Presentation is loading. Please wait.

Presentation is loading. Please wait.

DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.

Similar presentations


Presentation on theme: "DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise."— Presentation transcript:

1 DEVICE MANAGEMENT AND SECURITY NTM 1700/1702

2 LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise. 2. Students will protect local devices from security threats including viruses, malware, and adware using current best practices and technologies. NTM 1700 2

3 CYBERCRIME Hacker/hacking Piggybacking Identify theft Rogue Wi-Fi hotspots Acceptable use policies NTM 1700 3

4 COMPUTER VIRUS Small software program that spreads from one device to another NTM 1700 4

5 WHAT DOES IT DO? Interferes with computer operation May corrupt or delete data May delete entire hard drive NTM 1700 5

6 HOW IS IT SPREAD? Via email attachments Funny images Greeting cards Audio or video files Via instant messaging messages Internet downloads Hid in pirated software NTM 1700 6

7 IS MY COMPUTER INFECTED? Runs slower than usual Stops responding or locks up frequently Crashes and restarts every few minutes Applications do not work properly (distorted menus/dialog boxes) Drives are not accessible Items do not print correctly See unusual error messages NTM 1700 7 http://windows.microsoft.com/en- us/windows/does-computer-have- virus#1TC=windows-7 http://windows.microsoft.com/en- us/windows/does-computer-have- virus#1TC=windows-7 http://www.kaspersky.com/interne t-security-center/threats/mac

8 HOW TO REMOVE? Need some type of virus removal tool Keep it updated Run full scans on the computer NTM 1700 8

9 HOW DOES AN ANTIVIRUS PROGRAM INOCULATE A PROGRAM FILE? NTM 1700 9 Records information about program Attempts virus file removal Uses information to detect if virus tampers with file Quarantines infected files Keeps file in separate area of hard disk

10 BUILT-IN ANTIVIRUS PROGRAMS NTM 1700 10 Windows Defender IOS Gatekeeper http://windows.microsoft.com/en-us/windows7/products/features/windows-defenderwindows.microsoft.com/en-us/windows7/products/features/windows-defender http://www.apple.com/osx/what-is/security.html http://windows.microsoft.com/en-us/windows/understanding-defender-realtime- protection#1TC=windows-7

11 ANTIVIRUS PROGRAMS NTM 1700 11 http://anti-virus- software- review.toptenreviews. com/ AVG ANTIVIRUS AVAST PRO ANTIVIRUS MCAFEE VIRUSSCAN NORTON ANTIVIRUS G DATA ANTIVIRUS BULLGUARD ANTIVIRUS

12 PREVENTION Never open an attachment containing an executable file from an e-mail. Executable extensions include Exe Com vbs An executable file can cause damage Scan all downloaded programs or files NTM 1700 12

13 WORMS Programs that Reproduce Execute independently Travel across network connections Key difference from virus Virus dependent Host file Boot sector NTM 1700 13

14 NTM 1700 14

15 TROJAN HORSE Appear to be useful software/infects computer when application is run What do they do? Annoy Malicious Create a backdoor May erase a hard drive Do not self-replicate or infect other files NTM 1700 15

16 LOGIC BOMB A virus triggered by certain logical conditions such as opening a file NTM 1700 16

17 CLICKJACKING Runs malicious software when a button, graphic, or link is clicked NTM 1700 17

18 MACRO VIRUS Embedded virus in a Microsoft Office document – runs when macro enabled NTM 1700 18

19 WHAT IS MALWAREMALWARE Programs acting without user knowledge that deliberately alter the computer’s operations NTM 1700 19 http://www.microsoft.com/security/pc- security/malware-removal.aspx

20 SPYWARE NTM 1700 20 Don’t just install Anti-spyware Be sure to run it often

21 ADWARE http://www.spychecker.com/spyware.html http://download.cnet.com/topics/adware http://www.lavasoft.com/ NTM 1700 21

22 SCAREWARE NTM 1700 22

23 ROOTKIT Program that hide on computer Allows remote access Take full control Change settings Monitor activity Access files Execute programs NTM 1700 23

24 WEB BUGS Invisible images or html code hidden within a web page or email that can be used to transmit information back to the source of the bug. NTM 1700 24

25 NETWORKS Zombie/Botnet War driving Router Security NTM 1700 25

26 MOBILE DEVICES Jailbreaking Rooting NTM 1700 26

27 WHAT CAN YOU DO? Security features in the MS Windows security center/Mac Enable Internet firewall Antispyware software Antivirus software Automatic updates NTM 1700 27

28 KEYS TO REMEMBER Turn on the firewall Keep antivirus software up-to-date Keep operating system software up-do-date Keep up-to-date antispyware software Know what you are installing and what it will do Carefully read all disclosures before installing Scan all downloaded programs for malware NEVER run macros in a document unless you know what they do NTM 1700 28

29 DEVICE MANAGEMENT AND SECURITY NTM 1700/1702


Download ppt "DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise."

Similar presentations


Ads by Google