BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SPYWARE Presented by The State Security Office November 17, 2004.
1 of 4 Malicious software, also known as “malware,” is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 6 Digital Literacy Study S3 Obj 2-2
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
The Internet = A World of Opportunities
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Unit 2 - Hardware Computer Security.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Don’t let them catch your computer!!!!!
Understand Malware LESSON Security Fundamentals.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Computer safety Filip Hruby.
Botnets A collection of compromised machines
An Introduction to Phishing and Viruses
Big Picture Consider this How many online threats might you be faced with a day?
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Viruses and Virus Protection
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Ch9 E-commerce Security
Presentation transcript:

BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke

A  A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

 A backdoor might appear as an installed program called Back Orifice. It also may subvert the system through root kit. It allows hackers to sneak in and out of your computer at anytime.

B  A backdoor is a type of malware that comes through other files and can take control of your computer, or help other viruses and malware take over your computer. A backdoor can come in many ways. Such as shareware, downloads, and uploads.

 Another method of distributing Backdoors involves tricking you by displaying deceptive pop-up ads that may appear as regular Windows notifications with links which look like buttons reading yes and no.

 No matter which "button" that you click on, a download starts, installing Backdoors on your system. Backdoors installs on your computer through a Trojan and may infect your system without your knowledge or consent.

C  Backdoor is a Trojan code that uses stealthy techniques to penetrate computer systems and open back doors to forthcoming system attacks.

 When a backdoor successfully on board and it begins to perform obvious harmful activities that may damage your computer or steal personal info, your antivirus can detect its existence.

D  A backdoor can come in many ways. Such as shareware, downloads, and uploads. Another method of distributing Backdoors involves tricking you by displaying deceptive pop-up ads that may appear as regular Windows notifications with links which look like buttons reading Yes and No.

 No matter which "button" that you click on, a download starts, installing Backdoors on your system. Backdoors installs on your computer through a trojan and may infect your system without your knowledge or consent.

E  There are many ways to prevent backdoors. First (of course) get spyware preventers and keep them updated. Also you can use common sense, if you see a file that looks suspicious and you’ve never seen before, it is probably dangerous.

 Scan for backdoors frequently and don’t open files you didn’t download and don’t download files you don’t know about. Backdoors are sneaky and are used to help other viruses. It’s pretty much like the Trojan War when the Trojan horse was used to sneak army men into enemy camps and win the war.

F  Spyware is programming that is put into your computer to secretly gather information and relay it to advertisers or other interested parties.  Worms are a virus variant that can infect a computer without any user interaction.

 Trapdoors are like a trap that you go through as in like a virus and collect the person’s data that you then have access to.  Cracks are an opening way to get in to access any data available.

 Trojan horse virus looks like a legitimate software program. Unlike traditional viruses that require the hacker to find and exploit a vulnerability on the target.  Concealed stratagem is when you are tricked to thinking that there isn’t anything there but it is there.

??? Any questions?

References  ) )  k-door k-door    