Download presentation
Presentation is loading. Please wait.
1
Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu
2
Roadmap Security Risks Preventions References
3
Security Risks Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing
4
Security Risks - Computer Virus A small computer program that infects your computer without permission or knowledge of the user Infects others via a host media Floppy disk Email … http://www.healthinitiative.org/IMAGES/virus_big.jpg
5
Security Risks - Worm A self-replicating program, spreads across the Internet May contain viruses 1 st worm was created by Robert T. Morris, a graduate student at Cornell U. in 1988 Computer Emergency Response Team (CERT) was created as a result http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG
6
Security Risks - Trojan Horse A program that disguises itself to be something useful or harmless Eg. screensaver In fact, a backdoor program which allows unauthorized access remotely http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg
7
Security Risks - Adware An advertising-supported software
8
Security Risks - Spyware Adware + collecting user’s information without the user’s consent
9
Security Risks - Browser Hijacker A program that changes the settings on the web browser Change the homepage to other website
10
Security Risks - Web Bug Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users AKA web beacon, tracking bug, … To avoid that: Turn off image loading on email clients Use text-based email such as pine http://www.prospexis.net/images/beatle2.gif
11
Security Risks - Hoaxes and Chain Letters Hoaxes are fake warnings, instructing you to delete files, playing on your sympathy, etc Chain letters implore you to pass the message to as many people as possible For examples “This is not a hoax.” “Forward this email to 10 people you know for good luck …” “VIRUS! DELETE NTFS.SYS”
12
Security Risks - Phishing
14
Preventions Use anti-virus/firewall software For examples AVG (http://free.grisoft.com/)http://free.grisoft.com/ Nod32 (http://www.eset.com/)http://www.eset.com/ Norton Antivirus (http://www.symantec.com/)http://www.symantec.com/ Schedule auto-update
15
Preventions (cont) Backup Use 2 HDs Burn CDs/DVDs and give them to your mom Use online backup services http://www.carbonite.com/ Be educated Don’t “fool” around
16
References Internet Effectively Ch 1 Ch 4 Wikipedia http://www.wikipedia.com/ http://www.wikipedia.com/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.