Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
WEB 2.0 READ/WRITE WEB Eidson. WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Viruses & Destructive Programs
Cyber Security Anchorage School District – 7 th grade Internet Safety.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
CONTENTS What is Virus ? Types of computer viruses.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
1 3 Computing System Fundamentals 3.7 Utility Software.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
The History of Computers Computers have been around for not that long at all but the first one was made in ll.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Chapter 40 Internet Security.
3.6 Fundamentals of cyber security
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
– Communication Technology in a Changing World
BCT 2.00 Analyze Technology Issues
ISNE101 Dr. Ken Cosh Week 13.
King Saud University- College OF Applied Studies
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Cyber Security By:Jerusa Miller July 7, 2008

What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet. The protection of data and systems in networks that are connected to the Internet.

Internet Issues VirusesWorms Trojan Horses Hackers What are they all? What do they do?

Viruses A small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted acces A small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted acces Viruses can replicate itself over and over again Rapidly use all your memory Slow down system and/or bring to a halt Transmit itself across networks and bypass security systems What is a Virus What do they do

Worms A special type of Virus that replicates itself over a computer network and usually performs malicious actions. A special type of Virus that replicates itself over a computer network and usually performs malicious actions. Use computer memory Use computer resources Bring system to a halt Possibly shut the entire system down in other terms crash your computer What is a WORM? What does a WORM do?

Trojan Horses A destructive program that masquerades as a benign application that does not replicate itself A destructive program that masquerades as a benign application that does not replicate itself A program that claims it rids your computer or viruses but in actuality introduces viruses onto your computer A program that claims it rids your computer or viruses but in actuality introduces viruses onto your computer Remote acces tojans Remote acces tojans Date Sending Trojans Date Sending Trojans Destrcutive Trojans Destrcutive Trojans Proxy Trojans Proxy Trojans FTP Trojans FTP Trojans Security Software disabler Trojans Security Software disabler Trojans Denial-of-Service Attck Trojans Denial-of-Service Attck Trojans Types of Trojans What is a Trojan

Computer Hackers An individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data. An individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data.

What Is a Password A password is a private series of characters that enables a user to access files, computer, and/or programs. A password is a private series of characters that enables a user to access files, computer, and/or programs.

Is your Password Strong? 6-12 characterts 6-12 characterts Uppercase letters Uppercase letters Lower Case letters Lower Case letters Numbers Numbers Special Characters Special Characters (*%$#) (*%$#) A strong password should consist of,

Methods to Prevent Malicious objects Purchase or download spyware Make sure you are protected by fireware Turn on pop-up blockers Be cautious of what information you submit and who you submit it to. Create strong passwords Be cautious of the sites and programs that your enter Pay attention of ALL warnings directed at you

HAPPY BROWSING!!!!!

Work Citations  2,t=cybersecurity&i=40643,00.asp 2,t=cybersecurity&i=40643,00.asp 2,t=cybersecurity&i=40643,00.asp  er%20girl%20gary.jpg er%20girl%20gary.jpg er%20girl%20gary.jpg    e.html e.html e.html  kers_cartoons.jpg kers_cartoons.jpg kers_cartoons.jpg   ml ml ml