Download presentation
Presentation is loading. Please wait.
Published byGary Barber Modified over 8 years ago
1
By: Matthew Newsome
2
The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s. North America, Australia, and Europe are the leading areas in the world with the most internet usage.
3
Google Chrome- A web browser used by Google. Internet Explore- A internet browser developed by Microsoft Opera- Began in 1994 and was developed by a Norwegian Telecommunications Company. Mozilla Firefox- Second largest internet browser. Netscape- founded by the Mosaic Communications Corporation and second company to emphasize on the term “world wide web” Safari- A graphical web browser developed by apple
4
Trojan Horse Virus Worms (Virus) Email Virus Boot Virus Stealth Virus Polymorphic Virus Macro Virus The Mobile Virus
5
Disguise themselves as useful software from the internet, but most people are fooled and download the virus. The name Trojan comes from the mythical “Trojan Horse” from the city of Troy. Two Parts The Client and Server Client- disguised and has significant amount of software and this is the type that tricks people. Server- has a high level of control over your computer that can lead to destruction on your computer.
6
A worm is self-replicating and can send copies of itself to other computers that are on the same network. The Morris worm and Mydoom worms can cause major damage to your computer because of the increased internet traffic and other effects. Payload- very important. It is a code that does more than what a worm does. It can delete files on a host system and send documents that you don’t want to send via email. “1 in 4 worms spread through infected USB devices.” articles.winferno.com/antivirus/computer-worms/
7
A computer code sent by email with an attachment. It causes very harmful effects Destroying files on your hard disk The attachment can be sent to everyone in your email contact list, which means that the virus is now being spread. Prevention- Don’t open the file, install anti-virus software to detect and scan the virus.
8
Infects the Microsoft Windows Operating Systems It does not cause files to be deleted nor loss of information. Spreads through unprotected disks easily Deletes the original partition table and creates another partition table.
9
A computer virus that uses various amounts of mechanisms to avoid detection of antivirus software. The virus can monitor system activity as well as maintaining a copy of the original unaffected data.
10
A polymorphic Virus is used to avoid the pattern recognition from antivirus software.
11
A virus written in macro language A series of commands and actions that automate tasks. Can be spread through email attachments, networks, modems, and of course the internet! Very difficult to detect!
12
A specific virus that targets cell/mobile phones. The first recorded mobile virus was in June of 2004. Types of Mobile Viruses Cabir: Infects Symbian Operating System cell phones Duts: Virus for a Pocket PC Skulls: Related to the Trojan Horse Commwarrior: Can spread through Bluetooth and affects Symbian Operating Systems as well.
13
Having privacy while you surf the world wide web is very important and crucial !!!! www.guardian.co.uk/commentisfree/2011/may/01/observer-editorial- internet-privacy
14
There are many reasons why Facebook is dangerous. 1. When you apply for a job, they look at your profile, no matter how much protection you have on your account. 2. Employers can view images of yourself and you on your friends profiles as well, which means that there really is no means of privacy on your Facebook profile. www.insidefacebook.com/2010/05/11/analysis-some-facebook-privacy- issues-are-real-some-are-not/
16
Someone can easily develop an account and impersonate someone else. Facebook encourages cyber stalking because of its lack of privacy settings and how individuals display their personal information on their profiles.
17
Yes! Because there are thousands of people spying on us throughout any point and time of day. Most cyber based crimes are not reported because there are so many.
18
It is impossible to name every single internet criminal because it happens all around the world. Criminals investigate to steal from you because internet crime has huge advantages with little risks.
19
Protection Windows updates Software Updates Anti-Virus Software Anti-Spyware Software Hacker Controlled Websites Firewall Spam Email Data Backup Password Policies All of these things can help protect you and your computer from hackers to gain internet privacy!
20
Lava Soft Ad-aware SE pro 6 Spy Sweeper Spy Doctor Norton Internet Security AVG Anti-Spyware Counter Spy McAfee Trend Micro Anti-Spyware The Anti-Spy CA Anti-Spyware Cyber Defender Anti-Spyware www.selfgrowth.com/articles/12_Types_Of_Anti-Spyware_Programs.html
21
http://www.how-to-hide-ip.info/2009/03/12/10-quotes-about-privacy/
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.