Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
SECURITY CHECK Protecting Your System and Yourself Source:
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Privacy and Security Issues Privacy and Security Issues related to Information and Communication Technology.
 Definition:  Internet safety is when you are safe and mindful of all the dangers of the internet.  Internet safety is also not getting harassed or.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses, Worms & Trojan Horses
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 a crime committed on a computer network, esp. the Internet.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Security Issues, Ethics, & Emerging Technologies in Education
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
CSCS 100 Shamoon Bashir Joshua Siddqui
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer security By Shreya Houji. VirusesViruses.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
By Hyrum Wines  2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered.
INTERNET: The Good, The Bad and The Ugly
All about viruses, hacking and backups By Harriet Thomas.
What is Spam? d min.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Malicious Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Introduction to Computers
An Introduction to Phishing and Viruses
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Presentation transcript:

Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic

Introduction I choose this project to discover how to protect computers from viruses and other threats that may harm computers. Explain my objectives for computer security. The background information will include information about all threats that affects computers.

My Objectives Explain the background information on the threats that cause security problems on the Internet. Explain why and how computer and internet security is so important to users. Discover how to keep computers safe from hacker’s, viruses, and all other threats. What has been done so far to ensure computer and internet security.

Background Info on Threat’s Threats include the issues that causes computer security problems. Examples of threats include computer hacker’s, viruses, worms, Trojan horse, and many other threats that will harm a computer. As of day, many of these threats can and will occur, so all user’s must be cautious at all times.

What is a Computer Hacker ? A Hacker is a programmer who breaks into computer systems in order to steal or change information as a form of cyber-terrorism. Case: In 1999 a 19 year old Russian hacker named Maxim broke into an e-commerce (Amazon.com) web site and stole 300,000 credit card numbers, demanding $100,000 from the site owners, and threatened to post all the credit card numbers on the Internet if he did not get the money.

What is a Computer Virus? A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. Case: In 1974, the Rabbit virus infected computers, as a result, it reduced the system’s performance just before the computers crashed. As of today there has been over 51 world known computer viruses that has affected millions of computers. Viruses can be avoided, and reinstalling a computer’s operating system is a known approach of removing viruses.

References Tanenbaum, Andrew, S. (2007) Computer Networks: Fourth Edition.