Presentation is loading. Please wait.

Presentation is loading. Please wait.

Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli.

Similar presentations


Presentation on theme: "Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli."— Presentation transcript:

1 Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli

2 Agenda Introduction Different kinds of malware Internet scams Youth, a poorly protected group Invasions of privacy Different internet threats Protection against all dangers

3 Introduction The internet is a global village with around 2 billion users Vast range of information Traditional communication media are redefined New forms of human interaction Changes for business and companies Many people, many crimes Nearly impossible to regulate it

4 Malware Malware, short for malicious software, is a software designed to harm or secretly access a computer system without the owner's informed consent. Different types of malware: Virus Worm Trojan Spyware Adware Backdoor

5 Computer Virus Definition: A computer virus is a program that can copy itself, and infect files, programs and computers. How it inflicts a damage: It is placed in commonly used programs, and will run when the infected program boots. Once a virus is active, it saves itself to your hard drive or copies itself to applications or system files you use. Damages the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.

6 Computer Worm Definition: A computer worm is a self-replicating malware program, that uses a computer network to send copies of itself to other computers of the network without any user intervention. How it inflicts a damage: It targets network vulnerability and spread through s, instant messaging, file sharing networks or the internet. The security threat of worms is equivalent to that of viruses.

7 Trojan horse Definition: A Trojan horse (Trojan), is a malware that appears to perform a desirable function for the user but instead facilitates unauthorized access, steals information or harms the system. How it inflicts a damage: Trojan horses disguise themselves as valuable and useful software available for download on the internet. Once the client Trojan executes on your computer, the attacker has a high level of control over your computer.

8 Spyware Definition: A computer spyware is a type of malware that can be installed on computers to collect information about users without their knowledge. How it inflicts a damage: Typically, spyware is secretly installed on the user's personal computer. Spyware programs can collect various types of personal information. They can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity or even change computer settings.

9 Adware Definition: Adware, or advertising-supported software, is any software which automatically plays, displays, or downloads advertisements to a computer. How it inflicts a damage: These advertisements are usually in the form of a pop-up. Adware, by itself, is harmless. Can occur with integrated spyware. Interruptions or annoyances, or distractions from the task at hand.

10 Backdoor Definition: A backdoor in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. How it inflicts a damage: It enables an alternative access to an application or the whole computer system. It gives access to your e-banking account or private mail.

11 Scams on the net On the web, there are more and more websites trying to rip you off or steal your money. Constantly, new swindles appear and the only way to protect internet users are the warning campaigns against this phenomenon. Example of swindles circulating right now on the web: credit card fraud fake website

12 Youth: a public poorly protected Young people are the most exposed and most targeted by predators of all kinds on the web. In 2003 more than 87% of 12/17 year olds have been connected to Internet and the phenomenon is growing with the development of mobile Internet. The web: A ludic but risky space in which they enter with a simple click! The dangers they are facing.

13 Invasion of Privacy This can be done in different ways When they: fill out forms to participate in contests for commercial websites. provide informations about themselves to strangers in chat or instant messaging. give personal information, when registering to various Internet services or software (instant messaging, chat, file sharing, etc.). complete a personal profile, when registering for accounts and free instant messaging.

14 Pornography The easy access provides by internet to the pornography is among the main anxieties of parents of young Internet users. It is possible to stumble across a pornographic website, by: using a search engine. making a mistake in typing the address of a website. clicking on a link in an , instant messaging or chat. using file sharing software that carry a lot of pornographic images and videos easily accessible.

15 Internet predators Chats, s and instant messaging are environments where young people may encounter predators. Anonymity specific to Internet means trust and intimate revelations. Predators are using it to quickly establish a relationship of trust with young people who are still lacking of experience and Judgment.

16 Violent and hateful content On Internet you can find a world of violence that target the youth once more. With a simple click, young people can download: Pictures of torture and sadism. Music with very violent words (sometimes censored in the discs sold in stores). Young people also like the "bloody" sites, that show real pictures of accidents, torture or mutilation. Moreover, hate groups like those campaigning for the supremacy of the white race, are increasingly using the Internet to recruit young people. They use , and private chats to address the most vulnerable adolescents.

17 Disinformation The Web is full of dubious and worthless information. Insofar where anyone can post their personal views or theories. The disinformation is commonplace in many aspects: Web pages, usually personal, where anyone can publish whatever they want by pretending it's true, and present simple opinions as facts. Sites Parody or spoof, which induce deliberately mislead the visitor, whether for fun or for political reasons. Hoaxes circulated by mail, which broadcast false virus warnings, bogus methods to supposedly make a fortune, urban legends and unsubstantiated health alerts. And a phenomenon increasingly popular for spreading false rumors through the social network (such as the death of a celebrity).

18 Another danger conveyed by internet There are several profiles of Internet users, youth and even adults, who feel very addicted to the Internet and this according to their main activity on the web: games (poker, contests, etc..) network game (Wow, Counter-Strike, etc..) chat forum instant messaging blog type Skyblog, social network type of MySpace, Facebook the type of video sharing YouTube and Dailymotion

19 The risk of using Internet for your health: A lack of sleep, tiring Headaches Irritability A tiring eyes A loss or weight gain depend of individuals Up to a loss of sense of reality (concerning the social aspect or financial) Strongly affect social relationships

20 Protection against: Virus: Using a good Antivirus updated Execute only familiar programs Don't open suspicious Worms: Using a good Antivirus updated Using a good Firewall Installing Update and Patch for your OS and your programs

21 Protection against: Trojan: Using a good Antivirus updated Using a good Firewall Don't open suspicious Spyware Installing an Anti-spyware software

22 Protection against: Adware Using a good Antivirus updated Block Spy Software in your browser Backdoor Download software/applications on the website of the programmer or distibutor Check on a list like «BugTraq» to know if the software has backdoors

23 How to protect against scams? For a transfer check if the website is secured (HTTPS) Open a Paypal account if it's usual for you to buy on the Internet Don't answer mail from unknown person Don't click on the links of suspicious mail Activate the filter anti-spam and anti-phishing of your browser

24 How to protect young public In general: Teach to your kids how to use the Internet Follow them in the apprenticeship of the Internet Tell them the dangers of the Internet

25 How to protect young public Against Pornography, hateful content and Internet predators: Installing parental controls Check what are they doing Never let them alone on the Internet

26 Protection against disinformation: Ask Verify Keep position

27 How to protect against: Gambling: Self control Consult specialists if you're feeling addicted Video Gams: Limit the hours of video game per day Have a social life besides the video games

28 Thank you for your attention! Any questions?


Download ppt "Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli."

Similar presentations


Ads by Google