3.6 Fundamentals of cyber security

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Computer Viruses.
Threats To A Computer Network
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
MODULE 3 SAFE USE OF COMPUTER. Virus and Antivirus A computer virus is a malware program that, when executed, replicates by inserting copies of itself.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Section 6 Theory Software Copyright, Viruses and Hacking.
Viruses & Destructive Programs
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
What they are and how to protect against them
Three Things About Malware
Malware and Computer Maintenance
MALWARE Autumn Mattis.
Intro to Malware Attacks
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Lecture 8. Cyber Security, Ethics and Trust
COMPUTER VIRUSES Computer Technology.
Computing Issues that Affect Us All
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Security Elaine Munn Introduction to Computer Security.
Computer Technology Notes 5
Computer Applications Unit B
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Malware CJ
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Computing Issues that Affect Us All
Computing Issues that Affect Us All
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

3.6 Fundamentals of cyber security 3.6.1.2 Malicious code Lesson

TIME UP Starter activity: Thought shower Create your own Wordle using this link: wordle.net Try to think of as many key words as possible related to the term ‘malicious code’. TIME UP Malware comes from the words: malicious + software Definition of malware: onguardonline.gov/articles/0011-malware Malware includes viruses, spyware, and other unwanted software that gets installed on your computer or mobile device without your consent. These programs can cause your device to crash, and can be used to monitor and control your online activity. They also can make your computer vulnerable to viruses and deliver unwanted or inappropriate ads. Criminals use malware to steal personal information, send spam, and commit fraud. Start

What key words did you include in your Wordle? What is ‘malware’? Starter activity What key words did you include in your Wordle? What is ‘malware’? Could you make a definition for the term ‘malware’? Answer: onguardonline.gov/articles/0011-malware Malware includes viruses, spyware, and other unwanted software that gets installed on your computer or mobile device without your consent. These programs can cause your device to crash, and can be used to monitor and control your online activity. They also can make your computer vulnerable to viruses and deliver unwanted or inappropriate ads. Criminals use malware to steal personal information, send spam, and commit fraud.

Now you have a definition of malware: What are the threats of malware? Discussion Now you have a definition of malware: What are the threats of malware? Can you think of examples of malware? What are the ways that malware can be protected against? Were you right? youtube.com/watch?v=UFPCEVgTq38 3:14 minute video on malware – watch to the end to confirm answers. youtube.com/watch?v=UFPCEVgTq38

Objectives Define the term ‘malware’. Describe what malware is and how it can be protected against. Describe forms of malware.

Computer virus Trojan Spyware Adware Forms of malware Computer virus Trojan Spyware Adware Computer virus: en.wikipedia.org/wiki/Computer_virus A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent. Trojan: usa.kaspersky.com/internet-security-center/threats/trojans#.VwDkkFKDClI A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: deleting data, blocking data, modifying data, copying data and disrupting the performance of computers or computer networks. Unlike computer viruses and worms, Trojans are not able to self-replicate. Spyware: bbc.co.uk/webwise/guides/about-spyware Programs that secretly record what you do on your computer are called spyware. They can be used for some perfectly legitimate purposes, but the majority of spyware is malicious. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters. ‘Spyware’ is the generic name we give to programs that contain additional functionality designed to secretly monitor your activities on your computer. Adware: webopedia.com/TERM/A/adware.html (1) Adware is the common name used to describe software that is given to the user with advertisements embedded in the application. Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software. There are many ad-supported programs, games or utilities that are distributed as adware (or freeware). Today we have a growing number of software developers who offer their goods as "sponsored" freeware (adware) until you pay to register. If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key. (2) Another use of the phrase adware is to describe a form of spyware that collects information about the user in order to display advertisements in the Web browser. Unfortunately, some applications that contain adware track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons.

Activity: What is malware? Create a cartoon strip for the different forms of malware. Students can complete the activity by hand or on the PC, and research independently in order to complete. Extension task: Read about other malware forms such as ransomware bbc.co.uk/news/uk-scotland-edinburgh-east-fife-35928037 Research antivirus software. Does it have limitations?

Plenary: Malicious code taboo Guess the word that the person is describing – they must not use the five words on their card!