Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SPYWARE Presented by The State Security Office November 17, 2004.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Business Technology Applications What is Malware.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Technical Implementation: Security Risks
What they are and how to protect against them
An Introduction to Phishing and Viruses
IT Security  .
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg

Online Threats 1. Malware 2. Spyware 3. Spam 4. Phishing 5. Virus 6. Adware 7. Cookies 8. Pharming 9. Bluejacking 10. Bluesnarfing 11. Browser Hijacking 12. Keylogger 13. Trojan horse 14. Antivirus software 15. Firewall 16. Rootkits 17. Ransomware 18. Computer worm 19. Browser exploit

Online threats infographics rendlabs-security- intelligence/threat- morphosis/ rendlabs-security- intelligence/threat- morphosis/ rendlabs-security- intelligence/are-you-safe- online/ rendlabs-security- intelligence/are-you-safe- online/ nline-threats-101- infographic/ nline-threats-101- infographic/

Phishing Is sent as an Is from someone who claims to be a legitimate enterprise The directs the user to a web site asking them to update their personal information Attempts to gain the person’s personal information and can lead to identity theft

Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops

Spyware Appears as Trojan Horse, acts as a virus changes homepage without you knowing Tracks websites you visit Installs new spyware w. out approval Uses memory so system moves slower Quick scan computer removal Found this info at :

What Spam is? Flooding the internet Most commonly commercial advertising Cost VERY little to send Legal & illegal Illegal Spam = steal your money What it’s not? SPAM RESROUCES: NOT THE HAM

+ Malware A.K.A. “Malicious Software” “Cyber Crime” Viruses Keyloggers Trojan Horse Hackers Create from: malware.htm

Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops

Browser Hijacking A form of malware, spyware, or virus Replaces existing internet browser home page with its own Used to force hits to a particular website

Adware: What Is It and How Can You Avoid It? Adware: Advertising Supported Software A software program that produces advertisements Designed to sell products for their authors How To Avoid It? Antivirus Software Popup Blocker Picture Sources: Popups: up_adhttp://en.wikipedia.org/wiki/Pop- up_ad Computer Lady: /12/flummoxed-frustrated.html /12/flummoxed-frustrated.html

Bluejacking What is it? Unsolicited messages sent via Bluetooth The technological version of doorbell ditching & prank phone calls How? Takes advantage of a loophole in the technology’s messaging options Bluejacker will camp out in crowded areas (i.e. shopping malls, airports, subway system)

PHARMING!!!!!  Hackers intending to change IP Address  Obtain access to credentials  Usernames and passwords  Dangerous for banks and major businesses  Special protection  Sources  Wikipedia, edublogs, campchestnutridge

Cookies Encrypted text files in browser directories. Created when user’s browser loads to particular site. Help users navigate their websites NOT viruses: not compiled of code pieces Not self executing. CAN act as a form of spyware Website: Image:

Cookies: Internet Small Look up table containing pairs Ex. (first name, Hannah)(last name, Rudolph) Form on newly loaded webpages Conveniently carry information on webpages They are destroyed when Window is closed Cookies are visible to all people Webpage:

Computer Virus Able to reproduce themselves Placed in commonly used programs When program is run, virus multiplies Interfere with computer operations Often spread through attachments Sources: