IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Threats To A Computer Network
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Quiz Review.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Lesson 2 — The Internet and the World Wide Web
IT security By Tilly Gerlack.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
CIS 250 Advanced Computer Applications Internet/WWW Review.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Topic 5: Basic Security.
Malicious Software.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Unit 3 Section 6.4: Internet Security
IT Security  .
Protect Your Computer Against Harmful Attacks!
What is it? Why do I keep getting from Barracuda? SPAM.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
The Internet and Electronic mail
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

IT internet security

The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase i) is any collection of separate physical networks, interconnected by a common protocol to form a single logical network The Internet (uppercase I) is the worldwide collection of interconnected networks that uses Internet Protocol (IP) to link the various physical networks into a single logical network

The World Wide Web A network of information contained in web pages which are found and viewed by using web browser programs eg Internet Explorer or Netscape Technically, the World Wide Web is all the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) It links pages and sites together using hypertext links The web is not the same as the Internet. It is just part of it, and only one of several Internet environments Others include , Internet Relay Chat, FTP (File transfer Protocol), and Usenet news groups

Browser A software application used to navigate the www to locate and display Web pages eg Explorer A World Wide Web access program that requests documents or other files from a web server, and displays them on a user's display device

Intranet A private network of computers within an organization used to share information and computing resources It sits behind a firewall and is only accessible to people who are members of the same organization, using passwords and logins Uses regular Internet protocols and looks like a private version of the Internet

Extranet It is an intranet that is partially accessible to authorized outsiders You can only access an extranet if you have a valid username and password, and your identity determines which parts of the extranet you can access

Viruses Self-replicating programs that spread by inserting copies of itself into executable code or documents Can only spread from one computer to another when its host is taken to the uninfected computer, eg sending it over a network or carrying it on a removable disk May cause a simple prank that pops up a message May destroy programs and data right away or on a certain date Can lie dormant and do its damage once a year. eg the Michaelangelo virus contaminates the machine on Michaelangelo's birthday

Worms A computer worm is a self-replicating computer program, similar to a computer virus It is self-contained and does not need to be part of another program or attach itself to other files or programs to spread itself It may be designed to do any number of things, eg delete files or send documents via or carry other executables as a payload It can spread itself automatically over the network from one computer to the next

Trojans Trojan horse is a program in which harmful code is contained inside apparently harmless program or data so that it can get control and cause damage

Hoaxes Hoaxes may seem harmless, but they do a great deal of damage to the Internet as a whole Not only do they slow down traffic and clog up servers, but they also cause people to panic

Phishing A form of identity theft an is sent that looks like it comes from a legitimate company (eg E-Bay) telling you that you must update your records and verify your username and password The site is really a fraud which captures your information to steal your identity, money, or whatever

Spam The Internet version of junk mail Over 50% of all s today are junk Spamming is sending the same message to a large number of mailing lists or newsgroups without consent The term probably comes from a famous Monty Python skit Often used to carry viruses, worms etc

Spyware (or Adware) Program that secretly monitors your actions on your computer without your permission Sends this information to someone else Some are sinister and gather information about addresses, passwords and credit cards Some are used by software companies to gather data about customers