Big Picture Consider this How many online threats might you be faced with a day?
System Security Part 1
Learning Objectives To understand what malicious code is To understand how social engineering techniques are used against computer system users To know what measures can be used for detection and prevention
Malicious Code Social Engineering Detect and prevent
Malicious Code or Malware is designed to ………. Virus Trojan Spyware Adware Complete sentence in your exercise book Malicious Code or Malware is designed to ……….
Complete sentence in your exercise book Computer Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. They commonly spread through emails – remember don’t open an email if it looks suspicious. Question: How might a computer virus spread via email? Complete sentence in your exercise book
Trojan A Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Named after the original Trojan horse from Greek myth How?
Spyware What advice would you give to prevent spyware infecting a computer system? Spyware is software that aims to gather information about a person or organisation without their knowledge and that may send such information to another entity without their consent.
See Google Classroom for examples of infographics Adware a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "un-closable window” Unlike most malware, Adware is not illegal and so is used by some well known companies TASK! Create an infographic highlighting the risks and/or providing advice about Malware See Google Classroom for examples of infographics Malware
Social Engineering Blagging Social engineering is a set of methods criminals use to trick us into handing over information like passwords and credit card details. Click a topic on the left for more information Phishing Pharming Shouldering