Unit 2 - Hardware Computer Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Threats to I.T Internet security By Cameron Mundy.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
We are here to help you… Fight something like this Brownies !
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Understand Malware LESSON Security Fundamentals.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Chapter 40 Internet Security.
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Cyber Security By: Pratik Gandhi.
Viruses and Virus Protection
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 2 - Hardware Computer Security

What is computer security? Measures that are taken to prevent computer systems from malicious attacks, theft, or accidents. These include: Physical security: preventing theft of devices. Information security: preventing theft of private data. Assignment: Bristol Board → Groups of 6, each group does a collage on 1 of the 5 components of hardware. All will find information, 3 will present the information in interesting way (5 minutes min, 10 minutes max), 3 will type out information in POINT FORM to submit to the rest of the class Info required: general information, what the hardware is used for, history, example (picture if possible) of historical hardware, person who invented, if possible, present hardware. INPUT DEVICES – must cover mouse, keyboard, scanner + 2 other CENTRAL PROCESSING UNIT – must cover mother board, the 3 functions of microprocessor, bus, expansion slots, plug in cards RAM – function of RAM, historical RAM, current RAM OUTPUT DEVICES – must cover monitor, printer, + 2 other. Monitor must cover CRT, LCD STORAGE – must cover floppy disk (old and new), CD, hard disk. Must cover repetition per minute

Why would anyone attack a computer? Financial gain Vandalism Curiosity Proving superiority Revenge

Viruses What is a virus? What does a virus do? How do I get a virus? A virus is essentially a program that attaches itself to another program or file, enabling it to spread from computer to computer. What does a virus do? The effects of a virus vary depending on its design. Remember: Someone made that virus! It’s effects are intentional. How do I get a virus? Most viruses are attached to an executable file (.exe). A VIRUS WILL NOT RUN ON YOUR COMPUTER UNLESS THE INFECTED FILE IS EXECUTED! Generally, viruses do not spread without human interaction.

Worms What is a worm? How does the worm travel? A worm is similar to a virus except that it can travel from computer-to-computer without human interaction. How does the worm travel? It takes advantage of existing pathways of travel. Common route: The worm is programmed to look for the computer user’s address book and send copies of itself to everyone. Why are worms so dangerous? People are stupid – they see an email from a friend and despite how strange it appears, they open the attachment.

Famous Worms: Morris Worm Big Idea: Used bugs in email programs built into operating systems to execute undesired code. Spread from computer to computer, but did nothing else. Why was it so dangerous? It re-infected the same computers over and over. This bogged down the computers and made them unusable. Estimated Damages: $10,000,000 USD Famous Quote: “There may be a virus loose on the internet.” - Andy Sudduth of Harvard, 34 minutes after midnight, Nov. 3, 1988

Famous Worms: ILOVEYOU Big Idea: Propagated as an email attachment in Outlook (email program) and mailed itself to all the users on the users' mailing list. Changed the extensions of many files to .VBS and over wrote some others. Also was known to steal passwords and credit card information. Why was it so dangerous? One of the earliest worms to use email lists to propogate. Estimated Damages: $5.5 to 10 billion USD Famous Quote: “There may be a virus loose on the internet.” - Andy Sudduth of Harvard, 34 minutes after midnight, Nov. 3, 1988

Famous Worms: Mydoom Big Idea: Why was it so dangerous? Attacked Windows computers only. Looked like a “Email not sent” failure message. Asked to resend by clicking on the attachment. Once opened, it installed a copy of the worm on the host computer. Once installed, sends mail to address book contacts and also copied itself to shared folders of Peer-to-Peer networks. It also opened a backdoor on the compromised PC to allow access to the hacker at anytime. Why was it so dangerous? Spread quickly, left computers open ALL of the time. Estimated Damages: Over $22 billion USD Interesting Fact: Author not known!

Trojan Horse A Trojan horse is a virus that disguises itself as something you’d want (e.g. a free anti-virus software). Once opened, the Trojan horse typically opens a backdoor on the computer and alerts the controller of the access opportunity. Controller can connect to the infected computer and do some really nasty stuff.

Spyware Not really a virus. Spyware tracks your Internet movements (browser history, etc.) and sends targeted advertisements to you. This is often done through Internet cookies -- small files that websites put on your PC to store information about you and your browsing preferences. Malicious spyware will relay this information back to its owner. Some of this information could be private or financial data.

Malware Malware is a term used to refer to all of the discussed security threats. Malware comes from a number of sources: Infected files Infected programs Exploits (using bugs in programs that haven’t been fixed yet)

Exploits An exploit is a bug in a piece of software that a person can use to their advantage. Only a very small percent of the population knows about the exploit and therefore it remains unfixed by the software’s creators until the knowledge is public. Many websites exist that are dedicated to notifying the public about exploits. This does two things: Allows hackers to use the exploit to their advantage. Forces the software creators to move quickly to release a fix. Windows often requires patch fixes for exploits.