By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Computer Parts There are many parts that work together to make a computer work.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Basics 1 Computer Basic 1 includes two lessons:
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Security, Privacy, and Ethics Online Computer Crimes.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Chapter 1 - Introduction to Computers and the Internet Basic functions of a Computer Input – entering info into the computer (e.g. keyboard, mouse, mic,
ETT 429 Spring 2007 Hardware/Software Basics. Agenda Technology Standards Review Technology Standards Review Results of Technology Self Assessment Results.
COMPUTER SYSTEM COMPONENTS ACTIVITY
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
An Overview of Using Computers
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer System Game 6511 Keyboarding
Computer Basics.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
Computer security By Isabelle Cooper.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
There are many parts that work together to make a computer work. System Unit Computer Parts.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Parts There are many parts that work together to make a computer work.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
What they are and how to protect against them
“Jeopardy” Video Game Addiction by Will Wisner-Carlson, Viruses by Tavon Cooper, Devices by Da’Shon Palmer, Inside The Computer by Thomas Kwenah Jr., Internet.
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
Cyber Security By: Pratik Gandhi.
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chapter 1 - Introduction to Computers and the Internet
Presentation transcript:

By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

 Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.

Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.

Use Boolean operators to combine your key terms. Boolean operator words are; And, Not, and Or. Use quotation marks around names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign (-) to reduce search results from your topic.

1. First choose a topic to search about. 2. Decide what key terms to use in your search. 3. Choose a search engine to go to. 4. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.

 Input devices give the CPU information to process.  They allow the user to manipulate the computer.  They include a mouse, keyboard, webcam, and scanner.

 Output Devices receive information from the CPU in order to present it to the user.  Output devices include a printer, fax machine, speaker, monitor, and projector.

 Communication devices help the computer connect with other computers, often through the Internet.  The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.

 Storage devices store the computer’s data.  They include Random Access Memory for short-term memory, and a hard drive for long term memory.  A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.

 Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.

 Computer viruses are programs that piggyback on existing files in your computer.  They wreak havoc, slow your computer down, and can erase your hard disk.  They can be “caught” by reading malicious s, or downloading scary internet stuff.  They can display images or words without a keyboard.

 Hackers are people who enjoy harassing people and destroying things.  There may be financial motives, such as if you were infecting another companies network.  They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.

 They can be “caught” by reading malicious s, or downloading scary internet stuff.  They cannot be caught simply by going to a website and looking at information.  Online bulletin boards can be corrupted and will infect a host if entered.

 ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via , posing as an executable attachment sent by a friend from the target's contact list. (Bright hub)  Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub)  Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via s sent to contacts from the infected users' address books.(Bright Hub)

 Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs.  Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.

 Viruses are inevitable, but can be prevented.  Installing anti-virus software will give you notices and will greatly enhance protection.  DO NOT CLICK ON S FROM PEOPLE YOU DO NOT KNOW!  Only download from trusted sites- Java, ITunes, Adobe.

Spyware Video Game Addiction Internet Searchin g I/O/C/S Devices Viruses Game Board

 No No  Yes Yes  Well, obviously its not this option Well, obviously its not this option  If you pick this one, you are really dumb, like I’m not even playing If you pick this one, you are really dumb, like I’m not even playing

 Go back to the gameboardgameboard

Try again, homeboyagain

 Yes Yes  No No  I don’t know I don’t know  2+2=4 2+2=4

 Try againagain

 Go back to the gameboardgameboard

 Click on Pop-ups Click on Pop-ups  Download music from sketchy looking sites Download music from sketchy looking sites  Don’t have a spyware scanner Don’t have a spyware scanner  Use a Pop-up blocker Use a Pop-up blocker

 Go back to the gameboardgameboard

 Try againagain

 The Background The Background  iTunes Library iTunes Library  The keyboard The keyboard  The mouse The mouse

 Why don’t you go cry home to yo mama? Try again again

 Go back to the gameboardgameboard

 More than 98% More than 98%  Less than 98% Less than 98%  More than 80% More than 80%  Less than 80% Less than 80%

 Or am I sorry? Try againagain

 Go back to the gameboardgameboard

 Call of Duty Modern Warfare 2 Call of Duty Modern Warfare 2  Halo 3 Halo 3  Sims Sims  World of Warcraft World of Warcraft  Pacman Pacman

 Good Guess

 Try the question again Try the question again

 1 hour 1 hour  5 hours 5 hours  30 minutes 30 minutes  3 hours 3 hours  None of the above None of the above

 Try Again Try Again

 Yes, but they don’t care that they are Yes, but they don’t care that they are  No No  Yes Yes  No, but they think they are No, but they think they are

 Try Again, Sucker! Try Again, Sucker!

