Computer Security Keeping you and your computer safe in the digital world.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Viruses & Spyware A Module of the CYC Course – Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Computer Viruses.
Free Software Alternatives: Avast! Anti-virus
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Unit 19 INTERNET SECURITY
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Staying Safe Online Keep your Information Secure.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
INTERNET SAFETY FOR KIDS
Computer security By Isabelle Cooper.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
What they are and how to protect against them
Internet Identity, Safety, & Security
Unit 4 IT Security.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Computer Security Keeping you and your computer safe in the digital world.

Objectives After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats and know how to prevent them Know common methods for protecting your computer system and personal data Computer Security

Definitions Computer Threat: Anything that can damage your computer or the information on it. Computer Security: The measures you can take to avoid damage or data loss. Computer Security

Computer Privacy Ensuring your data, such as personal files and , is not accessible to anyone without your permission Includes measures you can take to restrict access to your data and personal information both on your computer and the internet Computer Security

Digital Threats Categories Viruses, RootKits, Malware Spyware Online Scams Online Predators Identity Theft Computer Security Prevention Virus, malware, and spyware protection Password protection Prudence in giving out information

Viruses, Malware, & Spyware Difference between Viruses, Malware, and Spyware Malware = Malicious software. - non-specific; covers a wide variety of threats Viruses = A program that copies itself and spreads through computers and files, locking down the machine. - designed to wreak havoc and cause chaos Spyware = Software that collects your information without your knowledge and sends it back to the creator. - designed to make money at your expense Computer Security

Rootkits Designed to hide that a PC has been compromised - Allows malware to hide in plain sight by disguising themselves as necessary files Not harmful in and of themselves – what they hide is! Notoriously difficult to detect so hackers can access the targeted computer without the user noticing Very difficult to remove Computer Security

How Malware Spreads Clicking on a corrupted attachment Clicking on a downloadable file from a website that contains a virus or spyware Clicking on a link in an , on a website, or on a social networking site. The link redirects to a website that automatically forces the browser to download a piece of malware Computer Security

Beware! Fake antivirus programs - Famous Examples: Security Suite, Internet Security 2010 New toolbars or default search engines installed without your permission Homepage changes Suspicious file names (i.e.,.mp3.exe instead of.mp3) Pop up windows you cannot stop Loss of control of your PC Redirects or new windows to sites you did not open Computer Security

Prevention Tips Keep all your operating system and all software updated Most virus and spyware attacks occur through security holes in popular software applications For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, malware creators target security holes Don’t click on any pop ups or ads offering you anything for free Know the name and display of your antivirus program Computer Security

If something seems suspicious: DO NOT OPEN IT! Computer Security

Top Free Software Programs AVAST - Antivirus software that checks downloaded files & monitors websites for possible malware. Do not use more than one antivirus. Malwarebytes - Manual scan that searches out rootkits and other potential problems and threats. Spybot Search & Destroy - Spyware scanner to identify and remove spyware. Computer Security

Realities of the Digital World Deleting a post does not mean it disappears Digital content is easily forwarded and reposted Social networks & providers do not make your private information private by default It is up to you to look for the privacy settings Your online reputation has offline implications Computer Security

Privacy in Social Networking Know the default privacy settings and how to change them You can control who sees what content, but it is easily forwarded by the tech savvy Assume what you post can be seen by everyone Computer Security

Identity Theft When someone uses your personal information without your knowledge, usually for monetary gain. Do not store personal financial information on laptops or USB/Flash drives Delete all personal information before disposing of computers, hard drives, or portable drives Review privacy policies Never give out your password or personal information, especially if the company contacted you to request it Computer Security

Computer Security