Download presentation
Presentation is loading. Please wait.
Published byNoel Matthews Modified over 9 years ago
1
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
2
Why Not Use Networks? The computer is vulnerable to hackers If the network breaks, many tasks become very difficult Your computer can more easily be attacked by a virus
3
Network security Why would someone want to attack your computer?
4
Why? To access your data To use your computer to attack other computers
5
Accessing your data What details could be stolen from you? For what purpose could they be used?
6
Spyware Collects personal data Collects internet usage history Often used for unwanted advertising
7
Unwanted advertising!
8
Fraud Using your personal data to steal money! Credit card details targetted.
9
Botnet
10
Storm Botnet Estimated: between 200,000 and 1,000,000 computers infected Estimated 8% of all malware on Windows Used for spam email Used to attack international banks
11
Kraken Botnet About 400,000 computers infected 50 Fourtune 500 companies infected Sends about 9,000,000,000 spam email messages/day
12
Srizbi Botnet Roughly 400,000 infected computers Estimated 60,000,000,000 spam emails sent/day Nov 2008 – controlling network taken offline –Global spam email decreased 75%
13
How is a computer attacked? What do you know?
14
How is a computer attacked? Port scanning Phishing Trojan
15
Port Scanning This is an active attack A hacker runs a program to find vulnerable spots in the network The hacker can then run another program to access your computer
16
Port Scanning
17
Port scanning protection Firewall Updates
18
Firewall A program that checks incoming data If it is not from a trusted source, the data is blocked
19
Updates The hacker must find a vulnerable program When a vulnerability is found, the company will patch the software The patch fixes the vulnerability The hacker can’t attack in that way
20
Phishing An attack through email or IM A fake link that takes you to a dangerous website The website can then run a dangerous program, or collect your information
21
Phishing Email
22
Phishing – How to identify
23
Phishing – how to prevent it Read emails and IM’s carefully Be suspicious of links Run ONE anti-virus program
24
Trojan A program that says it will do something, but does something else.
25
Sources of trojans Email attachments A downloaded program (.exe files, like cracks or keygens) Dangerous programs on the internet
26
Trojans – how to prevent! Don’t run a program you don’t trust Scan suspicious files with an anti-virus tool Run Windows as a user, not as administrator
27
If you have a virus Run ONE anti-virus program Run anti-spyware and/or anti-adware scans Update all programs!
28
Homework exercise Remember, there will be a quiz next week very similar to this exercise. If you have questions, ask!
29
Homework exercise Imagine you are the class teacher for your class. You must create a database of your students. Create a table in design view containing the fields you think are important. Remember to choose a primary key. Add data to the database. You can invent the data, it does not have to be true. Fill in 3 records.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.