 There's no such thing There's no such thing  Relationships with family or friends take a plunge. Relationships with family or friends take a plunge.  You don’t play that often You don’t play that often  Eating Pie Eating Pie  Getting good grades Getting good grades

 Try Again Try Again

 Yes Yes  No No  Maybe so Maybe so  I don’t know I don’t know  Kinda Kinda

 But if you want to try again click hereclick here this is you

a) And And b) Not Not c) Or Or d) All of the above All of the above

Try Again

a) Minus sign Minus sign b) Quotation marks Quotation marks c) Backspace sign Backspace sign d) Neither Neither

Try Again

a) Thrashing Thrashing b) Mashing Mashing c) Crashing Crashing d) Lashing Lashing

Try Again

a) Choose keywords that describes your topic. Choose keywords that describes your topic. b) Choose a search engine (Google, Yahoo etc.) Choose a search engine (Google, Yahoo etc.) c) Identify your topic of your search. Identify your topic of your search. d) Evaluate your results. Evaluate your results.

Try Again

a) Headline Headline b) Home plate Home plate c) Homepage Homepage d) Home stead Home stead

Try Again

Go Back To Game Board

 Modem Modem  Scanner Scanner  Copier Copier  CD-Rom CD-Rom

 That was incorrect. Back to the Question

 That was correct! Back to Gameboard

 True True  False False

 You clicked on the wrong answer. Back to the Question

 You selected the correct answer. Back to Gameboard

 Allows the computer access the Internet Allows the computer access the Internet  Could be a fax machine Could be a fax machine  Houses the computer’s information Houses the computer’s information  Gives the CPU information from the user Gives the CPU information from the user

 That is wrong. Back to the Question

 You are right. Back to Gameboard

 Storage Storage  Communication Communication  Output Output  Input Input

 You chose an incorrect answer. Back to the Question

 You chose the correct answer! Back to Gameboard

 Storage Storage  Communication Communication  Output Output  Input Input

You selected an incorrect answer. Back to the Question

You selected the correct answer! Back to Gameboard

 Create ads on your computer Create ads on your computer  Make pop-ups Make pop-ups  Destroy files and erase hard disks Destroy files and erase hard disks  Create images on your computer screen Create images on your computer screen

 TRY AGAIN…..or else. TRY AGAIN

 Financial priorities Financial priorities  Simple joy of destruction Simple joy of destruction  They want to ruin great resources for others They want to ruin great resources for others  All of the above All of the above

 TRY AGAIN…..or else. TRY AGAIN

 Worm Worm  Trojan horse Trojan horse  Bug Bug

 TRY AGAIN…..or else. TRY AGAIN

   

 TRY AGAIN…..or else. TRY AGAIN

 Buying a new computer Buying a new computer  Only visiting certain sites Only visiting certain sites  Only visiting reputable websites Only visiting reputable websites  Opening all s Opening all s  Clicking on pop-ups Clicking on pop-ups

 TRY AGAIN…..or else. TRY AGAIN

 (FIST BUMP)  Back to game boardgame board

 security/articles/38830.aspx security/articles/38830.aspx   Mrs. Kotsch. Searching the Internet, N/A Baltimore City College Oct , [ _ID=86592&type=u&termREC_ID=&pREC_ID=71408] [ _ID=86592&type=u&termREC_ID=&pREC_ID=71408]  Coustand, David, How Spyware Works, (n.d) How Stuff Works, October 25,2010, [  addiction-no-fun addiction-no-fun  addiction.html addiction.html 