Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Hacker Zombie Computer Reflectors Target.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
 Introduction to Computing  Computer Programming  Terrorisom.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Understand Malware LESSON Security Fundamentals.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
CYBER SECURITY...
Unit 4 IT Security Kerris Davies.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!

Introduction Symantec's Government Internet Security Threat Report states that the U.S. is the top country for overall malicious activity in 2008.Symantec's Government Internet Security Threat Report states that the U.S. is the top country for overall malicious activity in It’s also ranked first for malicious code, phishing website hosts, and originating attacks.It’s also ranked first for malicious code, phishing website hosts, and originating attacks. Attacks on government computer networks in U.S. that resulted in compromised or stolen information increased by 40 percent from 2007 to 2008.Attacks on government computer networks in U.S. that resulted in compromised or stolen information increased by 40 percent from 2007 to 2008.

In July 2009, an average of 89 percent of all messages were spam!In July 2009, an average of 89 percent of all messages were spam! It’s clear that the effects of malicious cyber attacks affect everyone!It’s clear that the effects of malicious cyber attacks affect everyone! If the internet is to become a safer place, we must understand the trends and developments taking place in the internet threat landscape and maintain online security best practices.If the internet is to become a safer place, we must understand the trends and developments taking place in the internet threat landscape and maintain online security best practices.

Background Information Types of Attacks

Trojan Horse

Worms

Viruses

Hoaxes

Spam

Phishing

Challenges of Preventing Mallicious Attacks Integration of open-source software and commercial software.Integration of open-source software and commercial software. Inherent security limitations in various technologies.Inherent security limitations in various technologies. Ignorance of people.Ignorance of people. Activities performed by people.Activities performed by people. International legal environments.International legal environments.

The integration of open-source software and commercial software sometimes provides security issues.The integration of open-source software and commercial software sometimes provides security issues. Commerial operating system vendors will often include open-source software in their products.Commerial operating system vendors will often include open-source software in their products. But vulnerabilities are often found in the open source software that the public becomes aware of and can use to compromise the commercial software.But vulnerabilities are often found in the open source software that the public becomes aware of and can use to compromise the commercial software.

Some technologies have inherent security limitations that can inhibit efforts to prevent malicious attacks.Some technologies have inherent security limitations that can inhibit efforts to prevent malicious attacks. For example, cannot always be verified as coming from a specific server because secure certificates are not included in standards.For example, cannot always be verified as coming from a specific server because secure certificates are not included in standards. Additionally, it can be challenging for spam software to be completely sure that it has detected that a message is spam and therefore some software must be conservative to prevent deleting legitimate messages.Additionally, it can be challenging for spam software to be completely sure that it has detected that a message is spam and therefore some software must be conservative to prevent deleting legitimate messages.

Many people are ignorant about basic attack mechanisms and thus attackers are successful in using trivial attack mechanisms.Many people are ignorant about basic attack mechanisms and thus attackers are successful in using trivial attack mechanisms. This is fundamental to an understanding of why phinshing attacks are so successful.This is fundamental to an understanding of why phinshing attacks are so successful. People often do not carefuly inspect the sender address of their s and therefore can be easily lead to believe that s come from legitimate sources.People often do not carefuly inspect the sender address of their s and therefore can be easily lead to believe that s come from legitimate sources.

People's activities sometimes increase their chances of becoming attacked.People's activities sometimes increase their chances of becoming attacked. For example, some people download materials from questionable sources.For example, some people download materials from questionable sources. Spam attacks are encouraged because some people actually purchase the products described in these messages.Spam attacks are encouraged because some people actually purchase the products described in these messages.

Many countries outside the United States have legal climates that make it difficult to punish those participating in malicious attacks. For example, captcha-sweatshops have been erected in some countries that allows attackers to obtain a large number of addresses from trusted domains such as yahoo.com and gmail.com for the purpose of distributing spam!

Lessening the ”PROBLEM” With the right amount of computer software, an education about what the problem is, and good computer habits you can minimize the potential threat of a Malicious Attack. Here’s How:  Know the attackers strategies. If you understand how an attack could happen you are more likely to see one coming.  Install software programs such as; firewalls, a spyware scanner, a Trojan horse program, as well as an antivirus program. (Make sure that you ALWAYS run up-to-date scans otherwise your computer is not actually secure)  Mind your computer manners! – Now that you have software checking for issues you must follow good habits to keep your computer safe and healthy. To do so you must: keep your hard drive clean, backup important files, and, when opening a downloaded file make sure to “SAVE” before you “RUN”- this will ensure that your software will scan the file and make sure that it is safe to run on your computer Now that you know how to prevent a malicious attack don’t be lazy! Stay safe and smart!

What We Think We need to be prepared to combat malicious attacks by being able to identify dangerous software and practicing proper safety measures We need to be prepared to combat malicious attacks by being able to identify dangerous software and practicing proper safety measures We believe we should increase the penalty for hackers and spammers in order to lessen the amount of Malicious attacksWe believe we should increase the penalty for hackers and spammers in order to lessen the amount of Malicious attacks

To Conclude The U.S. has the largest Malicious Attack problem in the worldThe U.S. has the largest Malicious Attack problem in the world Always remember there are 6 types of attacks:Always remember there are 6 types of attacks: Trojan Horses, Worms, Viruses, Hoaxes, Spam, and Phishing.Trojan Horses, Worms, Viruses, Hoaxes, Spam, and Phishing. Use proper software programs such as firewalls and anti-viruses and good computing habits to keep your computer healthy and happy!Use proper software programs such as firewalls and anti-viruses and good computing habits to keep your computer healthy and happy!

The End