Internet Security CIT 1100 Chapter4.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Protecting Students on the School Computer Network Enfield High School.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Computer Security.
Presentation transcript:

Internet Security CIT 1100 Chapter4

Local Security In this chapter you will learn how to: Discuss different types of malicious software Protect against viruses Discuss browser configuration and firewalls

Malicious Software The beauty of the Internet is the ease of accessing resources, unfortunately this connection runs both ways, allowing people potential access your computer Malware consists of computer programs designed to break into computers The programs are written by people known as hackers Hacking refers to the circumvention of computer security, which malware is designed to do The most common types of malware are grayware, spam, viruses, Trojan horses, and worms You need to understand the different types of malware so you can combat them

Grayware Programs that intrude into your computing experience but don't actually do any damage to your systems or data is referred to as grayware On most systems, the Web browser is the most often used piece of software. Over the years, Web sites have come up clever ways to force you to see their advertising There are basically three grayware types: Pop-Ups Spyware Adware

Pop-Ups Spyware can fire up pop-up windows of competing products on the Website you're currently viewing Getting rid of pop-ups is rather tricky, pop-up browser windows don't look like browser windows at all, they have no menu bar, button bar, or address window, yet they are separate browser windows HTML coding allow Web sites and advertising designers to remove the usual navi­gation aids from a browser window so that all you're left with is the content Some pop-up browser windows are deliberately designed to mimic similar pop-up alerts from the Windows OS

Pop-Ups The first thing to know when dealing with pop-ups is how to close them without clicking them Pop-ups remove all navigation aids, many are configured to appear on your monitor screen placing the browser window's exit button outside of your visible area Some hide behind the active browser window waiting in the background The fix is to always use alternate means to close pop-up windows: Right-Click the browser's icon in the taskbar area to generate a pop-up menu of your own.  Select Close ALT-TAB to bring the browser window in question to the forefront and then press ALT-F4 to close it. Web browsers have features to prevent pop-up ads in the first place, these types of applications are sometimes too thorough, they tend to prevent all new browser windows from opening, even those you want to view

Spyware Some types of spyware go considerably beyond the level of simple intrusion They can use your computer's resources to run distributed computing applications which can: Capture your keystrokes to steal passwords Reconfigure your dial-up settings to use a different phone number at a much higher connection charge Use your Internet connection and e-mail address contacts list to propagate itself to other computers

Spyware Spyware can seriously impact your PC's performance and cause prob­lems with your Internet connection Downloading and installing something unknown to the user is the common way Spyware is introduced system Spyware authors bundle the virus into other programs and utilities that look legitimate and are give away free Instead of offering you some sort of free utility, some use fear tactics to try to trick you into installing their software one popular method is to use pop-up browser windows disguised as Windows system warnings Do not click anywhere inside the pop-up Use ALT-F4

Spyware Spyware detection and removal software should be a part of every system and run regularly Once downloaded and installed, spyware removal can be tricky Windows includes Windows Defender for capturing and removing Spyware Another piece of software available for free from Microsoft is Security Essentials which must be downloaded from MicroSoft

Spyware Windows Defender

Microsoft security essentials

Spam E-mail from a source that's not a friend, or colleague, and that you didn't ask for, can create huge problems Unsolicited e-mail, called spam, accounts for a huge percentage of Internet traffic Spam comes in many forms from legitimate businesses try­ing to sell you products to scammers There are several options to cope with the flood of spam: Never post your e-mail address on the Internet Filters and filtering software can block spam at your mail server and at your com­puter You can set most e-mail programs to block from specific people, or by subject line or keywords

Viruses A virus is a piece of malicious software that gets passed from computer to computer It is designed to attach itself to a program on your computer Whenever you use the infected program, the virus goes into action and does whatever it was designed to do Viruses can also be used to steal information or send spam e-mails to everyone in your address book

Trojans Trojans are freestanding programs that do something other than what the person who runs the program thinks they will do A program that a person thinks is an antivirus program but is actually a virus is a good example Trojans can be quite sophisticated possibly disguising itself as a game that is also causing system damage

