What is a Firewall Anyway?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Spyware and Adware Rick Carback 9/18/2005
What to do with Spyware and Adware Created by Justin Leung.
What is a Firewall Anyway?
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Using Windows Firewall and Windows Defender
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Active Update Internal Error 47 message in Trend Micro PC-cillin Internet Security 2004 and 2005 SID :  The pattern file was corrupted during.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
What is a Firewall Anyway? IT-IDT-6.4 Characterize the purposes, features & functions of network components:…firewalls..
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Running Windows Securely and Efficiently By Gary Esworthy.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Computer Security Keeping you and your computer safe in the digital world.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Mcafee Support phone number, mcafee antivirus technical support
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Windows Tutorial 5 Protecting Your Computer
Follow-up issues from the presentation on Anti-virus / Security software TD & SD have encountered problems with AVG, which also is not rated highly in.
Managing Windows Security
Three steps to prevent Malware infection
3.6 Fundamentals of cyber security
A+ Guide to Managing and Maintaining Your PC, 7e
The Internet = A World of Opportunities
Smart Fortress Incident
Malware aka- malicious software By: Ken Fogel
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Cyber Security By: Pratik Gandhi.
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Unit 4 IT Security.
How To Protect Your Computer From Virus Outbreak Malwarebytes Antivirus Support
What is a Firewall Anyway?
Computer Worms & Viruses
Fix Microsoft Office Error Code Call
Steps to Setup and Install McAfee Antivirus
Kaspersky Total Security for Mac Kaspersky Total Security for Mac,
Unable To Complete The Norton Download. Norton protects a device from all sorts of security danger. With the great use of internet, the chances of viruses.
Call AVG Antivirus Support | Fix Your PC
Utility Programs.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Lesson 10 Operating System Customization
Spyware. By: Katheryn L. Gaston.
Lab 7 – Defeating MALWARE
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Securing Windows 7 Lesson 10.
Presentation transcript:

What is a Firewall Anyway? IT-IDT-6.4 Characterize the purposes, features & functions of network components:…firewalls.. What is a Firewall Anyway?

What is a firewall? A firewall is a network security device positioned between two different networks, usually between an organization’s internal, trusted network and the Internet (similar to a moat around a castle) (Moat- A deep wide ditch, usually filled with water, typically surrounding a fortified medieval town, fortress, or castle as a protection against assault.)

What does a Firewall do? A firewall ensures that all communications attempting to cross from one network to the other meet an organization’s security policy. • Firewalls track and control communications, deciding whether to allow, reject or encrypt communications. • In addition to protecting trusted networks from the Internet, firewalls are increasingly being deployed to protect sensitive portions of local area networks and individual PCs.

Why do you need a Firewall? Organizations around the world are embracing the Internet and Internet technologies to forge new and beneficial business relationships Firewalls help organizations balance the openness of the Internet with the need to protect the privacy and integrity of sensitive business communications.

What is Spyware & Adware? They are independent programs that can be automatically installed when you surf the internet or when you install free software.

What is Spyware? Advertising companies uses Spyware to “mine data” to further help them advertise better. Uses your Internet connection and reports statistical data about you and your surfing habits to a 3rd party. Violates your privacy. And it is a completely Legal program!

What is Adware? Adware are created by advertising companies. Comes in the form of pop-ups, unexplained advertising programs on your computer desktop like “Casino Night”. Advertising companies hope to generate money from customers who receive the pop-ups or unexplained programs on their computers Also a Legal program!

How does Spyware/Adware work? Spyware and Adware programs have a tendency to hide as cookie or temporary Internet files Adware startup has the tendency to hide itself in the register keys as a normal program.

How to detect your computer has spyware or adware… Continuous pop-ups Persistent change in your homepage Slower computer processing, takes the computer longer to process or startup

Extreme symptoms of spyware or adware Internet browser does not start up. Parts of your computers you cannot access without freezing. Major core data is lost or changed.

What programs are there to help get rid of those programs? Out of many programs that were created to detect spyware/adware, four programs were chosen for this presentation… They are: BitDefender Free Edition Malwarebytes AntiMalware SUPERAntiSpyware Kaspersky Virus Removal Tool

Recommendations Preventing spyware and adware from getting onto your computer is your first step! Do not download unnecessary software from the Internet especially free ones because they most likely have adware or spyware inside them. If a download screen appears, asking you to confirm your download, click no if you are not trying to install anything. Avoid clicking advertised pop-ups especially ones that mention “free” stuff if possible.

Recommendation Technical Recommendation Some adware/spyware files like to hide in the temporary Internet folders. Disable saving of temporary files Continuously delete old temporary files and cookies Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install on your computer. Constantly scan your computer for adware and spyware and keep your adware/spyware killer programs fully updated at all times

Assignment Now that you have reviewed this slide show make up a reading strategy with 10 multiple choice questions , 5 fill in the blank questions, and 5 short answer questions. NO TRUE/FALSE QUESTIONS. Save your questions as Your Name Internet Security Questions in your directory. Please provide an answer key for the questions.

References Justin Leung, What to do w/ Spy ware and Adware, http://www.lbl.gov/cyber/systems/spyware_adware.ppt#257,2,Table of Contents Firehouse Networks, (2009), What is a firewall? http://www.itconsultantschicago.com/techtips3.asp