Threats To A Computer Network

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
ISRT IS 376 OCTOBER 28, 2014 INTERNET SECURITY THREAT REPORT  2014.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Introduction to Security Computer Networks Computer Networks Term B10.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
What is Spam? d min.
Malicious Software.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Understand Malware LESSON Security Fundamentals.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
IT Security  .
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
How to keep the bad guys out and your data safe
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Threats To A Computer Network

11 Most Common Computer Security Threats (Virus) Threat #1: Virus A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks. Viruses are sometimes confused with worms and Trojan horses, or used incorrectly to refer to malware. Danger level: High Prevalence: Extremely High

Threat #1: Virus – Cont’d Worst case damage:  Some viruses: Delete files. Reformat the hard disk or cause other damage. Replicate themselves and may present text, video, or audio messages. Take up memory and may cause erratic behavior, system crashes and loss of data.

11 Most Common Computer Security Threats (Spam/Spim/Spit) Threat #2: Spam / Spim / Spit SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users’ address books. SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN Messenger and ICQ. SPIT is Spam over Internet Telephony. These are unwanted, automatically-dialed, pre-recorded phone calls using Voice over Internet Protocol (VoIP). Danger level: Low Prevalence: Extremely High

Spam/Spim/Spit – Cont’d Spam Can Clog A Personal Mailbox. Overload Mail Servers. Impact Network Performance. Efforts To Control Spam Such As By Using Spam Filters Run The Risk Of Filtering Out Legitimate Email Messages.

11 Most Common Computer Security Threats (Spoofing, Phishing, Pharming) Threat #3: Spoofing, Phishing And Pharming Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website (see phishing). Phishing (pronounced “fishing”) is a common form of spoofing in which a phony web page is produced that looks just like a legitimate web page. The phony page is on a server under the control of the attacker. Criminals try to trick users into thinking that they are connected to a trusted site, and then harvest user names, passwords, credit card details and other sensitive information. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging. The email message claims to be from a legitimate source but when the user clicks on the link provided, he or she lands on the fake web page. Pharming (pronounced “farming”) is an attack in which a hacker attempts to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses — the servers are the “signposts” of the Internet. Danger level: High Prevalence: Extremely High

Spoofing, Phishing, Pharming – Cont’d Worst case damage: Once personal information is acquired, spoofers, phishers or pharmers may use a person’s details to make transactions or create fake accounts in a victim’s name. They can ruin the victims’ credit rating or even deny the victims access to their own accounts.

11 Most Common Computer Security Threats (Spyware) THREAT #4: SPYWARE Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer. Danger level: High Prevalence: High Worst case damage: Spyware programs can collect various types of personal information: Websites visited; Credit card details; Usernames or passwords; Install other malware; Redirect web browsers to malicious websites; or Divert advertising revenue to a third party or change computer settings (often leading to degraded or unstable system performance, slow connection speeds or different home pages).

11 Most Common Computer Security Threats (Keylogging) KEYSTROKE LOGGING (KEYLOGGING) A keylogger is a software program that is installed on a computer, often by a Trojan horse or virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer. Danger level: High Prevalence: High   Worst case damage: While keyloggers will not damage your computer system per se, because they can capture passwords, credit card numbers and other sensitive data, they should be regarded as a serious threat.

11 Most Common Computer Security Threats (Adware) Threat #6: Adware Adware is software which automatically plays, displays, or downloads advertisements to a computer. The adware runs either after a software program has been installed on a computer or while the application is being used. In some cases, adware is accepted by users in exchange for using software free-of-charge. Not all adware is innocuous, however, some types of adware are also spyware and therefore a threat to privacy. Danger level: Low Prevalence: High Worst case damage: Adware is relatively harmless unless it is spyware (see spyware). It can, however, cause degradation in system performance.

Other Common Threats THREAT #7: BOTNET THREAT #8: WORM THREAT #9: TROJAN HORSE THREAT #10: BLENDED THREAT THREAT #11: DENIAL-OF-SERVICE ATTACK (DOS ATTACK)

Guided Practice # 1: Botnet # 2: Worm # 3: Trojan Horse # 4: Blended Threat # 5: Denial-of-service Attack (Dos Attack) Directions: Go online with your partner and find the description of one of the following. Tell us how to prevent it from happening.

Independent Practice Write down three things you learned today about computer threats. Turn it in at the end of class for a grade.

Closure What are some of the worst case damages that can be done to your computer and by what threat?