Download presentation
Presentation is loading. Please wait.
Published byIsaac Fleming Modified over 8 years ago
1
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702
2
LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise. 2. Students will protect local devices from security threats including viruses, malware, and adware using current best practices and technologies. NTM 1700 2
3
CYBERCRIME Hacker/hacking Piggybacking Identify theft Rogue Wi-Fi hotspots Acceptable use policies NTM 1700 3
4
COMPUTER VIRUS Small software program that spreads from one device to another NTM 1700 4
5
WHAT DOES IT DO? Interferes with computer operation May corrupt or delete data May delete entire hard drive NTM 1700 5
6
HOW IS IT SPREAD? Via email attachments Funny images Greeting cards Audio or video files Via instant messaging messages Internet downloads Hid in pirated software NTM 1700 6
7
IS MY COMPUTER INFECTED? Runs slower than usual Stops responding or locks up frequently Crashes and restarts every few minutes Applications do not work properly (distorted menus/dialog boxes) Drives are not accessible Items do not print correctly See unusual error messages NTM 1700 7 http://windows.microsoft.com/en- us/windows/does-computer-have- virus#1TC=windows-7 http://windows.microsoft.com/en- us/windows/does-computer-have- virus#1TC=windows-7 http://www.kaspersky.com/interne t-security-center/threats/mac
8
HOW TO REMOVE? Need some type of virus removal tool Keep it updated Run full scans on the computer NTM 1700 8
9
HOW DOES AN ANTIVIRUS PROGRAM INOCULATE A PROGRAM FILE? NTM 1700 9 Records information about program Attempts virus file removal Uses information to detect if virus tampers with file Quarantines infected files Keeps file in separate area of hard disk
10
BUILT-IN ANTIVIRUS PROGRAMS NTM 1700 10 Windows Defender IOS Gatekeeper http://windows.microsoft.com/en-us/windows7/products/features/windows-defenderwindows.microsoft.com/en-us/windows7/products/features/windows-defender http://www.apple.com/osx/what-is/security.html http://windows.microsoft.com/en-us/windows/understanding-defender-realtime- protection#1TC=windows-7
11
ANTIVIRUS PROGRAMS NTM 1700 11 http://anti-virus- software- review.toptenreviews. com/ AVG ANTIVIRUS AVAST PRO ANTIVIRUS MCAFEE VIRUSSCAN NORTON ANTIVIRUS G DATA ANTIVIRUS BULLGUARD ANTIVIRUS
12
PREVENTION Never open an attachment containing an executable file from an e-mail. Executable extensions include Exe Com vbs An executable file can cause damage Scan all downloaded programs or files NTM 1700 12
13
WORMS Programs that Reproduce Execute independently Travel across network connections Key difference from virus Virus dependent Host file Boot sector NTM 1700 13
14
NTM 1700 14
15
TROJAN HORSE Appear to be useful software/infects computer when application is run What do they do? Annoy Malicious Create a backdoor May erase a hard drive Do not self-replicate or infect other files NTM 1700 15
16
LOGIC BOMB A virus triggered by certain logical conditions such as opening a file NTM 1700 16
17
CLICKJACKING Runs malicious software when a button, graphic, or link is clicked NTM 1700 17
18
MACRO VIRUS Embedded virus in a Microsoft Office document – runs when macro enabled NTM 1700 18
19
WHAT IS MALWAREMALWARE Programs acting without user knowledge that deliberately alter the computer’s operations NTM 1700 19 http://www.microsoft.com/security/pc- security/malware-removal.aspx
20
SPYWARE NTM 1700 20 Don’t just install Anti-spyware Be sure to run it often
21
ADWARE http://www.spychecker.com/spyware.html http://download.cnet.com/topics/adware http://www.lavasoft.com/ NTM 1700 21
22
SCAREWARE NTM 1700 22
23
ROOTKIT Program that hide on computer Allows remote access Take full control Change settings Monitor activity Access files Execute programs NTM 1700 23
24
WEB BUGS Invisible images or html code hidden within a web page or email that can be used to transmit information back to the source of the bug. NTM 1700 24
25
NETWORKS Zombie/Botnet War driving Router Security NTM 1700 25
26
MOBILE DEVICES Jailbreaking Rooting NTM 1700 26
27
WHAT CAN YOU DO? Security features in the MS Windows security center/Mac Enable Internet firewall Antispyware software Antivirus software Automatic updates NTM 1700 27
28
KEYS TO REMEMBER Turn on the firewall Keep antivirus software up-to-date Keep operating system software up-do-date Keep up-to-date antispyware software Know what you are installing and what it will do Carefully read all disclosures before installing Scan all downloaded programs for malware NEVER run macros in a document unless you know what they do NTM 1700 28
29
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.