Mary Burger Owner ComputerDiva, LLC Vancouver, WA www.computerdiva.biz.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE Presented by The State Security Office November 17, 2004.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security Advice Georgie Pepper Campsmount Acadamy.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Computer security By Isabelle Cooper.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Business Technology Applications What is Malware.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cybersecurity Test Review Introduction to Digital Technology.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Identity Theft: Protect Yourself Ronald J. Leach.
An Introduction to Phishing and Viruses
Malware and Computer Maintenance
Unit 4 IT Security.
How to Get Rid of Online Threats Impacting your Computer Device?
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Mary Burger Owner ComputerDiva, LLC Vancouver, WA

Virus - A virus is something that spreads from 1 PC to another, and has some sort of damaging aspect to it. Worm - it is something that does damage along the way. Worms can also deposit damaging files on your computer. Trojan Horse - This usually is download by the user, without their knowledge. It is called a trojan horse because it usually packs a damaging payload. Adware - comes in the form of banner ads on websites, popups, free versions of programs with advertising. Not damaging, simply annoying. Spyware - monitors what the user is doing, and sells the information to advertisers.

Bored Programmers – very small percentage Rogue Security Software Vendors Organized Crime Foreign Governments

Harvesting addresses Identity theft Credit card and bank fraud Corporate and industrial espionage Stealing gaming treasures and weapons Extortion

attachments Infected websites Infected links Across a local area network Thumb drives or external drives The User Other Methods

attachments Infected websites Infected links Across a local area network Thumb drives or external drives The User Other Methods

Software tools, such as MalwareBytes, HitMan Pro, Kaspersky TDSS Killer Browser cleaning Safe Mode cleanup System restore Wiping the computer clean Other methods

Feet flat on the floor, pull the earth’s energy up into your feet, through your body and out your hands. Keep you hands resting lightly on the computer keyboard. Infuse the computer with the high vibrational energy

Absorbs electromagnetic smog – low energy frequencies Protects the computer from energies of the user Purchase from any Metaphysical or gem store Run under cold water every few weeks to remove energies absorbed

Never click on attachments in s Use a strong internet security product. I really like Kaspersky Internet Security. Free software is never free. It usually comes with a payload of malware. When installing any software, check each screen to make sure that additional software is not being installed. Most of them tell you what they are going to install, and give you the chance to “opt out” Unless you know what you are doing, do not try to clean the malware yourself. Leave it to the experts.

Mary Burger, Owner ComputerDiva, LLC Onsite or remote Malware Cleanup Reasonable prices