Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
VIRUS.
Computer Skills and Applications Computer Security.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
HI150 – Automation of Health Information Unit 2 Seminar.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technology in Action 1 © 2008 Prentice-Hall, Inc..
Operating Systems Services provided on internet
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
© 2009 Prentice-Hall, Inc. 1.
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Chapter 9 Securing Your System: Digital Data and Devices
© 2009 Prentice-Hall, Inc. 1.
Securing your system, protecting your digital data and devices.
Presentation transcript:

Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1

Hackers Anyone who unlawfully accesses a computer system Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffing Commit identity theft © 2009 Prentice-Hall, Inc. 2

How Hackers Gain Access Direct access: –Hacking software Indirect access: –Internet connection –Logical ports © 2009 Prentice-Hall, Inc. 3

Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders –A firewall is built into Windows Vista –More robust firewalls are available from other vendors –Firewalls are critical if you have an always-on broadband connection © 2009 Prentice-Hall, Inc. 4

Protecting a Wireless Network Wireless network range doesn’t stop at the property line Default device and network ID settings allow intruders to enter the network Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover © 2009 Prentice-Hall, Inc. 5

Computer Threats: Viruses A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program © 2009 Prentice-Hall, Inc. 6

How Does a Computer Catch a Virus? Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives attachments are the most likely source of a virus © 2009 Prentice-Hall, Inc. 7

What Viruses Do Replicate themselves: –Slow down networks Secondary objectives: –Display annoying messages –Delete files on the hard drive –Change computer settings © 2009 Prentice-Hall, Inc. 8

Types of Viruses Boot-sector viruses –Replicate themselves in the boot sector of the hard drive Logic bombs –Activate when certain conditions are met Time bombs –Viruses that are triggered by the passage of time or on a certain date Worms –Travel between systems through networks © 2009 Prentice-Hall, Inc. 9

Types of Viruses Script viruses: –Hidden on Web pages as mini programs Macro viruses: –Attached to documents –Series of commands virus –Use address book to distribute the virus Encryption viruses –Compresses files using a complex encryption key –User must pay to get the files unlocked © 2009 Prentice-Hall, Inc. 10