Protect Your Computer Against Harmful Attacks!

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
The Internet = A World of Opportunities
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Information Systems Design and Development Security Risks Computing Science.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
Done by… Hanoof Al-Khaldi Information Assurance
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
Unit 11 Communication & Collaboration
Information Security 101 Richard Davis, Rob Laltrello.
What is it? Why do I keep getting from Barracuda? SPAM.
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Introduction-Cyber Safety
Presentation transcript:

Protect Your Computer Against Harmful Attacks!

What Can Harm You? Viruses, Worms, and Trojan Horses Phishing Scams Beware of Threats to You and Your Computer What Can Harm You? Viruses, Worms, and Trojan Horses Phishing Scams Spyware Protection

What Are Viruses, Worms, and Trojan Horses? A virus is a program that can copy itself and infect your computer without your permission or knowledge. A worm spreads without your action and distributes complete copies of itself across networks. A trojan horse masks as a useful program but actually does damage.

What Can These Programs Do? Viruses may damage hardware, software, or data. Worms may exhaust memory or bandwidth. A trojan horse may damage hardware, software, or data while appearing to be useful.

How Do You Protect Yourself? Never open E-mail attachments from unknown senders. Be careful sharing files. Back up files often. Use anti-virus software and keep it current.

What Is Phishing? A fraudulent E-mail designed to steal your personal information such as passwords, bank account information, credit card numbers, or other valuable information.

How Does Phishing Work? A deceptive E-mail is sent appearing to come from a Web site you trust and may contain requests for personal information from you. logos from real organizations stolen from legitimate Web sites. links to “spoofed” Web sites.

What Should You Look For? Watch for the following catch phrases in e-mail you believe is fraudulent: “Verify your account information” “If you don’t respond within 48 hours, your account will be closed.” “Click the link below to gain access to your account” Organizations should not ask you to send passwords, login name, Social Security numbers, or other personal information through E-mail

What Does a Phishing Filter Do? Scans visited Web sites for characteristics of known online frauds and scams and warns if the site is suspicious Includes an online service that blocks you from confirmed scams Provides a way to report suspicious sites or scams

What is Spyware? Software designed to take partial control of your computer without your knowledge and without obtaining your permission.

What does spyware do? Invades your privacy Transmits information about you online Blasts you with pop up ads Changes your home page or search engine Adds new, unwanted toolbars to browser Slows down or crashes your computer Most harmful forms of spyware can record your keystrokes allowing the capture of passwords, login info, id numbers, SS#s, and bank info

How do You Defend Against Spyware? Download anti-spyware software. Only download from sites you trust. Read privacy statements and license agreements. Close pop-up ads with the red x.

How Do You Protect Your Computer? Use a firewall. Update your operating system. Use up-to-date antivirus software. Use a phishing filter. Use up-to-date antispyware software.

Resources The information provided in this presentation includes information obtained from: OnGuard Online Microsoft Online Safety Microsoft Security: 4 Steps to Protect your computer