Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Unit 2 - Hardware Computer Security.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
An Introduction to Phishing and Viruses
CYBER SECURITY...
Cyber Security Awareness Workshop
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Presentation transcript:

Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern

Malicious Attacks 1. Introduction 2. Background and Evolution 3. Preventative Steps 4. Challenges

Introduction Text Virus A program that copies itself into other programs that are executed, in order to wreak havoc. Trojan Horse A program that appears to be harmless, but which causes damage when run. Phishing The use of various forms of social engineering to trick computer users into giving away personal information. Malicious attacks can be defined as any attempt to undermine the privacy or security of a computer system, usually taking one of the following forms: What are malicious attacks?

Introduction Text Identity Theft Hackers often want to steal personal information, such as social security numbers or credit card numbers from a person or group of people. Denial-of-Service Attack Some viruses infect many computers, which combine to overload a secondary target, such as a government- or company-owned network. Just for Fun Some hackers simply enjoy destroying other people’s computers. The hackers, or people who engage in cyber attacks often have one or more of the following goals: What are the goals of malicious attacks?

Background and Evolution 1980s 1990s – early 2000s 2000s - Present Popularization of the personal computer. Malicious software first takes the form of trojan horses posted to bulletin boards (early messaging system) and simple viruses on floppy disks. The Internet becomes popular. Viruses become common as attachments. Examples include the Melissa virus in 1999 and the ILOVEYOU virus in Phishing and other social engineering attacks are on the rise. Viruses occur on a large scale in computers that are not protected.

Preventative Steps Text For Viruses, Trojan Horses, and Worms Install and maintain up-to-date antivirus software. Install all security updates. Never download files from the Internet unless it is from a trusted source. If you think your computer has a virus, get help right away. For Phishing Be careful never to send personal information over e- mail or click hyperlinks within text. If you ever doubt the authenticity of a message, contact the sender or legitimate organization before taking further action. The following measures can be taken to help prevent a malicious attack: What can be done to prevent malicious attacks?

Challenges Text Effective antivirus software is often too expensive for some people to afford. The source a virus is often difficult or impossible to pinpoint. File sharing via the Internet or other means such as USB drives is increasing and will continue to increase. Many people simply have not been taught how to recognize phishing attempts and scams. Hackers are smart and are often one step ahead. Various factors make it difficult for people to stay protected from malicious computer attacks: What inhibits the prevention of attacks?

Our Opinion Text Increased awareness of the dangers of the Internet and file-sharing Development by trusted organizations of freely available protective software Education about phishing and how to identify likely phishing attempts Government involvement in countering large-scale viruses and cyber attacks We think the following would help to decrease the success of malicious attacks: How can we help?