Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Over 3,000 computers are affected monthly by Malware and Phishing.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Unit 19 INTERNET SECURITY
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Protecting Students on the School Computer Network Enfield High School.
SPEAKING ‘Information Technology’ ‘Computers’. Make dialogues on a spot, without preparation. Use active vocabulary from the topics ‘Information Technology’
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
What is Spam? d min.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Business Technology Applications What is Malware.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Malware By: Alex Metzler. Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information.
SPYWARE By Bailey Hoover. HEADINGS What Is This? How to Protect Your Computer Steps If You Think You Have It Spyware Questions?
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Class Name: Online Safety & Privacy Basics
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Computer Security.
Presentation transcript:

Phishing And Malware By Joey Pawoll

Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint will help you against them

Main Points Phishing -Avoiding ItAvoiding It -Reporting itReporting it Malware -If you suspect itIf you suspect it -Signs of InfectionSigns of Infection -ways it can get on your computerways it can get on your computer Works Cited

Phishing : avoiding it Don’t reply to spam letters. Use anti-virus/anti-spyware and a firewall Don’t personal information

Phishing : Reporting it Forward it to Or

Malware : If You suspect it Don’t shop, bank, or do anything using passwords Have all your security software working Scan repeatedly for malware Call professonals if Scanning doesn’t work

Malware : Signs of infection Computer is slow Computer malfuctions Random error messages appears Pop-up ads when you are not using your browser Sends s you didn’t write Displays Web sites you didn’t want to go to

Malware : ways it can get on your computer Sometimes disguised as anti-virus software Appealing websites Unexpected Pop-up ads

Works Cited iybpL8=&h=340&w=470&sz=34&hl=en&start=17&zoom=1&tbnid=sNBTVExYhqwocM:&tbnh=134&tbnw=234&prev=/images%3Fq%3Dphi shing%26um%3D1%26hl%3Den%26client%3Dfirefox-a%26sa%3DN%26rls%3Dorg.mozilla:en- US:official%26biw%3D1024%26bih%3D578%26tbs%3Disch:10%2C247&um=1&itbs=1&iact=hc&vpx=719&vpy=280&dur=4148&hovh=19 1&hovw=264&tx=134&ty=164&ei=XgeATNboHoT78Aavs_2MAQ&oei=UweATInYPIL58AaUiLhs&esq=2&page=2&ndsp=15&ved=1t:429,r :4,s:17&biw=1024&bih=578http:// furl= ySI=&h=295&w=279&sz=29&hl=en&start=15&zoom=1&tbnid=44pNAVacTFS1QM:&tbnh=131&tbnw=153&prev=/images%3Fq%3Dmalw are%26um%3D1%26hl%3Den%26client%3Dfirefox-a%26rls%3Dorg.mozilla:en- US:official%26biw%3D1024%26bih%3D578%26tbs%3Disch:10%2C304&um=1&itbs=1&iact=hc&vpx=136&vpy=240&dur=791&hovh=231 &hovw=218&tx=96&ty=147&ei=nAeATIjfLoO78gbuo4mrAg&oei=lweATKfFHoGB8gbH37lp&esq=2&page=2&ndsp=15&ved=1t:429,r:0,s:1 5&biw=1024&bih=578 h ttp:// / z=40&hl=en&start=15&zoom=1&tbnid=unV060bQHQ2UQM:&tbnh=131&tbnw=144&prev=/images%3Fq%3Dmalware%26um%3D1%26hl %3Den%26client%3Dfirefox-a%26sa%3DN%26rls%3Dorg.mozilla:en- US:official%26biw%3D1024%26bih%3D578%26tbs%3Disch:10%2C513&um=1&itbs=1&iact=hc&vpx=655&vpy=257&dur=26&hovh=214 &hovw=236&tx=137&ty=190&ei=PU-BTOj8CsKB8gbJxviUAg&oei=Nk- BTM24E4GC8gbIpcRr&esq=2&page=2&ndsp=15&ved=1t:429,r:13,s:15&biw=1024&bih=578