Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Unit 6 Digital Literacy Study S3 Obj 2-2
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Bahasa Inggris 1 Disusun oleh: Pikir Wisnu Wijayanto, M.Hum Fihrin Zuhrufillah, M.Pd Yuningsih, S.S Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Viruses & Destructive Programs
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Safety and Security issues of using ICT Alys brooks.
CONTENTS What is Virus ? Types of computer viruses.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Understand Malware LESSON Security Fundamentals.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Prodi D3 Manajemen Informatika
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
MALWARE Autumn Mattis.
Big Picture Consider this How many online threats might you be faced with a day?
Malware, Phishing and Network Policies
Ch9 E-commerce Security
Presentation transcript:

Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom

Subject Code : KU 2052 Credit : 2 credits Semester : 3 rd Short Description : English 3 subject gives the understanding and skills to the students on how to perform an English presentation effectively. Standard Competency: the students are able to implement the techniques of English presentation skills English 3 – Subject

Basic competence able to open a presentation Intermediate competence able to open a presentation in accordance with the points contained in the slide lecture material Intermediate – Advanced competence able to open a presentation effectively by using examples expressions or sentences contained in the slide material lectures Advanced competency able to open a presentation effectively using? expression or phrase that developed appropriately

Basic Competency : The students are able to develop the ability to do good and effective presentation based on theory, tips and tricks presentation Topic : the ability to do good and effective presentation based on theory, tips and tricks presentation Sub topic : Internet Security – Computer Virus Meeting: 11 th

Look at the Videos and Discuss them with your Friends

What is a Computer Virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Viruses can also replicate themselves. All computer viruses are man-made

What do Computer Viruses do? Computer viruses are often spread by attachments in messages A computer virus might corrupt or delete data computer viruses are stopped before they can start

What is a Trojan Virus? It is a type of malware designed to provide unauthorized, remote access to a user’s computer they can lead to viruses being installed on a machineTrojan horse software operates the same way Trojans tend to make users believe they are making a decision with a positive effect,

What can Trojans do? Files that allow others to view others personal data.Trojans are also capable of erasing files from hard drives

Worms Worms are destructive programs that replicate itself many times. Worms also modify files, including registry files and files They also eat up your bandwidth

Spyware & Adware Spyware secretly places itself on your computer and views transactions that are made on websites. Adware often appears as an advertisement and inevitably is harmful to the user. Spyware and adware both cause a great risk dealing with credit card fraud and identification theft.

Where can you find any of these malicious programs? Rogue websites box from random users P2P connecti ons

Solutions to these Problems? Antivirus Programs Virus Scanners Firewalls

Virus scanners locate worms, Trojans, and other malicious programs and delete them tend to locate these files by looking for patterns for certain byte strings

Firewalls Work as a “wall” to your internet ports Filter in everything that is being downloaded

Antivirus Programs

Work Cited / References Brown, Marshall. “How Computer Viruses Work.” < Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, Tyson, Jeff. “How Firewalls Work.”. Vilbert, Robert. “How a Virus Scanner Works..

Work Cited / References “Spyware Information.”

Work Cited / References