Www.kait.ca.  Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Security CIT 1100 Chapter4.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Threats To A Computer Network
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Security.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
IT security By Tilly Gerlack.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Topic 5: Basic Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
IT Security  .
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Introduction-Cyber Safety
Presentation transcript:

 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade performance of a network  Keeping yourself current with today’s computer security threats will give you a foothold into prevention techniques  Will keep your school/organization’s data safe and your personal information safe

 Two types of threats to computer security:  Physical – stealing, damaging, or destroying equipment such as workstations, servers, switches, routers, wiring, etc.  Ex. Theft of laptop from desk, cutting networking wires in server room/closet  Data – removal, corruption, denying access to, allow unauthorized access to, or stealing confidential or private data  Ex. Virus/Worm/Trojan Attacks, Spam, Cracking network security, Spyware

 Unauthorized users attempting to gain access to your computer or computer network  Can happen as an Unstructured or Structured Attack  An Individual Working From Within an Organization  Some unintentional threats such as an employee opening an attachment and spreading a virus at work

 A computer virus is software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter or destroy information.  A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.  A Trojan horse is technically a worm and is named for its method of getting past computer defenses by pretending to be something useful.  Some viruses can record keystrokes and report them back to the virus author. This type of virus is called a keylogger and can be dangerous if it captures confidential information.  Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan horses before they infect a computer.

 ActiveX ◦ Microsoft Technology: Controls interactivity on web pages  Java ◦ Allows applets to run within a browser ◦ Ex: a calculator or a counter  JavaScript ◦ Interacts with HTML source code to allow interactive web sites ◦ Ex: a rotating banner or a popup window Internet Explorer prompting for your permission to install an ActiveX applet or to Download a File

 Social Engineering refers to the ability of something or someone to influence the behaviour of an individual or a group of people.  Pretexting is a form of social engineering where an invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action. The social engineer usually has a tidbit of information about the victim before they call to help gain their trust.  Phishing is when an individual pretends to represent a legitimate outside organization by internet, , phone, in-person or by other means of communication.  Vishing (Phone Phishing) is relatively new where an unsuspecting user is sent a voice mail instructing them to return a call to their banking service at a bogus toll-free number left on the voic . They are prompted to enter in information such as bank card information

 Adware displays advertising, usually in a popup window.  Grayware or malware is a file or program other than a virus that is potentially harmful. Many grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide attackers with access to personal information.  Spyware, a type of grayware, is distributed without any user intervention of knowledge. Spyware monitors computer activity then sends the information back to the organization responsible for launching the spyware.  Tracking Cookies track a user’s browsing behaviour and can allow an individual to customize their website experience or preferences. Some cookies can be harmful if they are spyware “super” cookies or data miners. They may collect more personal information. Spyware programs can remove these.

 Spam is unsolicited that can be used to send harmful links or deceptive content.  Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites.  Pop-unders are windows that appear but hide behind your currently opened windows. When you close the windows you are using, you will see the pop-under which is usually a lingering advertisement. These may be dangerous as well because they can contain a tracking cookie that will follow your browsing habits

 Spoofing is when an individual or program mimics someone or something to deceive a target into revealing information or following misleading instructions.  For example, an instructing you that your PayPal account is going to be closed unless you “Click on this link” to restore your account access may direct you to a ‘look-a-like’ website.  Can you tell the difference between these two websites?  The top one is fake and uses the website address

 Anti-Virus ◦ There are various anti-virus software programs out there, but which ones are useful and which ones may cause more problems than they’re worth? You should utilize tech websites to determine which tools bench technicians find useful in combating the computer security threats of today.

 Anti-Spyware ◦ With spyware threats being as bad or worse than virus threats, we now need to protect our computers from this additional threat. Finding the appropriate software that fits your needs is crucial. Something that’s efficient and easy to use is hard to find in the spyware game. You also need to be careful that you are not downloading a Spyware removal software that is actually spyware itself. It fakes threats and removal of those threats to keep you under the illusion that you are ‘safe’ from those threats.  Like Anti-virus, read technical articles and find out which spyware removal software is free and efficient at removal of security threats. Spyware Search & DestroyMalwarebytes

 Pop-up and Pop-under Blockers ◦ Browsers now usually come equipped with their own pop-up blocker. You can configure those settings in the browser’s options. ◦ Be sure that you do not have multiple pop-up blockers running on your system as their overlap may pop-up legitimate pop-ups that are required to navigate some websites. ◦ Also, do not disable or minimize the settings of your pop-up blocker too much or you may end up bypassing the effectiveness of the program and subject yourself to an overload of pop-ups and pop-unders.

 Software Patches and Updates ◦ Part of the combating the threat is prevention. Prevention of the threat or prevention of future threats. In order to do this effectively is to patch any vulnerabilities in the operating system and the software on your computer. ◦ Each program may have its own updater that you need to click on once in awhile. For other programs you may need to visit the vendor websites to check for any available software updates. Microsoft Updater Software Update or Patch

Launch protection program Run a scan Click update button Manually treat or delete Schedule future automatic updates and scans Need to manuall y treat or delete? Review scan report Create a restore point Yes No

Check for updates Install update Download updates Restart computer Test all aspects to ensure the update has not caused issues Prompte d to restart? Create a restore point Yes No

 PC Mag’s Security Watch Articles  How Stuff Works: The Computer Security Channels  Snopes.com: Virus Hoaxes & Realities  PC World: Security For an excellent site for security guides and to see if one of your processes is a virus, you can search at:  Norton (Symantec) Threat Explorer