Protecting Your Computer & Your Information

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Data Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Internet Security and Your Computer Welcome to Boot Camp.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Running Windows Securely and Efficiently By Gary Esworthy.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Managing Windows Security
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Computer Viruses.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Protecting Your Computer & Your Information

Threats Virus Worm Trojan horse Rootkits Blended methods Spyware & Malware All of the threat can have varying levels of impact from annoying to disabling.

Virus Attaches itself to a program or file. Has the ability to spread from one computer to another. Almost all viruses are attached to executable files and will not infect your computer until the executable is run. Usually require some form of human action to spread.

Worm Really a sub-class of virus but significant enough to be classified separately. Spreads from computer to computer without any human interaction. Capable of replicating itself until it consumes all available memory or processing capacity.

Trojan Horse A program that hides inside of another program. Usually embedded in software that appears legitimate that the user download and executes. Embedded program often activates in response to an event or date. Does not reproduce by infection other files nor does it self-replicate.

Rootkit Infects the system kernel or disk boot record. Typically very difficult to detect and remove. Sometime spread as a DRIVE-BY download where just visiting an infected website infects your computer.

Spyware & Malware Often tracks users movements. Creates logs of keystrokes, emails, websites visited, etc.

Regular user vs. Administrator For day-to-day use of the computer you should be logged in as a regular user. Only log into an administrator account when you need to perform an action that requires administrator rights. Always be cautious when an application asks for administrator rights.

Updates Perform regulars updates of your operating system (OS) and your applications. Turn on automated updates. Make sure updates are scheduled to run.

Backups Ideally back up your full system. Back up your data on a regular basis. Back up to a separate physical device. Back up to a removable media. Test your backups to make sure they are good. Encrypt your data on removable flash drives.

Useful Software Virus Protection Spyware/Adware Firewalls Microsoft Security Essentials (free, full version) MalwareBytes (free limited version for home use) Spyware/Adware Ad-Aware Personal (free limited version) Spybot-Search & Destroy (free limited version) Firewalls ZoneAlarm The software listed above is (or at least was) free for personal use.

Useful Software Links McAfee VirusScan @ NDSU Ad-Aware http://www.ndsu.edu/its/software/ Ad-Aware http://www.lavasoft.com/ Spybot Search & Destroy http://www.safer-networking.org/en/download/index.html ZoneAlarm http://www.zonealarm.com/security/en-us/home.htm A Guide to Firewalls & other software http://www.firewallguide.com/

Phishing Anti-Phishing Phil http://cups.cs.cmu.edu/antiphishing_phil/ A game based tutorial that teaches users how to identify phishing URLs, where to look for cues in web browsers, and how to use search engines to find legitimate sites. This is now a commercial product but you can still play the first round for free.