Presentation is loading. Please wait.

Presentation is loading. Please wait.

Malware, Phishing and Network Policies

Similar presentations


Presentation on theme: "Malware, Phishing and Network Policies"— Presentation transcript:

1 Malware, Phishing and Network Policies
Keywords Malware, Viruses, Worms, Trojan Horses, Phishing, Social Engineering, Data Interception, Network Policies Systems Security Malware, Phishing and Network Policies

2 Computing Threats Objectives
BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Starter activity

3 Malware Define: Viruses Worms Trojan Horses
Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Otherwise known as ‘malicious software’. Software which can be malicious if damaging to a computer or network. Define: Viruses Worms Trojan Horses Starter activity

4 Definitions Objectives Viruses:
BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Viruses: Malicious software designed to cause harm to a network or computer system. Attaches itself to programs or files on a computer or server. Can affect all components of an operating system. Around 82,000 viruses are made each day. Worms: Replicates itself in order to spread to other computers. Often using a computer network. In order to achieve this, the worm exploits vulnerabilities across the computer network. Unlike a virus, it does not need to attach to a program. Trojan Horse: Malicious computer program. Designed to access a computer by misleading users of its intent. Example: appearing to have been sent from a bank asking to download security software which would improve security where in fact the software intention is to give unauthorised access to the system. Starter activity

5 Phishing Define: Social Engineering Computer Phishing
Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Define: Social Engineering Computer Phishing Telephone Phishing Data Interception/Thefts Starter activity

6 Definitions Social Engineering:
Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Social Engineering: Relies on human interaction (social skills). Commonly involves tricking users into breaking normal security procedures. Method does not revolve around technical cracking techniques such as worms or viruses. Computer Phishing: Form of social engineering. Designed to acquire sensitive information such as usernames, passwords, card details etc. Most common phishing attacks are sent through . Starter activity

7 Definitions Objectives Telephone Phishing:
BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Telephone Phishing: Telephone system mirroring – direct phone calls that pretend to be an official service. For example, a telephone phishing system would request similar prompts to a bank if the exploit was to gain banking information. User could be asked to enter bank number, expiry, CCV, PIN and system may reject or ask for re-entry to ensure original digits are correct. Data Interception and Theft: Data travels across networks in packets. Packets can be intercepted. If packets are encrypted, they cannot be read without a key. Unencrypted packets can be re-assembled using signatures. Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen. Starter activity

8 Network Policy Objectives BEGINNER: Explain the different types of malware. ADVANCED: Understand how phishing operates. EXPERT: Discuss how data can be intercepted. Outlines rules for network access. Most common is Acceptable Use Policy (AUP). You may have been asked to agree to an AUP when joining your school. What could a poor network policy lead to? Users could be unaware of the risks of: Using software Opening s turning off firewalls etc. Most networks restrict users to what they can/cannot do. Can you install software on your school PC? Do you have filters on your and internet browser? Starter activity


Download ppt "Malware, Phishing and Network Policies"

Similar presentations


Ads by Google