Let’s Talk About Cyber Security

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Let’s Talk About Cyber Security
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
IT security By Tilly Gerlack.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Types of Electronic Infection
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
CONTENTS What is Virus ? Types of computer viruses.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Chapter 40 Internet Security.
Managing Windows Security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Let’s Talk About Cyber Security A guided PowerPoint lesson For Presentation at Mayfield Intermediate

What is Cyber Security? Cyber Security is sometimes called “Information Security” and can be defined as: …the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.

What is Cyber Security? …the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional Let’s break it down – “unauthorized” means without permission; “disclosure” means reveal or uncover “transfer” is to move; “modification” is change; And you can figure out the rest!

What Do We Protect Against? There are many security risks involved in using the Internet. For purposes of today’s investigation we’re talking about Malware. Malware (short for Malicious Software) is any software program that is designed to damage or disrupt a computer system.

Malicious Code Malware can attach to e-mail and carry out programming that causes computer problems. Today we’re going to go over a type of malware called “Malicious Code”. Malicious code is computer program code that is written with the intent to harm, destroy, or annoy.

What types of malicious code are you familiar with?

Viruses A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

Worms Worms are also malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire system.

Trojan Horses Trojan horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game but the program wipes out your hard drive.

Spyware This is a program that runs in the background to monitor your computer activities. Spyware is frequently downloaded without the user knowing it – spyware can monitor web browsing and cause pop-ups.

So how do you know if your computer has a virus? Brainstorm: What are some signs that your computer may have a virus or other security threat caused by malware?

Figuring it Out – Does the computer: • run more slowly than normal? • lock up or stop responding? • have unexpected crashes? • restart on its own and then run improperly?

Have you noticed… • computer applications don’t work well? • the disk drives are inaccessible? • you can’t print things correctly? • you get lots of error messages? • you see distorted pages?

So you think you have a problem? Just how did your computer get infected with that malicious code in the first place?

Spreading Malicious Code Stop and think about it – Any computer user can spread damaging malicious code without knowing it.

Spreading Malicious Code An infected computer is a computer that has not been protected. An unprotected computer is vulnerable to: Unsafe Downloads – Downloadable material that is infected with a computer virus can arrive in an e-mail or can be obtained directly through Web site downloads.

Spreading Malicious Code An infected computer is a computer that has not been protected. An unprotected computer is vulnerable to: Irresponsible Message Forwarding – Viruses and worms often appear in messages that tell you to “Forward this message to all of your friends.”

Spreading Malicious Code Once a user has helped a computer virus by downloading it, it can take on a life of its own! Computer worms can replicate and send themselves automatically to other computers by controlling other software programs on the computer, such as an e-mail sharing application.

Spreading Malicious Code Some viruses can forge e-mail addresses! Beware of messages warning that you sent an e-mail that contained a virus. This may not mean you have a virus, but it can indicate that the virus has listed your e-mail address as the sender of e-mail that is spreading a virus. Trojan horses appear to be good programs. Once downloaded, they quietly damage the computer or other networked computers at the same time.

Avoiding Malicious Code There are FOUR important steps to keeping your computer secure!

Step 1: Use an Internet firewall Make sure your computer is protected by a firewall. You can find software-based firewalls by searching online.

Step 2: Update your operating system regularly Set your operating system to automatically update when updates are available. Malicious Code can exploit an out-of-date operating system and crash the whole system!

Step 3: Use antivirus software and update it regularly Make sure to use antivirus software at all times. Remember though – software is no good if it is out of date – keep it up to date by ensuring it is set to automatically update.

Step 4: Use anti-spyware software and update it regularly An anti-spyware program can ensure you don’t have programs operating without your knowledge. Make sure to regularly run it and keep it up to date.

Other Security Tips Never open an e-mail attachment from someone you don’t know. Do not open an e-mail attachment from someone you know unless you know exactly what it is. Remember: The sender may not know that it contains a virus.

Cyber Security at School AUP stands for Acceptable Use Policy, and it means just what the name implies – a policy that describes acceptable uses of technology equipment and “infrastructure” (like the Internet or a network). AUPs are used at school to help keep students safe and secure, and to help protect valuable equipment.

Acceptable Use Policies An AUP is used to educate students, teachers, and parents about what is acceptable when it comes to using school computers. It usually details privileges of use, rules, and consequences for abuse. Have you signed one?

Why should a school have an AUP in place? Talk About It Why should a school have an AUP in place?

Talk About It Why do students, parents, and school faculty need to be educated on the AUP?

What are your ideas on what should be covered in an AUP? Talk About It What are your ideas on what should be covered in an AUP?

Cyber Security at Home Beyond e-mail: peer-to-peer networking and cyber security concerns Most P2P programs automatically install spyware on your computer as part of the installation process. These spyware programs can range from a simple nuisance to a true invasion of privacy. Note: Learn more about P2P in i-SAFE Intellectual Property Units

Cyber Security at Home Additionally, when you download or exchange files you can also be passing around malicious code such as viruses, worms, and Trojans horses!

That’s a Lot of Information Just remember – Be a Good Cyber Citizen! When you are online, think about whether you are being safe and secure.

Enrichment Activity Take what you have learned one step further by completing the enrichment goal for this lesson. Ask your teacher for the details and reference pages for your activity. Visit the X-BLOCK at www.isafe.org/ for additional information and resources.