Introduction to Desktop Security Protecting your computer and your data.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
The Internet = A World of Opportunities
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Over 3,000 computers are affected monthly by Malware and Phishing.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Internet Security and Your Computer Welcome to Boot Camp.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Computer Skills and Applications Computer Security.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
How to Stay Safe Online Rollie Edwards.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Introduction to Desktop Security Protecting your computer and your data

Malware – The Threats VirusesViruses WormsWorms Spyware/AdwareSpyware/Adware PhishingPhishing

Viruses Usually come in Usually come in Have to be runHave to be run Trick you into running the virusTrick you into running the virus

Worms –self-replicating computer program Looking for youLooking for you Exploiting WeaknessesExploiting Weaknesses Install Back Door or other malwareInstall Back Door or other malware

Spyware Comes from other softwareComes from other software Tracks usageTracks usage

Phishing Social-engineering schemes use 'spoofed' s to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.Social-engineering schemes use 'spoofed' s to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. “vishing” variation“vishing” variation

Phishing Deceptive Subject LineDeceptive Subject Line Apparent genuine contentApparent genuine content Forged Sender’s AddressForged Sender’s Address Disguised LinksDisguised Links Form Form

Possible Problems Trojan HorsesTrojan Horses Zombie your ComputerZombie your Computer Destroy DataDestroy Data Steal DataSteal Data Key LoggersKey Loggers

Software Protections System UpdatesSystem Updates Anti-Virus softwareAnti-Virus software Anti-Spyware SoftwareAnti-Spyware Software FirewallFirewall

Anti-Virus Keep up-to-dateKeep up-to-date Scan dailyScan daily Check Files in useCheck Files in use AVG from grisoft.comAVG from grisoft.com

Anti-Spyware Update regularlyUpdate regularly Scan regularlyScan regularly AdAware from Download.comAdAware from Download.com

Firewall Guards information flowing to and from your computerGuards information flowing to and from your computer ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com

Safe Computing Practices Update the Operating SystemUpdate the Operating System Keep protections updatedKeep protections updated Scan RegularlyScan Regularly

Safe Computing Practices Regularly Back-up needed filesRegularly Back-up needed files Don’t download files using P2PDon’t download files using P2P Only get upgrades from trusted sourcesOnly get upgrades from trusted sources Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome

Safe Computing Practices - Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source Don’t unsubscribe to spamDon’t unsubscribe to spam Don’t click on links in sDon’t click on links in s

Safe Computing Practices - Data Don’t give out information especially your SSNDon’t give out information especially your SSN Banks and credit card companies never use to confirm dataBanks and credit card companies never use to confirm data Check for secure sites when shopping (https)Check for secure sites when shopping (https) Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill

Learn More CIS 115 Information SecurityCIS 115 Information Security