Presentation is loading. Please wait.

Presentation is loading. Please wait.

BACK DOORS BY TONY CANO & BEN SCHUETTER BACK DOORS HOME History Harm/Prevention Benefits/illegal use Self Assessment Work Cited.

Similar presentations


Presentation on theme: "BACK DOORS BY TONY CANO & BEN SCHUETTER BACK DOORS HOME History Harm/Prevention Benefits/illegal use Self Assessment Work Cited."— Presentation transcript:

1

2 BACK DOORS BY TONY CANO & BEN SCHUETTER

3 BACK DOORS HOME History Harm/Prevention Benefits/illegal use Self Assessment Work Cited

4 HISTORY The Threat of Back Doors arose sometime in the late 1960s. Two men Peterson and Turn noted in a paper they published in 1967 how there was a growing numbered Back Door attacks through trap door entry points in computing systems. Back Doors arose when multiuser and networked operating systems started to be highly used. The first scenarios of Back Doors first appeared when Back Door attacks were made to bypass security systems to permit direct access to direct data.

5 FACTS Backdoors are usually attached to some other form of malware such as Trojan horses or worms to get into your computer. Some backdoors are hard coded or user combinations such as the movie War Games from 1983.

6 HARMFUL EFFECTS Backdoors are harmful because they can allow hackers access into your computer. This is harmful to the user because once the hacker is in their computer they have access to personal or financial data or information. Once a hacker has established a backdoor they have access to your computer unless you get it removed by a security system or a malware and virus protection program. Also once a backdoor is installed your computer is also vulnerable to other malware and viruses from the hacker.

7 PREVENTION To prevent backdoors and other forms of malware you can install security or protection programs for your computer that block or remove malware from your computer. Some examples are: McAfee, Malware bytes, and Barracuda networks.

8 ILLEGAL USE There is a line between legal and illegal use of back doors. Illegal use of back doors is when you hack some ones computer in order to place a back door to have easy access into their computer.

9 BENEFITS Some benefits to back doors are to companies because they can use back doors to get into employees computers who may be suspected of bad usage of their computers such as selling information to other companies or just off task and not working.

10 SELF ASSESSMENT 1.Why would some one use a back door? A.To install easy access to some ones computerTo install easy access to some ones computer B.To give out free informationTo give out free information C.To prevent malware from getting into your computerTo prevent malware from getting into your computer 2. Malware can be used legally? A.TrueTrue B.FalseFalse

11 SELF ASSESSMENT 3. What benefits do back doors have for companies? A.To allow employees access to the internet.To allow employees access to the internet. B.So employees can get on Face BookSo employees can get on Face Book C.To see what the employees are doing on their computersTo see what the employees are doing on their computers 4. How are back doors harmful? A.Because they allow viruses into your computerBecause they allow viruses into your computer B.Because it allows hackers send junk-mail to your computerBecause it allows hackers send junk-mail to your computer C.Because it allows hackers easy access into your computerBecause it allows hackers easy access into your computer

12 SELF ASSESSMENT 5. What 1983 movie featured a hard coded user combination back door? A.Star Wars Episode VI: Return of the JediStar Wars Episode VI: Return of the Jedi B.War GamesWar Games C.Sudden ImpactSudden Impact

13 CORRECT!

14 SORRY, INCORRECT:(

15 CORRECT!

16 SORRY, INCORRECT:(

17 CORRECT

18 SORRY, INCORRECT:(

19 WORK CITED cFUcCQAodBU3x5A cFUcCQAodBU3x5A

20


Download ppt "BACK DOORS BY TONY CANO & BEN SCHUETTER BACK DOORS HOME History Harm/Prevention Benefits/illegal use Self Assessment Work Cited."

Similar presentations


Ads by Google