What they are and how to protect against them

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 19 INTERNET SECURITY
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Chapter 6 Protecting Your Files
INTERNET SAFETY FOR EVERYONE
Chapter 40 Internet Security.
Viruses & Destructive Programs
Managing Windows Security
Three steps to prevent Malware infection
Hacking Computer crime and cyber security.
Three Things About Malware
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Instructor Materials Chapter 7 Network Security
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
How to build a good reputation online
By Quentin Lively Notorious Viruses.
Cyber Security By: Pratik Gandhi.
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
STOP. THINK. CONNECT. Online Safety Quiz.
Risk of the Internet At Home
– Communication Technology in a Changing World
Internet Safety for Everyone
ISNE101 Dr. Ken Cosh Week 13.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Staying safe on the internet
Stay Safe While Using The Internet
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

What they are and how to protect against them Attacks and malware What they are and how to protect against them

Types of attacks Malware is “Malicious Software” Botnets are like Beehives Backdoors are other ways into computers or networks. Denial of Service brings down computers and networks Spoofing is when an attack pretends to be someone / something else in order to attack. Malware – they are special programs that do damage to computers and networks. Botnets – A group of malware infected computers on a network that are controlled to do work for the attack, e.g., send spam Denial of Service – a network or program is flooded with specific information or traffic which crashes the service and allows no further access. Spoofing – examples include using fake credentials

Types of malware Examples of Malware: Virus – Any type of malicious code on your computer is a virus. Sometimes they don’t do damage, like just sending mass emails which slow everything down and sometimes they overwrite or delete files on your hard drive. Emails are the fastest way for viruses to spread. Worms – Worms are a type of virus viruses. Unlike viruses, Worms are their own programs but hide to look like files or other programs, ILOVEYOU is a famous worm that displayed itself as a .txt file. Worms mostly search for types of files, like .txt, .doc (Mircosoft Word), .exe (Windows programs) and corrupt them. ILOVEYOU corrupted them and overwrote them to all be a copy of the worm. Trojan – The recent WannaCry was a Trojan Ransomware program. Ransomware infects your files like a worm and then encrypts them with a special key. To get the decryption key and your files back, you need to pay a ransom. Trojans are regular programs that make you think they are helpful, even disguising themselves as antivirus programs. They are very difficult to remove and make your computer almost unusable as they can continuously pop up as you try to use your computer. Some have methods of corrupting your hard drive if you try to uninstall them. Spyware – Keyloggers, they can turn on your web cam, record your screen, steal passwords etc. Mostly don’t do damage to your files but they watch everything you do and can cause ads that contain viruses to get on to your machine.

How to reduce risk Install an anti-virus program and keep it up to date. Be careful about which sites you visit and emails you click Keep your computer and programs up to date! Anti-virus doesn’t have to be expensive version. Some anti viruses have what is called a browser extension and will scan and block anything malicious on the site you visit. In Chrome just google “(name of anti virus) chrome extension” Updates are annoying and always seem to be at the wrong time but they drastically reduce the risk of you being hit if you are kept up to date.

There are many different Anti-Virus options out there. Recommendation to use Microsoft Security Essentials, bitdefender, TrendMicro, avast and eset.

Wireless networks and routers What they are and what to do to configure them correctly

Wireless Network Your Home accesses the internet through your router Your Devices connect to your router over a wireless Connection or using an Ethernet cable Where the router in your house came from

Is your home network safe? Before accessing the internet configure your router Why? How? 192.168.1.1 Administrator settings Wireless network key Ensure a strong password why>? : your router was sent to you configured by the factory that made them just like every other router they made, if they use one method to make up a key for every router then if it is compromised the n they all are. What is this address 192.168.1.1 >?: This is the home address for almost every router you use and this is how you will change your settings. Make sure to change the standard password and username Change your network name to something unique that will make it easier to identify or for fun : PrettyFlyForAWiFi Ensure your password is secret and that it is a long password that is very hard to guess.

How can I be even safer? Keyword filtering Off hours Website blocking Mac address filtering Keyword filtering >? : Some routers don’t have all the best features but keyword filtering for certain words such knife will block a site to do with that keyword These are a few features that the router provided to you by your internet service provider (ISP) may not have.

Adding a new router To use a different router along with the SKY (for example) router: - have a look at: https://www.youtube.com/watch?v=id7mLqemtfc Or, search for How to use your own wireless router together with Sky's - make sure that wireless function is disabled on SKY router