Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing your system, protecting your digital data and devices.

Similar presentations


Presentation on theme: "Securing your system, protecting your digital data and devices."— Presentation transcript:

1 Securing your system, protecting your digital data and devices.
Today I will be discussing how to secure , and protect your digital data and devices. By: TRUTH HAVARD

2 WHAT DO COMPUTER VIRUSES DO?
A computer virus is a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged. Creating and disseminating computer viruses is one of the most widespread cybercrimes. Some viruses can cause only minor annoyances, whereas others cause destruction or theft of data. Many viruses are designed to gather sensitive information such as credit card numbers. Computer viruses can mess up your day to day use of your device, or it can just mess up every once in a while, it depends on the device and the type of virus you have on the device. Havard

3 Name and Describe 6 different viruses
Boot sector: A virus that replicates itself onto a hard-drives boot record, this ensures that the virus will be loaded to the memory immediately, even before some virus protection programs can load. Logic Bombs: A virus that is triggered when certain logical conditions are met, such as opening a file or program a certain amount of times. Time bombs: A virus that is triggered by the passage of time, or is set to trigger on a certain date or time. Worms: Unlike viruses, worms can take advantage of file transport methods, such as or network connections and can spread on their own, they do not need to be “triggered” Boot sector: replicates itself onto the hard-drive boot record, the virus goes straight to the memory. Logic bombs: virus is triggered when certain condition are met. Time bombs: virus is triggered on a certain time or date. Worms: not technically a virus, due to them being able to spread on their own. Havard

4 How do Viruses work? Havard

5 More types of viruses Script: A series of commands or a mini program that is triggered without the hosts knowledge. Macro viruses: A virus that attaches itself to a document that uses macros, which are short commands that usually automate repetitive tasks. viruses: A type of macro virus that that uses your address book to distribute the virus. Anyone that opens the infected triggers the virus on their device. Encryption viruses: A type of virus that searches for common types of data such as Microsoft Word and compresses them to the point where the files are no longer useable. Script: A series of commands that is triggered without you knowing. Macro: the virus attaches to any file that uses macros. viruses: The virus is sent to everyone in your address book and everyone who opens it gets infected. Encryption: The virus searches for common files and compresses them to the point where they are unuseable. Havard

6 Viruses (cont.) Polymorphic virus: This virus changes its own code or periodically rewrites itself to avoid detection. Most polymorphic viruses infect a particular type of file. Multipartite virus: A virus that is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. Stealth virus: These viruses temporarily erase their code from the files where they reside and then hide in the active memory of the computer. This helps them avoid detection if only the hard drive is being searched for viruses. Fortunately, current antivirus software scans memory as well as the hard drive. Polymorphic: Changes its own code or rewrites itself to avoid being found. Multipartite: designed to infect multiple kinds of files to hide from detection Stealth: Temporarily erase their own code and hide in the active memory of the device. Havard

7 What are DDOS attacks. Give an Example.
A DDOS attack is when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he/she has taken over a zombie. A computer system can only handle a certain amount of requests for information at one time. When it is flooded with requests in DoS attack, it shuts down and refuses to answer any requests for info. The computer is so busy responding to bogus requests that authorized users can’t gain access. A DDoS attack launches DoS attacks from more than one zombie device, sometimes thousands at the same time. DDoS attacks: when real users are not able to use their device due to a system overload caused by a hacker sending multiple requests to the device. Havard

8 What is a firewall? Which is better? Software or hardware firewalls?
A firewall is a software system or hardware system that is designed to protect computers from hackers. Named after a housing construction feature that slows the spread of fires from house to house. Firewalls protect in 2 major ways: Block access to logical ports and keep your computer’s network address secure One type isn’t better than the other, you should consider installing both for maximum protection. Firewall: designed to protect devices from hackers. They block access to logical parts and keep your computer’s network safe. Havard

9 What is the major concern about cyberloafing or cyberslacking.
Cyberloafing means using your computer for non-work activities while you’re being paid to do your job . This could mean that you are playing games, using social media applications, or online shopping. Employers main concern is productivity losses, and paying their workers for not doing their jobs. Cyberloafing: doing activities on your device while you are being paid that are not appropriate for work. Employers are worried about productivity declining. Havard

10 Cyber-crime and identity theft
Cybercrime: Any criminal action perpetrated primarily through the use of a computer. The existence of cyber crime means that computer users must take precautions to protect themselves. The FBI has a website made to inform the public about types of cybercrime and methods of protecting yourself. Identity Theft: This occurs when a thief steals personal information such as your name, address, social security number, birth date, bank account number, and credit card information and runs up debts in your name. Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts. Cyber crime: Any criminal act that uses a computer or any device. Identity theft: stealing someone’s personal information and using it as your own. Havard

11 Identity thieves can…. Counterfeit your existing credit and debit cards without your knowledge. Request change of address on your bank account and card statements, which makes detecting fraudulent charges take longer. Open new credit cards and bank accounts in your name and then write bad checks and not pay off the credit card balances. Obtain medical services under your name. Buy a home with mortgage in your name, then resell the house, leaving you with debt. Identity thefts can steal your bank information and mess up your credit by doing a lot of different acts. Havard


Download ppt "Securing your system, protecting your digital data and devices."

Similar presentations


Ads by Google