Feedback on the report. It is like the exam The way I mark your report is similar to the way I shall mark your exam.

Slides:



Advertisements
Similar presentations
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Advertisements

Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Objectives Overview Define an operating system
Lesson 9 Computer Troubleshooting
Computer Networks I Antivirus explained By: Daniel Josefsson Daniel Josefsson Kristoffer Wallin Kristoffer Wallin om>om>
Yahoo Widgets 4.0 Ven Tu HTM 304. What are Yahoo Widgets?  Widgets are small, specific applications that you can run on your Windows or MAC OS desktop.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
Nasca Internet Networking and Security viruses.
Computer Security and Penetration Testing
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Distributing Drivers on Windows Update
Computer Viruses A guide to virus protection,detection, and removal for the average computer user.
Quiz Review.
Creating and Using Podcasts Stanford University Continuing Studies CS 43 Mark Branom
Chapter Nine Maintaining a Computer Part III: Malware.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Security Issues: Phishing, Pharming, and Spam
Viruses and their Cures Catherine Agnew CEDu 581 – Oconomowoc.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Viruses.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
How to Avoid Spyware By Hottman Computers & Consulting Co
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 3/18/04 March Action Items Kronos Update eVac Demonstration.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
FCNS – Technology NEW TECHNOLOGY SOFTWARE: COMING SOON!
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Using FrontPage FrontPage is a great Web editing tool for people with limited knowledge and time for HTML coding. It’s similar to using Microsoft Word.
Malicious Software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
CSS THE MISSING MANUAL Introduction. Benefits of CSS Style sheets offer more formatting choices than are offered in straight HTML  EXAMPLE: When you.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
Cybersecurity Test Review Introduction to Digital Technology.
1 3 Computing System Fundamentals 3.7 Utility Software.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
What to look for in Software When you are looking at software you will want to make sure that is compatible with the computer that you are using. Home.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 9 Computer Troubleshooting 1 Morrison / Wells / Ruffolo.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
 Anti-Virus Guard ( AVG ) is a family of anti- virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
QR CODES: What are they, and how can they be used in education? Created by Russell Smith Technology Facilitator North Edgecombe High School.
Cloud-Computing Cloud Web-Blog Software Application Download Software.
Botnets A collection of compromised machines
Three steps to prevent Malware infection
Bellsouth.net Error Call Support Number
Steps to fix McAfee Error 1603 Call
Botnets A collection of compromised machines
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Presentation transcript:

Feedback on the report

It is like the exam The way I mark your report is similar to the way I shall mark your exam

Aspect 1: basic knowledge The Europol virus is definitely not a virus How can we classify it? Perhaps as a Trojan?

Aspect 2: right terminology The Europol virus typically exists as code within web pages and uses vulnerabilities in web browsers to break out of the sandbox

Aspect 3: breadth of knowledge The Europol virus affects a number of versions of Windows, but there were no reports of it affecting Windows tablets or smartphones A version of the Europol virus affects some web browsers in Mac OS computers

Aspect 4: appropriate examples For example, the Europol virus can be removed (from a Windows system) by removing its entries from the registry. You need to start your computer in a special mode to do it successfully. List specifically what steps this process involves…

Aspect 5: critical thinking There are many web sites offering detailed advice on how to remove the Europol virus from each separate operating system. The quality of advice is generally good. Give references to some specific examples of good web sites… It is extremely difficult to find authoritative advice on how to remove the Europol virus. Some web sites advise you to download their antivirus software, which may contain Trojans. The well- known antivirus software companies do not say anything about this virus on their sites.