Malware, Phishing and Network Policies

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
SECURITY CHECK Protecting Your System and Yourself Source:
Crime and Security in the Networked Economy Part 4.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1.1 System Performance Security Module 1 Version 5.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Types of Electronic Infection
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Chapter 40 Internet Security.
3.6 Fundamentals of cyber security
IT Security  .
Security Risks Malware (Malicious software)
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Systems Security Keywords Protecting Systems
Lecture 5. Security Threats
Network security threats
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Unit 1.6 Systems security Lesson 3
Computer Viruses.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Viruses and Virus Protection
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
WJEC GCSE Computer Science
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
Unit 1.6 Systems security Lesson 1
Unit 6.10 – L3 Internet Security
Presentation transcript:

Malware, Phishing and Network Policies Keywords Malware, Viruses, Worms, Trojan Horses, Phishing, Social Engineering, Data Interception, Network Policies Systems Security Malware, Phishing and Network Policies

Computing Threats Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Starter activity

Malware Define: Viruses Worms Trojan Horses Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Otherwise known as ‘malicious software’. Software which can be malicious if damaging to a computer or network. Define: Viruses Worms Trojan Horses Starter activity

Definitions Objectives Viruses: BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Viruses: Malicious software designed to cause harm to a network or computer system. Attaches itself to programs or files on a computer or server. Can affect all components of an operating system. Around 82,000 viruses are made each day. Worms: Replicates itself in order to spread to other computers. Often using a computer network. In order to achieve this, the worm exploits vulnerabilities across the computer network. Unlike a virus, it does not need to attach to a program. Trojan Horse: Malicious computer program. Designed to access a computer by misleading users of its intent. Example: Email appearing to have been sent from a bank asking to download security software which would improve security where in fact the software intention is to give unauthorised access to the system. Starter activity

Phishing Define: Social Engineering Computer Phishing Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Define: Social Engineering Computer Phishing Telephone Phishing Data Interception/Thefts Starter activity

Definitions Social Engineering: Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Social Engineering: Relies on human interaction (social skills). Commonly involves tricking users into breaking normal security procedures. Method does not revolve around technical cracking techniques such as worms or viruses. Computer Phishing: Form of social engineering. Designed to acquire sensitive information such as usernames, passwords, card details etc. Most common phishing attacks are sent through email. Starter activity

Definitions Objectives Telephone Phishing: BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Telephone Phishing: Telephone system mirroring – direct phone calls that pretend to be an official service. For example, a telephone phishing system would request similar prompts to a bank if the exploit was to gain banking information. User could be asked to enter bank number, expiry, CCV, PIN and system may reject or ask for re-entry to ensure original digits are correct. Data Interception and Theft: Data travels across networks in packets. Packets can be intercepted. If packets are encrypted, they cannot be read without a key. Unencrypted packets can be re-assembled using signatures. Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen. Starter activity

Network Policy Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Outlines rules for network access. Most common is Acceptable Use Policy (AUP). You may have been asked to agree to an AUP when joining your school. What could a poor network policy lead to? Users could be unaware of the risks of: Using software Opening emails turning off firewalls etc. Most networks restrict users to what they can/cannot do. Can you install software on your school PC? Do you have filters on your email and internet browser? Starter activity