Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
How to Keep Your PC Running Like New Bryan Nowak.
SECURITY CHECK Protecting Your System and Yourself Source:
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Kamehameha Schools Kapalama High School Ke Ko’i Lipi 1 to 1 Laptop Learning Program Parent Presentation.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Over 3,000 computers are affected monthly by Malware and Phishing.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Surfing Through the World Wide Web Safe Surfing Through the World Wide Web The World Wide Web connects people from all over the world. The Web allows.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Protection and Internet Safety Chapter 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Business Technology Applications What is Malware.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Running Windows Securely and Efficiently By Gary Esworthy.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Managing Windows Security
Computer Technology Notes 5
Stay Safe While Using The Internet
Computer Security.
Presentation transcript:

Malware Spyware & Viruses

Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?

What’s wrong with mymy computer ?

Symptoms of Malware  Pop-up adds increase  Home page changes without your consent  Unusually S-L-O-W system  Screen image does unusual things (upside down/reverses)  Rude messages may appear  Unknown icons appear in the bottom of the screen bottom of the screen

MALWARE Name of the “bad stuff” that gets into your computer. And there is all kinds of bad stuff out there!!

Adware is annoying. But serious danger to your computer lies in Viruses & Spyware

VIRUS Computer viruses, like biological viruses, can replicate themselves.

Viruses can take over your computer.

Serious Consequences of Viruses  Virus - a hidden program that reproduces and destroys portions of a computer’s storage, memory or network:  Infects files (hard drives & floppy drives)  Invades operating systems  Targets memory storage (RAM & boot sectors)

SPYWARE malicious tracking of software that users are unaware of.

Serious Consequences of Spyware  Spyware - hidden software that tracks user’s Internet habits:  Can lead to identity theft!  Steals personal information & address book  Uses your computer as a secret server to broadcast undesirable files (i.e., pornography)

How can I prevent it?  Passwords  Don’t know = Don’t open  Avoid Spam Advertised Products  Pop-up Boxes  Use Safe Browsers –Firefox / Opera

How can I prevent it?  Install security software /$$$ –Anti-virus –Anti-spyware –Firewall

How can I prevent it?  Download /install security updates and patches

Computer Clean-Up  Remove any programs that you do not need or did not add.  Restart your computer in safe mode.  Disable the system’s restore.  Clear the cache of cookies.  Run a virus scan.  Update the computer’s virus protection.  Back up your files.

REFERENCES  Department of Academic Information Technology. (2007). Malware: The Enemy Within Retrieved from Retrieved from  McAfee, Inc. (2008). McAfee’s 10-Step Internet Safety Plan for Your Family. [Power Point Slides]. Retrieved from Online Web Site: us/local/docs/McAfeeInternetSafetyPlan.pdf us/local/docs/McAfeeInternetSafetyPlan.pdfhttp://usmcafee.com/en- us/local/docs/McAfeeInternetSafetyPlan.pdf  Mystic Network Solutions. How Do I Remove Viruses From My Computer?. Retrieved March 2, 2009 from the World Wide Web:  Net for Beginners. (2009, January). Spyware-Malware Retrieved from  NewsTiger Direct. (2007, January). Viruses, Spyware and Malware Retrieved from  Primeweb Computer and Website Services. Computer Clean Up Tutorial. Retrieved March 2, 2009 from the World Wide Web:

REFERENCES CONTINUED  Spyware Prevent Guide. Retrieved March 2, 2009 from:  Ten Steps to Malware Prevention. Retrieved March 2, 2009 from:  University of Vermont. Safe Computing Malware Clean-up Guide. January 18,