Worms Like a Trojan a Worm is a complete program that travels from machine to ma­chine, usually through computer networks Worms are designed to take advantage of security problems in operating systems and install themselves on vulnerable ma­chines They replicate themselves over and over on infected networks and can create so much activity that they overload the network by consuming bandwidth

Worms To protect yourself and your data against security threats: Always use the latest antivirus software especially if you con­nect to the Internet via an always-on broadband connection Use a firewall, as part of your network hardware or by means of a software program Worms infect systems through security flaws in operating systems, make sure you have the latest security patches installed A security patch is an addition, to patch a hole in the systems code Microsoft Windows Update tool is handy for Windows users, as a sim­ple method to ensure that your version's security is up to date A downside is not everyone remembers to run Windows Update Always set Windows Update to run automatically

Virus Prevention and Recovery When you discover an in­fected system, you need to know how to stop the spread of the virus to other computers and fix the infected computers using an Anti-Virus program An Anti-Virus program protects your PC in two ways: Active seek-and-destroy mode Passive sentry mode In seek and destroy, the program actively scans the computer's files for viruses if it finds any, presents you with the available options for removing or disabling them Antivirus programs can also operate as virus shields that passively monitor your computer's activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded

Virus Prevention and Recovery Antivirus program uses a library of signatures to detect known viruses The signature is the code pattern of a known virus, like its fingerprint Antivirus program compares an executable file to its library of known signatures A legitimate program could coinci­dentally hold a virus signature causing it to be flagged as a virus the antivirus program's creator provides a patch to prevent further false alarms

Preventing Viruses Antivirus programs should include a virus shield that scans e-mail, downloads, running programs automatically Scan PCs often for possible virus attacks Know the source of software before you use it Keep your antivirus program updated since new viruses appear daily, many programs will update themselves automatically Periodically update the core antivirus software programming- called the engine- to employ the latest refinements the developers have included

Virus Recovery Tips When the inevitable happens and a computer gets infected by a computer virus, you need to follow certain steps to prevent the problem from spreading Try this five­ step process: 1. Recognize - a potential virus outbreak occurred 2. Quarantine -cut off- the infected computer from the network 3. Search and destroy - do a safe boot and run your antivirus software 4. Remediate - fix things the virus harmed 5. Educate – users on proper downloading, etc

Browser Configuration If a Browser’s settings are configured improperly you may be open­ing yourself up to outside attacks ActiveX and Java are programming languages that can be integrated into Web sites They allow Web developers to make Web pages interactive, but they can also be used to compromise your browser and run malicious code If an unfamiliar Web site asks to run ActiveX or Java code, don't do it ActiveX and Java can be deactivated entirely in most browsers

Browser Configuration A Cookie is a text file containing information about you used to authenticate you as a registered user of a web site which is stored in your browser They’re used to keep track of the shopping basket you select to buy and allows sites to present different looks and content to different users They track your access to Web sites, including what products you look at, even if you don't buy them Some track your Internet activities and report back to its creator, which is often sold to advertisers so that they can target you with spam Browsers can be configured to partially or completely block cookies

Plug-ins Plug-ins are tiny pieces of software that can add functionality to a browser They enable interactive and audio/visual content such as videos If you visit a Web site and are prompted to install a third-party ap­plication or plug-in that you've never heard of, never install it Well-known and reputable plug-ins such as Adobe's Flash or Microsoft's Silverlight are considered safe

Firewalls Firewalls are hardware or software that protect an internal network from unauthorized access Hardware firewalls use a number of methods to protect networks, such as hiding IP addresses and blocking TCP/IP ports, a small Linksys home router for example acts as an effective firewall Many high end routers use access control lists (ACLs) that can filter by port number, IP address, or sev­eral other attributes Windows XP and later come with an excellent software firewall called Windows Firewall It is capable of perform port blocking, security log­ging, and more You can access the Windows Firewall by opening the Windows Firewall applet in the Control Panel

Firewalls From the Control Panel -