Cyber security. Malicious Code Social Engineering Detect and prevent.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Threats To A Computer Network
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
What is Spam? d min.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet safety By Suman Nazir
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Topic 4: E-safety, Health and Safety
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Hacking Computer crime and cyber security.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Security Risks Malware (Malicious software)
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Computer Applications Unit B
Scams, Identity Theft, and Viruses Kelly & Caitlin
What is it? Why do I keep getting from Barracuda? SPAM.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Unit 1 Fundamentals of IT
What is Phishing? Pronounced “Fishing”
WJEC GCSE Computer Science
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Week 7 - Wednesday CS363.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Cyber security

Malicious Code Social Engineering Detect and prevent

Penetration Testing

Malicious Code or Malware VirusTrojanSpywareAdware

Computer Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. They commonly spread through s – remember don’t open an if it looks suspicious.

Trojan A Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Named after the original Trojan horse from Greek myth

Spyware Spyware is software that aims to gather information about a person or organisation without their knowledge and that may send such information to another entity without their consent.

Adware a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "un-closable window” Unlike most malware, Adware is not illegal and so is used by some well known companies Malware

Social Engineering Blagging Phishing Pharming Shouldering Social engineering is a set of methods criminals use to trick us into handing over information like passwords and credit card details. Hover over a topic on the left for more information

Social Engineering Blagging Phishing Pharming Shouldering Blagging is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. Example are the Nigerian Prince scam and more recently the s from friends who have been mugged (in a foreign country) and need you to send money.

Social Engineering Blagging Phishing Pharming Shouldering Phishing is when the user is sent a fake . It might look like it comes from a bank or other legitimate business. The criminal hopes that the user will follow give away some important information eg by following a link to a false website and logging in with their ID.

Social Engineering Blagging Phishing Pharming Shouldering Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. This can be done by hacking a DNS server or redirecting your computer electronically.

Social Engineering Blagging Phishing Pharming Shouldering Shouldering is a simpler way of obtaining peoples Password or Pin Numbers. Criminals just stand behind and watch what you type.

Detect and prevent Some of the measures which can be taken to improve system security. Click images for more information Biometric measures Password systems CAPTCHA Using confirmations to confirm a user’s identity Automatic software updates.

Captcha-Completely Automated Public Turing Test To Tell Computers and Humans Apart A Captcha is a test that a human can pass but a computer program cannot. They stops people writing programs that automatically sign in to websites. An automatic program could try thousands of passwords.

Biometrics Biometrics are ways of using something that is unique to you as a person. A fingerprint / or thumbprint is common Iris scanners and hand scanners are also used. Phones and tablets are often protected this way

Passwords Many websites and computers systems require us to use a password to access. In companies different users may have very different levels of access to secure information. Password tips Don’t use a word or a name Include digits, capitals and or special characters Change your password regularly Don’t write it down Don’t let others watch you type it in

Confirmation When you sign up to a new site like Ebay or Amazon, you are typically asked to provide an address. An is then sent with a link to confirm your identity. This does not prevent people presenting fake identities as accounts are easy to create but does stop hackers creating thousands of accounts automatically

Automatic Software Updates What do you do when you see those little icons and pop-up messages that appear in the system tray, indicating there is a new software update available for you to download and install? Most people find such notifications and the process of installing new software updates insignificant and disrupting. The truth is, people ignore such notifications for various reasons, such as, ‘Do I really need to install this update?’, ‘My computer is working just fine, I don’t think this update is for me!’, ‘I don’t have time to reboot my computer’, etc. If you are accustomed to dismissing those update notifications, you need to reconsider that practice. Applying software updates is one of the most important things you can do with your computer. In fact, if you don’t do it, you’re very likely going to get some kind of malware in your system and even get hijacked. (SuperAntiSpyware 2013)