Malware and Computer Maintenance

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Computer Security Keeping you and your computer safe in the digital world.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Viruses & Destructive Programs
What they are and how to protect against them
Tonga Institute of Higher Education IT 141: Information Systems
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Cyber Security By: Pratik Gandhi.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Worms & Viruses
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
Utility Programs.
ISNE101 Dr. Ken Cosh Week 13.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
Computer Viruses Standard A-4 (Safety Unit)
Ch9 E-commerce Security
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
G061 - Network Security.
Presentation transcript:

Malware and Computer Maintenance Mr. Singh

6 types of Malware Virus Worm Trojans Rootkit Spyware Adware What is malware? What does it look like? How can you stop it? What about other threats: Hoax & Chain letters

Types of Malware Virus: Attaches itself to existing files and runs the virus code whenever the host is accessed/run Worm: A standalone program that deliberately tries to exploit vulnerabilities in order to spread to more machines

Types of Malware Trojans: A ‘virus’ that needs to be run in order to do damage Rootkit: Usually exists for the sake of hiding itself and possibly opening some back doors Might work with a trojan in order to help disguise itself and spread

Types of Malware Spyware: Software that hides on your computer in order to ‘spy’ on you. Possibly monitor keystrokes, record websites, etc. Adware: Similar to spyware but designed to redirect you to certain websites (advertising) or display popups

What do these malware do? Copy themselves into other files Execute various ‘payloads’ Delete files Do something on a particular day Spread themselves (worm, or e-mail virus)

Prevent Malware How can you catch one? USB thumb drive CD/DVD Downloaded from the internet From network (school or work) In an e-mail In an instant message

Malware Example

Malware Example

Malware Example

Prevent Malware Avoid downloading every little installer Consider what you’re installing Avoid programs downloaded via P2P networks (Kazaa, limewire, torrents, etc) Install anti-virus, such as AVG or Norton Install anti-malware software such as MalwareBytes

Other threats Hoax: Usually an e-mail that gets passed along by unsuspecting computer users who receive and forward it on to their friends Chain Letter:

Hoaxes/Chain letters Usually an e-mail that gets passed along Spreads by e-mail just like a virus No code: it doesn’t replicate itself Gullible people e-mail it around

Hoaxes & Chain Letters What does a hoax do? Makes you look foolish if you forward it Clogs people’s e-mail Slows down your network and the internet Could ask you to do something that will damage your computer DO NOT forward an e-mail even if it does sound like a real warning

Example of Hoax e-mail

Virus prevention Antivirus – software designed to detect and destroy viruses Always make sure you have some kind of antivirus running (especially for windows) Lots of free good quality software such as AVG and Avast

Virus prevention Firewall – A part of the computer system or network that blocks unauthorized access (popups, etc) while allowing you to use the internet or communicate When connected to the internet, there must be a firewall somewhere between you and it Most home routers have built in firewalls You can always check your settings on your computer to see if your firewall is active

Prevention and Maintenance What is one simple way of maintaining your computer? Keep some free room on your C: Drive This is your main drive used to store data Lack of room can make your computer really slow Try to keep at least 1 GB free

Maintenance Scandisk – function used to check your hard disk for errors and to correct problems Sometimes data gets corrupted, or shortcuts get broken and a file no longer points to where it’s suppose to be Scandisk scans all your files and checks their integrity

Maintenance Fragmentation – rearranging files and removing any clogs in the system This puts all the parts of a file together making loading much faster If you’re ever loading something and its taking a long time, try defragmenting your hard drive

Password Statistics Number of online accounts that an average user has? 25 Number of passwords that an average user has? 6.5 Number of times an average user logs in per day: 8

Password Statistics Most commonly used password? Password1 % of users that use personally meaningful words? 54.9% % of users who write down their password? 15%

Who wants your password? You’d be surprised Friends, family, another teen might try to cause trouble for you or just play a ‘joke’ by impersonating you on social media Career criminals guess or crack passwords for a living Once they gain access to your private identity information, they can sell it to the highest bidder

How do people crack them? There are free programs on the internet that crack passwords by trying every word in the dictionary Serious hackers write their own password cracking software Someone you know might try and use information they know about you (name of your pet or your address)

How are they stolen? No matter how strong your password is, it can still be stolen or copied Someone can look over your shoulder when you’re at school or at the library and see keys you type There are programs that keep track of which keys you used when you type last on a computer in a public place (library).

What makes a good password? Class discussion