Just What Are Worms, Adware, Spyware, and Phishing Expeditions?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.
Computer Viruses.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Identity Theft - Here and Now Shaw High School February 5, 2010 Dr. Shamim Khan TSYS School of Computer Science Columbus State University
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
IT Security  .
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Just What Are Worms, Adware, Spyware, and Phishing Expeditions?

May 4, 2006MICCA Definitions Worm: a self-replicating computer program, similar to a computer virus. It is self-contained and does not need to be part of another program to propagate itself. –Example: Sobig and Mydoom. Virus: attaches itself to, and becomes part of, another executable program; –Macro viruses are written in the scripting languages for Microsoft programs such as Word and Excel. In general, a virus cannot propagate by itself whereas worms can. A worm uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself. From Wikipedia -

May 4, 2006MICCA Definitions Trojan Horse: A malicious program that is disguised as legitimate software –These are often those attachments to that entice you to open them Malware: Software designed to infiltrate or damage a computer system, without the owner's consent –Includes computer viruses, Trojan horses, spyware and adware

May 4, 2006MICCA What to do Signs of infection –May seem sluggish or slow down significantly –Might ‘lock up’ more often than usual –Browser program may not work correctly –Pop-up ads –Unusual hard drive activity Ways to get rid of –Use your anti-virus software (you have one right!!!) Scan all your drives –Use Microsoft Malicious Software Removal Tool urity/malwareremove/default. mspxhttp:// urity/malwareremove/default. mspx –McAfee: D=1&resolution=1280x1024&r url=vrContactOptions.asp D=1&resolution=1280x1024&r url=vrContactOptions.asp –Symantec: scv6/default.asp?productid=sy mhome&langid=ie&venid=sym scv6/default.asp?productid=sy mhome&langid=ie&venid=sym

May 4, 2006MICCA Chain Letter Hoax Definition: An which urges the recipient to forward the to other people DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERIAN HEAD OF STATE, GEN. SANI ABACHA. AFTER HE DEATH OF MY HUSBAND WHO DIED MYSTERIOUSLY AS A RESULT OF CARDIAC ARREST, I WAS INFORMED BY OUR LAWYER, BELLO GAMBARI THAT, MY HUSBAND WHO AT THAT TIME WAS THE PRESIDENT OF NIGERIA, CALLED HIM AND CONDUCTED HIM ROUND HIS APARTMENT AND SHOWED HIM FOUR METAL BOXES CONTAINING MONEY ALL IN FOREIGN EXCHANGE AND HE EQUALLY MADE HIM BELIEVE THAT THOSE BOXES ARE FOR ONWARD TRANSFER TO HIS OVERSEAS COUNTERPART FOR PERSONAL INVESTMENT. ALONG THE LINE, MY HUSBAND DIED AND SINCE THEN THE NIGERIAN GOVERNMENT HAS BEEN AFTER US, MOLESTING, POLICING AND FREEZING OUR BANK ACCOUNTS AND EVEN MY ELDEST SON RIGHT NOW IS IN DETENTION. MY FAMILY ACCOUNT IN SWITZERLAND WORTH US$22,000, AND 120,000, DUTCH MARK HAS BEEN CONFISCATED BY THE GOVERNMENT. THE GOVERNMENT IS INTERROGATING HIM (MY SON MOHAMMED) ABOUT OUR ASSET AND SOME VITAL DOCUMENTS. IT WAS IN THE COURSE OF THESE, AFTER THE BURIAL RITE AND CUSTOMS, THAT OUR LAWYER SAW YOUR NAME AND ADDRESS FROM THE PUBLICATION OF THE NIGERIAN BUSINESS PROMOTION AGENCY. THIS IS WHY I AM USING THIS OPPORTUNITY TO SOLICIT FOR YOUR CO-OPERATION AND ASSISTANCE TO HELP ME AS A VERY SINCERE RESPONSIBLE PERSON. I HAVE ALL THE TRUST IN YOU AND I KNOW THAT YOU WILL NOT SIT ON THIS MONEY.

May 4, 2006MICCA More Definitions Adware: Software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Spyware: designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user.

May 4, 2006MICCA What to do Signs of infection –An affected computer can rapidly become infected with large numbers of spyware components. –Pop-up advertisements –Unwanted behavior and degradation of system performance. –Significant unwanted CPU activity, disk usage, and network traffic Slows down other programs Stability issues— application or system Ways to get rid of or protect –Anti-spyware programs OptOut Ad-Aware SE Spybot - Search & Destroy

May 4, 2006MICCA Definitions Spamming –Sending of unsolicited bulk unsolicited and received by multiple recipients Solutions –Source-based blocking solutions prevent receipt of spam –Content filtering solutions identify spam after it’s been received –Disposable identities Spoofing –one person or program successfully pretends to be another by falsifying data and thereby gains an illegitimate advantage –“Webpage spoofing," : a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. They fool users into thinking they are connected to a trusted site, to gather user names and passwords.

May 4, 2006MICCA Identity theft Phishing –Phishing is a popular and growing method of identity theft, typically performed either through or through the creation of a Web site that appears to represent a legitimate company. Victims are asked to provide personal information such as passwords and credit card numbers in a reply or at the bogus Web site. “Spear phishing” the practice of targeting an attack to a specific group is gaining in sophistication and frequency. Pharming –A scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

May 4, 2006MICCA Identity Theft The Federal Trade Commission reports that identity theft now affects more than 10 million people every year representing an annual cost to the economy of $50 billion