Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Chapter Nine Maintaining a Computer Part III: Malware.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
What is Spam? d min.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
HI150 – Automation of Health Information Unit 2 Seminar.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
IT Security  .
Staying safe on the internet
Computer Security.
Presentation transcript:

Internet Safety CSA September 21, 2010

Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Malware Malicious Software

Types of Malware Virus Worm Trojan Horse

Viruses Virus: A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program Replicate themselves – Slow down networks Secondary objectives – Display annoying messages – Delete files on the hard drive – Change computer settings Need human action to spread

How Computers Catch a Virus Viruses copy themselves and infect a file on your computer Spread by – Sharing disks or flash drives – Opening an attachment – Downloading infected audio or video files

Worms Infect computer networks Copy themselves over the network Slow down network traffic Do not need human action to spread

Trojan Horse Looks like something else Screen saver Game Malicious code hidden inside Cannot spread by itself Commonly opens up a back door to your computer

Spyware Piggybacks on another program May or may not be malicious – Records web sites visited – Key logger Adware – Downloads or displays ads

Spam SPAM: Unwanted or junk – To avoid SPAM Create free Web-based account for filling out online forms or making online purchases Use a spam filter Do not try to “unsubscribe” from spam s Use an forwarding service SPIM: Unsolicited instant messages

Hackers Anyone who unlawfully accesses a computer system Types of hackers – White hat – Black hat – Gray hat – Script kiddies May work for computer criminals

What Hackers Steal Hackers try to steal data stored on hard drives: – Credit card numbers – Bank account numbers Also can steal information through packet sniffing Use information to commit identity theft

Cyber Crime Criminal acts conducted by cybercriminals through the use of computers

Types of Cyber Crimes Fraud-related (58 percent of cybercrime) – Auction fraud – Identity theft – Credit and debit card fraud Non-fraud-related – Computer intrusions – Unsolicited – Child pornography / child exploitation Extortion

Social Engineering Uses social skills to generate human interaction to entice individuals to reveal sensitive information – Usually does not use a computer or face-to-face interaction – Pretexting Kevin Mitnick

Phishing & Pharming Phishing – Uses to lure user to fake Web sites – Tricks user into revealing private data Pharming – Malicious code changes Web browser’s ability to find Web addresses – Bogus web sites spoofing real sites

Botnets Zombie computers – Backdoor access Tended by bot herders May contain millions of computers Used by criminal gangs for: – Spam – DOS & DDOS

Computer Protection Anti-virus program Firewalls Passwords Back ups

Anti-virus Programs Programs designed to detect viruses – Scan files looking for virus signatures (unique code) – Provide options for deleting or fixing infected files – Inoculate files against further infection Needs to be updated frequently – Good guys always one step behind Rogue security software

Good Passwords Create a strong password – At least 14 characters, including numbers, symbols, and upper- and lowercase letters – Not a single word or a word from a dictionary – Not easily associated with you (birthday, name of pet, nickname) – Use different passwords for different sites – Do not tell anyone or write down password – Change password regularly (every month)

Firewalls Software programs or hardware designed to close computers to invaders A software firewall is built into Windows Other software firewalls are available from vendors Network routers can contain a hardware firewall Firewalls are critical if you have an always- on broadband connection Test your computer’s vulnerability

Data Back-up Backup – A copy of a file that can be used to replace the original Types of files to back up – Program – Data Backup routine – Frequency – Changed files

Data Back-up Software programs for easy backup – Schedule automatic backups – Can back up files, folders, or entire drives – Back up to USB device, CD, or DVD Entire system backup software – Takes an image of the entire system – Stores on a separate hard drive – In case of failure, a new drive is inserted

Data Back-up Store backups offsite Online backups – Store backup files on Internet servers – Fees for the service Hardware can be replaced, data cannot