savers to your work while you are away from your desk, proving a measure of is the unethical practice of registering domain names very similar to those of high-volume sites Typosquatting Example: is a graphic or moving image that appears on your screen when your computer is idle Screensaver hide security

Company Resources To comply with many web site requirements for added security, nearly all browsers support a minimum of -bit encryption It is important to install updates to clients to minimize security breaches. You can install updates to support a higher level of encryption because some clients default to -bit encryption levels The connectivity that makes the internet possible also makes systems vulnerable to When making efforts to prevent attackers from gaining access to network connections, using your desktop firewall to block may cause problems when troubleshooting your computer’s connectivity to the network unwanted activity Internet Control Messaging Protocol (ICMP)