links and attachments: Help stop malware from spreading

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
File Upload Instructions and Information The File Upload utility is used for transferring files too large to send through the system. How it Works:
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
Security Issues: Phishing, Pharming, and Spam
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
What they are and how to protect against them
An Introduction to Phishing and Viruses
Hacking Computer crime and cyber security.
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Viruses, worms and trojans.
TexPREP Summer Camp Computer Science
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
How to Get Rid of Online Threats Impacting your Computer Device?
Internet Safety for Everyone
Lesson 2: Epic Security Considerations
Stay Safe While Using The Internet
Lesson 2 .
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
9 ways to avoid viruses and spyware
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

E-mail links and attachments: Help stop malware from spreading By Michael P. Kassner With e-mail induced malware making a resurgence, it might be a good time to review what is considered to be good e-mail practice when it comes to attachments and links.

E-mail and malware E-mail attachments and links are popular methods for bad guys to install malware on computers. So it’s important to understand what to do when you get an e-mail that has an attachment or link in the e-mail message body.  

E-mail attachments E-mail attachments are files that accompany e-mail messages. Attachments can be one of two things:   The actual file or document designated in the e-mail A copy of the expected attachment that has malware embedded in it

E-mail links E-mail links are the underlined phrases in e-mail messages that simplify going to a specified Web site. Clicking on a link can cause one of three things to happen: The link opens the correct Web page referred to in the e-mail. The link activates a malware program embedded in the e-mail message. The link is spoofed. It opens a Web page similar to the correct page, but with malware embedded in it.  

Malware Malware is malicious software that’s designed to infiltrate or cause damage to computer systems without the user’s knowledge or permission. Viruses, worms, trojans, and spyware are all considered malware.

Activating malware E-mail malware requires user intervention to get started. It’s that simple. The bad guys will try any method possible to entice you to open an attachment or click on a link. One of their favorite tricks is to pretend that the e-mail is from someone you know. That way you have no reason to be suspicious.

Spread to other computers Once installed, the malware will immediately try to infect other computers by sending out e-mail messages with the same infected attachment to all the e-mail addresses it found on the newly-infected computer.   Those recipients will more than likely open the e-mail attachment as well, because it appears to be from someone they know. So it’s not hard to see that this process will quickly overrun every computer on the network.

Outside contacts This type of malware doesn’t care whether it’s sending the infected e-mail or e-mail attachment to another employee or an outside contact. I don’t think I have to mention how detrimental it would be if a client’s computer became infected after opening an attachment from you.

Not practical That all makes sense, but what about all the e-mail messages containing attachments and /or links that are pertinent to the business. They can’t just be deleted, so what other options are there?

Attachment workaround: It’s not convenient to do, but to be safe it’s advisable to contact the party that sent the attachment and make sure they did intentionally send it to you. If that person’s computer is infected, there’s a good chance that they didn’t even realize you received an e-mail message from them.  

Active-link workaround: The bad guys are hoping that you will automatically click on e-mail links. Don’t oblige them; use the following steps to prevent malware from being installed on your computer:   Make sure the link makes sense and isn’t misspelled. Copy and paste the link address into the Web browser instead of clicking on it. Don’t use the link and go to the Web site on your own accord (preferred method).

Final thoughts The best way to avoid having your computer become a victim of malware sent by e-mail is to be cautious; be alert to anything that’s out of the ordinary, and follow as many of the above suggestions as possible.