E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Discovering Computers 2010
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
UNDERSTANDING YOUR COMPUTER
Internet Security and Your Computer Welcome to Boot Camp.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Return to the PC Security web page Lesson 6: Improving Security.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
NetTech Solutions Protecting the Computer Lesson 10.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Writing an message Finish off your slide on recommendations of how to write an .
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Computer Security Sample security policy Dr Alexei Vernitski.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Information Systems Design and Development Security Precautions Computing Science.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Chapter 40 Internet Security.
Internet Business Associate v2.0
Viruses.
Presentation transcript:

E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN

MANAGING COMPUTER - VIRUSES Boot-sector virus Macro- viruses Worms attachment viruses Hoax viruses Trojan viruses

 Do not switch off machines when the floppy disk is still in the drive. PCs can also can be configured so that do not boot off the floppy drive  Do not open attachment to s from people you do not know  Download software only from the official source, and always check for viruses before installing the software  Disable or turn off macros in World or Excel unless you use them regularly  Back-up important files daily if its function is not performed by a system administrator. Instruction to reduce the risk of virus infection and transmission

A PPROACHES TO DEVELOPING SECURE SYSTEM Virtual private network – private network created using the public network infrastructure of the internet Digital signatures – a method of identifying individuals or companies using public-key encryption Asymmetric encryption – Both parties use a related but different key to encode and decode messages Symmetric encryption- both parties to a transaction use the same key to encode and decode messages

F ULL RANGE OF TECHNIQUES THAT CAN BE USED IN COMBINATION TO COMBAT SPAM INCLUDE : Avoid harvesting of addresses- spammers harvest e- mails from addresses published on web pages Educate staff not to reply to spam- can do on receiving spam is to reply to it to complain Use filter, filtering - software used to identify spam according to its characteristics such keywords Use ‘peer to peer’ blocking services- take advantage of human being good at identifying spam and then notifying a central server Use blacklist services- a compilation of known sources of spam that are used to block e- mail Use whitelist services – a compilation of trusted sources of that is permitted to enter an inbox

DEVELOP POLICIES WHICH EXPLAIN BEST PRACTICE- GUIDELINES > ONLY SEND THE E - MAIL TO EMPLOYEES FOR WHICH IT IS ESSENTIAL TO INFORM. > B ANNING CERTAIN TYPES OF E - MAILS > AVOID FLAMING > A VOID ‘ TROLLS ’ > COMBINE ITEMS FROM SEPARATE E - MAILS DURING THE DAY > WRITE CLEAR SUBJECT LINES > STRUCTURE E - MAILS SO THAT THEY CAN BE SCANNED QUICKLY USING SUB - HEADS > MAKE FOLLOW - UP ACTIONS CLEAR > WHEN READING E - MAIL, USE FOLDERS TO CATEGORIZE E - MAILS ACCORDING TO CONTENT >P ERFORM E - MAIL READING AND CHECKING IN BATCHES > DELETE E - MAILS WHICH ARE NOT REQUIRED FOR FUTURE FEFERENCE