Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One e-mail in every 200 containing.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protect Your Computer Protect Your Work Computing & Communications.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security for Seniors SeniorNet Help Desk
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Types of Electronic Infection
By Demi Gardiner 8P Who’s been on your computer??
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
How to protect your computer By: Emily, Jackie and Kathleen.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Chapter 40 Internet Security.
Managing Windows Security
What they are and how to protect against them
Cyber Security By: Pratik Gandhi.
Computer Worms & Viruses
Risk of the Internet At Home
Technology Mrs. Huddleston
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Protecting Yourself Online

VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing a virus. Virus-scanning company MessageLabs said it stopped 9.3 million viruses in 2 billion s last year, which equated to one virus in every 215 s. Protecting Yourself Online

Virus A computer program that replicates by attaching itself to another object. Trojan Horse A program with hidden destructive functionality. Worm A computer program that replicates independently by sending itself to other systems. Protecting Yourself Online

HOW DO WE GET INFECTED? Sharing Floppies & CDs Downloading Warez Peer To Peer File Sharing (Napster, Kazaa) Back Alley Websites Instant Messaging And finally as of lately… Just connecting to the Internet Protecting Yourself Online

August 2003 Blaster, which zeroes in on the Windows 2000 and Windows XP operating systems, has been timed to attack a Microsoft security website distributing the patch needed to stop the worm in its tracks before it hits millions of users. It was ultimately derived from a package created by a Chinese group called Xfocus. Protecting Yourself Online

Infections spread at a steady rate, with the worm taking over 30,000 systems per hour during peak times. The new infections rate peaked around 11pm on Monday, with over 68,000 new infected IP addresses appearing in that hour. Protecting Yourself Online

SATELLITE BASED HIGH speed internet provider Direcway, reports that its customers are running a 10-20% infection rate. Direcway's service was effectively unusable for almost 2 weeks. Direcway has cut off service to all of their customers with the blaster virus, in order for their network to survive. Protecting Yourself Online

So How Does That Affect Me? Render your computer useless Delete your files Use your computer against others (possibly legal trouble for you) You could lose Internet privileges. Gain important personal information about you (passwords, finances, etc) Protecting Yourself Online

If configured incorrectly, a file-sharing mechanism can share far more than you intend. Once a worm or virus has control of your machine, it can use file-sharing and transmission features to send your personal information to a malicious third party or to propagate itself. CERT/CC indicate that tens of thousands of systems have recently been compromised in this manner. Instant Messaging Dangers… Protecting Yourself Online

Keep IM within the firewall. Install a gateway product. Encrypt messages. Block file transfers. Instant Messaging Dangers… Protecting Yourself Online

The Virus test: Does this contain a virus? To determine this, you need to install and use an anti-virus program The KRESV test for The Know test: Is the from someone that you know? The Received test: Have you received from this sender before? The Expect test: Were you expecting with an attachment from this sender? The Sense test: Does from the sender with the contents as described in the Subject line and the name of the attachment(s) make sense? Protecting Yourself Online

Password Defenses Protecting Yourself Online

Protection Use a combination of characters, numbers and, if possible, symbols. Alternate the capitalization, interchanging upper case with lower case. Don't use common words. Don't use proper names, names of family or friends. Don't use the same password for everything. Never give out your password to strangers. Change passwords periodically. Protecting Yourself Online

Install Antivirus Software and Keep It Up To Date. Activate full-time protection. Make sure “All Files” are scanned. Turn On Automatic Updating Use a personal firewall – (Hardware/Software) Keep regular backups of important data. Keep your operating system up to date. Be cautious of attachments even if you know the sender. Protecting Yourself Online Protection

FIREWALLS An Internet Router, which is installed between your Internet connection and the rest of your network, protects your network by making your individual computers virtually invisible to the outside world Protecting Yourself Online Protection

Protecting Yourself Online Protection System Updates

Questions?