Hacking Computer crime and cyber security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Threats to I.T Internet security By Cameron Mundy.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Cyber security. Malicious Code Social Engineering Detect and prevent.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Internet Safety.
Windows Tutorial 5 Protecting Your Computer
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
To Know what Cyber crime is
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Big Picture Consider this How many online threats might you be faced with a day?
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
War between Good and Evil.
How to use the internet safely and How to protect my personal data?
Malware aka- malicious software By: Ken Fogel
COMPUTER VIRUSES Computer Technology.
Information Security 101 Richard Davis, Rob Laltrello.
computer virus infection & symptoms
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
How to Fix Windows 10 Update Error 0x ?.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Call AVG Antivirus Support | Fix Your PC
Computer Viruses.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Stay Safe While Using The Internet
Computer Security.
Internet Safety and The Digital Divide
Bethesda Cybersecurity Club
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
McAfee.com/activate. Mcafee Activate
Presentation transcript:

Hacking Computer crime and cyber security

Learning Objectives Learn about the Computer Misuse Act – which makes certain activities illegal Look at examples of computer misuse Understand what is meant by hacking Understand what is meant by malware Learn ways to protect yourself from malware and hacking

What does the law say? It’s illegal to look at or modify someone else’s files without permission (Computer Misuse Act)

Hacking Definition: Hacking is illegally accessing or modifying computer files without permission (Computer Misuse Act 1990)

Why do hackers do it? Think of some examples for each of the reasons below: Some do it for pure mischief, or for a challenge To steal money To steal or modify information For political reasons, to expose wrongdoing, or to get revenge on people with opposing views

Logic bombs A logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions Used by, for example, blackmailers or disgruntled employees seeking revenge

How do hackers do it? Exposing security holes in websites to access information Taking advantage of obvious / common usernames and passwords Tricking people into downloading malware onto their computer, which in turn gives the hacker access to view and modify your files

What is malware? Malware stands for “malicious software” It is a small program which enters a computer or network through a downloaded file or vulnerability in a network Malware might: gather personal or sensitive data from your computer modify or delete files on your computer

What is a computer virus? A virus is a type of malware A computer virus replicates and installs itself without your consent A virus can be spread to another computer through email or file sharing

Common types of malware Browser hijacks some browser functions, for example your default search page, or diverts you to particular websites. Also called Spyware File infector the virus infects a particular file. It may completely or partially overwrite the file Macro virus embedded in the template files (for example, of Word or Excel). The virus spreads if the file is opened on a different computer

Which of these are signs of malware? A new toolbar appears on your browser You receive a fraudulent email Your homepage has changed unexpectedly You are on a genuine website and your browser alerts you it has blocked a pop-up window Your computer suddenly runs a lot slower You see a lot of pop-up adverts even when you’re offline Your browser alerts you to update to a newer version Your computer hard disk is doing overtime but you’re not doing anything

Which of these are signs of malware? A new toolbar appears on your browser TRUE You receive a fraudulent email FALSE (however, if your email account appears to have sent an email without your permission, this is likely a virus) Your homepage has changed unexpectedly TRUE You are on a genuine website and your browser alerts you it has blocked a pop-up window FALSE (many genuine websites use popup windows) Your computer suddenly runs a lot slower TRUE You see a lot of pop-up adverts even when you’re offline TRUE Your browser alerts you to update to a newer version FALSE (this is normal – and you are encouraged to keep your software up to date – just check the alert is genuine!) Your computer hard disk is doing overtime but you’re not doing anything TRUE

How do you avoid malware? Avoid clicking on everything, like offers that seem too good to be true (on both websites & email) Don’t visit illegal sites, such as those that let you download copyright material Make sure your browser is configured to always ask before running files and downloading automatically Keep your browser software up-to-date Install up-to-date antivirus and antispyware software

Hackers steal passwords! In 2013 hackers stole the login details of 2 million social media accounts using malware which scraped the login details from the browser over 16,000 accounts used the password “123456”

Password protection The most commonly used password is “password1” Suggest some guidelines for choosing a good password Why should you not use the same password for everything? Why should you change your passwords regularly?