Presentation is loading. Please wait.

Presentation is loading. Please wait.

Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.

Similar presentations


Presentation on theme: "Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg."— Presentation transcript:

1 Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg

2 Online Threats 1. Malware 2. Spyware 3. Spam 4. Phishing 5. Virus 6. Adware 7. Cookies 8. Pharming 9. Bluejacking 10. Bluesnarfing 11. Browser Hijacking 12. Keylogger 13. Trojan horse 14. Antivirus software 15. Firewall 16. Rootkits 17. Ransomware 18. Computer worm 19. Browser exploit

3 Online threats infographics http://blog.trendmicro.com/t rendlabs-security- intelligence/threat- morphosis/ http://blog.trendmicro.com/t rendlabs-security- intelligence/threat- morphosis/ http://blog.trendmicro.com/t rendlabs-security- intelligence/are-you-safe- online/ http://blog.trendmicro.com/t rendlabs-security- intelligence/are-you-safe- online/ http://itpixie.com/2012/06/o nline-threats-101- infographic/ http://itpixie.com/2012/06/o nline-threats-101- infographic/

4 Phishing Is sent as an email Is from someone who claims to be a legitimate enterprise The email directs the user to a web site asking them to update their personal information Attempts to gain the person’s personal information and can lead to identity theft

5 Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops

6 Spyware Appears as Trojan Horse, acts as a virus changes homepage without you knowing Tracks websites you visit Installs new spyware w. out approval Uses memory so system moves slower Quick scan computer removal Found this info at :http://www.pcpitstop.com/spycheck/whatis.asp

7 What Spam is? Flooding the internet Most commonly commercial advertising Cost VERY little to send Legal & illegal Illegal Spam = steal your money What it’s not? SPAM RESROUCES: www.spam.abuse.netwww.spam.abuse.net http://www.silverstripe.org/assets/Uploads/no-spam-5.jpg NOT THE HAM

8 + Malware A.K.A. “Malicious Software” “Cyber Crime” Viruses Keyloggers Trojan Horse Hackers Create from: http://www.wisegeek.com/what-is- malware.htm

9 Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops

10 Browser Hijacking A form of malware, spyware, or virus Replaces existing internet browser home page with its own Used to force hits to a particular website

11 Adware: What Is It and How Can You Avoid It? Adware: Advertising Supported Software A software program that produces advertisements Designed to sell products for their authors How To Avoid It? Antivirus Software Popup Blocker Picture Sources: Popups: http://en.wikipedia.org/wiki/Pop- up_adhttp://en.wikipedia.org/wiki/Pop- up_ad Computer Lady: http://suecasanovaroweton.blogspot.com/2011 /12/flummoxed-frustrated.html http://suecasanovaroweton.blogspot.com/2011 /12/flummoxed-frustrated.html

12 Bluejacking What is it? Unsolicited messages sent via Bluetooth The technological version of doorbell ditching & prank phone calls How? Takes advantage of a loophole in the technology’s messaging options Bluejacker will camp out in crowded areas (i.e. shopping malls, airports, subway system) http://www.xda-developers.com/wp-content/uploads/2012/09/bluetooth.png?f39ce1 http://electronics.howstuffworks.com/bluejacking.htm

13 PHARMING!!!!!  Hackers intending to change IP Address  Obtain access to credentials  Usernames and passwords  Dangerous for banks and major businesses  Special protection  Sources  Wikipedia, edublogs, campchestnutridge

14 Cookies Encrypted text files in browser directories. Created when user’s browser loads to particular site. Help users navigate their websites NOT viruses: not compiled of code pieces Not self executing. CAN act as a form of spyware Website: http://www.allaboutcookies.orghttp://www.allaboutcookies.org Image: http://images4.wikia.nocookie.net/__cb20101008191209/muppet/images/thumb/f/f4/CookieMonster-Sitting.jpg/316px-CookieMonster-Sitting.jpg

15 Cookies: Internet Small Look up table containing pairs Ex. (first name, Hannah)(last name, Rudolph) Form on newly loaded webpages Conveniently carry information on webpages They are destroyed when Window is closed Cookies are visible to all people Webpage: http://www.whatarecookies.com

16 Computer Virus Able to reproduce themselves Placed in commonly used programs When program is run, virus multiplies Interfere with computer operations Often spread through e-mail attachments Sources: http://www.howstuffworks.com/virus.htm, http://support.microsoft.com/kb/129972http://www.howstuffworks.com/virus.htm http://support.microsoft.com/kb/129972


Download ppt "Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg."

Similar presentations


Ads by Google