We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byStephany Wilson
Modified over 3 years ago
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1
Hackers Anyone who unlawfully accesses a computer system Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffing Commit identity theft © 2009 Prentice-Hall, Inc. 2
How Hackers Gain Access Direct access: –Hacking software Indirect access: –Internet connection –Logical ports © 2009 Prentice-Hall, Inc. 3
Computer Safeguards: Firewalls Software programs or hardware designed to close logical ports to invaders –A firewall is built into Windows Vista –More robust firewalls are available from other vendors –Firewalls are critical if you have an always-on broadband connection © 2009 Prentice-Hall, Inc. 4
Protecting a Wireless Network Wireless network range doesn’t stop at the property line Default device and network ID settings allow intruders to enter the network Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover © 2009 Prentice-Hall, Inc. 5
Computer Threats: Viruses A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program © 2009 Prentice-Hall, Inc. 6
How Does a Computer Catch a Virus? Viruses copy themselves Infect a file on your computer Spread by sharing disks or flash drives E-mail attachments are the most likely source of a virus © 2009 Prentice-Hall, Inc. 7
What Viruses Do Replicate themselves: –Slow down networks Secondary objectives: –Display annoying messages –Delete files on the hard drive –Change computer settings © 2009 Prentice-Hall, Inc. 8
Types of Viruses Boot-sector viruses –Replicate themselves in the boot sector of the hard drive Logic bombs –Activate when certain conditions are met Time bombs –Viruses that are triggered by the passage of time or on a certain date Worms –Travel between systems through networks © 2009 Prentice-Hall, Inc. 9
Types of Viruses Script viruses: –Hidden on Web pages as mini programs Macro viruses: –Attached to documents –Series of commands E-mail virus –Use e-mail address book to distribute the virus Encryption viruses –Compresses files using a complex encryption key –User must pay to get the files unlocked © 2009 Prentice-Hall, Inc. 10
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Application software consists of programs designed to make users more productive and/or assist with personal tasks. Growth of internet simplified.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
© 2009 Prentice-Hall, Inc. 1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Definitions Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer. Worm.
© 2018 SlidePlayer.com Inc. All rights reserved.