Nasca 2007 100 200 300 400 500 Internet Networking and Security viruses.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Lecturer: Ghadah Aldehim
By Kyle Slinger.  A network is where you can send information to and from different PCs.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Computer Hardware Engineer Vocabulary.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
NETWORKS.
Living Online Module Lesson 23 — Networks and Telecommunication
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Communications & Networks National 4 & 5 Computing Science.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Introduction to Computers
COMPUTER VIRUSES Computer Technology.
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Internet LINGO.
Computer Viruses.
Chap 10 Malicious Software.
Viruses and Virus Protection
King Saud University- College OF Applied Studies
Chap 10 Malicious Software.
King Saud University- College OF Applied Studies
Communication and the Internet
Presentation transcript:

Nasca Internet Networking and Security viruses

The __________ is a worldwide computer network. internet

Specially formatted pieces of text, called __________, enable a user to jump for one place to another on the Web. hyperlinks

A Web site that anyone can update is known as a(n) __________. wiki

A continuous feed of a video file to your browser that allows you to view the video as it is being downloaded is called __________ video. streaming

__________ is a broad term used to refer to software, such as viruses, worms, or Trojan horses, that has a malicious intent. malware

Internet Explorer is an example of a Web __________. browser

The Internet is a(n) __________ / server network. client

If you want to share your Internet connection with more than one computer, you will need a(n) __________. router

A company that offers Internet connections is called a(n) __________. ISP

For security reasons, you should be extremely wary of opening e- mail __________ such as Word files. attachments

__________ receive data packets and send them to the node for which they are intended. switches

__________ software identifies known viruses effectively. Antivirus

A(n) __________ network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network. Peer-to-peer

A(n) __________ network uses radio waves as its transmission medium. wireless

A(n) __________ on a network can be a peripheral, such as a printer or scanner. node

Viruses triggered by the passage of time or on a certain date Time bombs

Viruses triggered when certain conditions are met Logic bombs

A virus that travels between systems through network connections to spread their infections by infecting a host file. worm

Viruses that temporarily erase their code from the files where they reside and hide in the active memory of the computer Stealth viruses

Program that appears to be something useful or desirable but at the same time does something malicious in the background without your knowledge Trojan horse