Presentation is loading. Please wait.

Presentation is loading. Please wait.

CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.

Similar presentations


Presentation on theme: "CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer."— Presentation transcript:

1 CIW Lesson 8 Part B

2 Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer systems Malware self-replicating program or algorithm that consumes system resources program that appears to be harmless but actually produces harmful results Worm Trojan Illicit Server

3 Malicious Software continued If you copy a file from a CD that has a virus, the most effective way to prevent the virus for spread is to use program that assumes control of system operations, and damages or destroys data The most effective way to spread viruses is to Virus Send email attachments Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because the user only needs to receive the virus for it to causedamage anti-virus Software to disinfect your hard drive and remove the virus from your system

4 Spyware & Virus Removal scans disks and programs for the purpose of eliminating software designed to harm computer systems is an application that is secretly placed on a user’s system to gather information and relay it outside parties A disadvantage of using a spyware-detection application is that legitimate applications can be Spyware incorrectly identified as spyware Anti-virus

5 Firewalls An advantage of connection LAN computers to the internet through a firewall is that users on the LAN can information from the internet, but outside users are access to the LAN is a security barrier that prevents unauthorized access to or from private networks Firewall Desktop firewalls offer protection for an computerindividual The most common business firewall technique is to use a firewall server in conjunction with a proxy server Firewalls are the first line of defense against security breaches because they provide confidentiality LAN data request denied

6 Updates & Patches A disadvantage of installing program patches and updates is that they may introduce incompatibility issues or new is a file or collection of software tools that resolves system liabilities and improves software performance Update is a major update with significant software improvements that is marketed as new Release is a file of programming code that is inserted into an existing executable program to fix a known problem, or bug Patch It also is designed to provide an immediate, temporary solution security issues

7 Security Related Ethical & Legal Issues The organization that was formed by the United Nations to protect intellectual proper worldwide is the collectively refers to industrial property and copyrighted works Intellectual Property is when you receive written permission from a copyright owner to use copyright-protected material for your own purposes Licensing Agreement When you do not receive permission from the image creator to copy an image from the Web it is Copyright Infringement is the term for a word, slogan, symbol, name, package design or devise that distinguishes a product from other products Trademark The organization that is responsible for codifying copyright law as it applies to digital information is the Information Infrastructure Task Force (IITF) World Intellectual Property Organization (WIPU)

8 Typosquatting & Locking your Computer You can use screen savers to your work while you are away from your desk, proving a measure of is the unethical practice of registering domain names very similar to those of high-volume sites Typosquatting Example: www.goggle.com is a graphic or moving image that appears on your screen when your computer is idle Screensaver hide security

9 Company Resources To comply with many web site requirements for added security, nearly all browsers support a minimum of -bit encryption It is important to install updates to email clients to minimize security breaches. You can install updates to support a higher level of encryption because some email clients default to -bit encryption levels The connectivity that makes the internet possible also makes systems vulnerable to When making efforts to prevent attackers from gaining access to network connections, using your desktop firewall to block may cause problems when troubleshooting your computer’s connectivity to the network. 128 40 unwanted activity Internet Control Messaging Protocol (ICMP)


Download ppt "CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer."

Similar presentations


Ads by Google