Computer Security Std XI– Chapter 8.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Security for Seniors SeniorNet Help Desk
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Malicious Software.
Internet safety By Suman Nazir
W elcome to our Presentation. Presentation Topic Virus.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Network System Security - Task 2. Russell Johnston.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Windows Tutorial 5 Protecting Your Computer
Protecting Servers and Clients
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
MALWARE Autumn Mattis.
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
By Quentin Lively Notorious Viruses.
SEMINAR ON PC SECURITY FROM VIRUSES
Cyber Security By: Pratik Gandhi.
Computer Viruses By Aylmer Or.
Fix AOL Mail Error Code 80072f30 Call for Help
Protect Your Computer Against Harmful Attacks!
Steps to fix McAfee Error 1603 Call
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
Information Security Session November 11, 2004
Protecting Servers and Clients
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Risk of the Internet At Home
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
What is Information Security?
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Security Std XI– Chapter 8

Data Transmission on the Internet Security Principles During Data Transmission on the Internet

Confidentiality Content of the message should be accessed by Sender & Recipient

Message/data must arrive exactly as it was sent Integrity Message/data must arrive exactly as it was sent NO modification done either accidentally or maliciously

Receiver must be sure of the sender’s identity Authentication Receiver must be sure of the sender’s identity All users must have a user ID & password

A sender must not deny having sent the message to the receiver Nonrepudiation A sender must not deny having sent the message to the receiver

Encryption and Decryption are used. For security Encryption and Decryption are used.

Destructive software Viruses Malware Spyware Worms Browser Hijackers Spam

Vital Information Resources Under Seize Viruses Vital Information Resources Under Seize

Viruses Cannot affect hardware Attacks software such as O.S. application software e-mails data Cannot affect hardware

Types of Viruses Boot sector virus Macro virus E-mail virus File infector virus (.com, .exe, .sys, .ovl, .prg, .mnu)

How the virus works Clean uninfected program Virus Infected program Compute A , B Delete all files Corrupt data Send copy of virus to all programs Perform printing End Compute A , B Perform printing End

Malware & Spyware performs malicious action w/o user’s permission Spyware gathers information relays info to advertisers & others installed w/o consent, knowledge (click, pop-up) (adware)

Eat up Computer’s resources Replicate yourself Eat up Computer’s resources Worms Replicate yourself Replicate yourself Replicate yourself Replicate yourself Replicate yourself Replicate yourself Replicate yourself Replicate yourself Replicate yourself Make the computer unusable ………… No destruction

Trojan Horse Is not self replicating main purpose is not make modifications in the target computer Requires interaction with the hacker Reveals confidential info (user ID, pwd) Allows hackers remote access to target system

Browser Hijackers alters your browser settings redirects home page to rogue search engines With sponsored links as results (hit list) Could also direct the browser to an error page Forces hits

Spam abuse of e-mail unsolicited mail, bulk e-mail (UBE) Commercial content Use of spam guard Spammers collect e-mail addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books,

Antivirus can be purchased or downloaded protection from virus, worm, trojan horse, malware can be purchased or downloaded

Commercial Antivirus software AVG BitDefender Norton McAfee Kaspersky eScan K7 Bull Guard Dr.Web Panda Security PC Tools Protector Plus Rising ZoneAlarm

Freely available Antivirus software AOL Active Virus Shield AVG Antivirus Free Avast Home Bitdefender 8 free edition Comodo McAfee VirusScan Plus PC Tools AntiVirus Free Edition Dr.Web Cureit!

Antivirus software downloads Clam ClamWin Moon Secure Open Winpooch Abandonware Aidstest Antiviral Toolkit Pro Central Point dLight Dr. Solomon’s The Antidote Thunderbyte Turbo

Preventive Measures Do not open e-mail attachments Update anti-virus software regularly Delete chain letters, forward, virus alerts and junk mail When Downloading files if unsure of their authenticity, scan them first Backup regularly Do not hide file extensions

Preventive Measures Do not download files from strangers If you have to then download to a removable disk and scan with antivirus Protect using Internet firewall

To Turn on Firewall Click start Control Panel Security Center Windows firewall

For Unhiding File Extensions Click My Computer Tools Menu Folder Options View tab Uncheck “Hide extensions for known file types”

Lab Exercise Find names of Trojan Horses Find names of Viruses Find names of Worms Find details of Malware Find details of spyware Find names of Browser Hijackers Anti Virus scanning procedure details