Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Unit 6 Digital Literacy Study S3 Obj 2-2
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Threats To A Computer Network
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Quiz Review.
Viruses & Destructive Programs
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security for Seniors SeniorNet Help Desk
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
An Introduction to Phishing and Viruses
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
IT Security  .
Instructor Materials Chapter 7 Network Security
COMPUTER VIRUSES Computer Technology.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Risk of the Internet At Home
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click your mouse to advance slides

Social Engineering Also known as pretexting Feeds on human behavior How people interact Tells you that you are trustworthy Are you to willing to please Uses false pretense to get personal information Examples: Scammer comes to your office claiming to be a IT person. He wants to fix your computer and asks for personal information such as account names and passwords to access your account, all while he claims to need it to fix your computer. Scammer plays on sympathy, while pretending to be a new employee and forgot access codes. He will ask you so he won’t get into trouble for his forgetfulness and possibly lose his job. Scammer calls on the phone and pretends to be a boss and uses intimidation to get info from you.

Protect Yourself and Your Job Never feel obligated to pass along sensitive information Ask pertinent questions about the person making requests: Correct name and spelling Who is the person/company representing Employee number Ask for account number request is being made Ask if you can verify any information

Phishing It is using email to get you to click on links and making personal information available to scammers/hackers. Sends email to make you think you have a problem with your personal accounts Wants you to open email and click on links that take you to fake websites where your personal information is captured for them to access your accounts

Protect Your Personal Information Hover over email sender in the Inbox and view true address in the status bar Many of them will have country codes other than US (United States of America) Their only purpose is to get into your accounts Never respond/verify by email Always call o/website or go to the financial institution Report the phishing scam

Identity Theft acquires access to: Name Address Social Security number Account numbers Driver’s license Birthday steals portable storage: Laptop Flash drive Cell phone PDA Ipad

Protect Your Identity Learn how to set passwords Use Passwords that will not be easy for theft Use biometric security, fingerprint scan, if possible (newer devices)

What is… Spam Spyware Virus Trojan horse Worms Rootkits Buffer overflow Spoofing Botnets and zombies

Spam Unsolicited commercial email and schemes Prescriptions, insurance, adult sites, etc. Steal/acquire addresses from Websites, Internet mailing lists, newsgroups, etc.

Spyware Unsuspectingly collects computer user information without consent Software that runs along with a legitimate program Surveillance software that tracks keystrokes, screen capture, chat loggers, etc Used for spying: spouses, worried parents, government, private detectives Adware that tracks your surfing habits-this is not illegal Legitimate Adware will disclose nature of data collected Involves privacy issues; User has no control

Spyware on my computer? Windows desktop is very slow booting Computer is slower when browsing Internet Clicking on links gets unexpected results Nothing, different website, etc Home page changes, unable to reset it Web sites automatically added to bookmarks/favorites list

Virus (like human flu) Program or code loaded onto computer without permission and knowledge Attaches itself to code on your computer and replicates itself when a file is launched or executed Then attaches itself to other files and spreads throughout computer

Various Viruses… Boot sector-puts virus into the first section of hard disk so the virus is loaded into the memory when computer is booted up Program-infects executable program files: .exe, .com, .sys, etc Multipartite-uses multiple techniques such as boot sector and program at the same time Polymorphic-changes each time it is used, avoiding detection Macro-is inserted to a Microsoft Office document and emailed to the unsuspecting user Triggered by clicking, opening, booting

Trojan Horse Like the historic Trojan Horse, it appears to be legitimate software - enemy hiding inside Games, videos, screen saver, file sharing etc. When opened the destructive code is loosed onto the computer

Worms Takes advantage of holes in security in applications and operating systems Automatically replicates itself-needs no triggers by computer user Looks for network or Internet connection so it can move to another system

Rootkits It hides the tracks of intruders so antivirus software cannot detect them Can incorporate itself with other malicious code to take complete control of a system Usually do not replicate themselves

Buffer Overflow Too much data that is sent to the memory buffer that is causes it to go beyond its fixed boundary Results is overwriting data in adjacent memory locations Can result from vulnerabilities or flaws in software Causes service disruption and lost data Currently no way to check and stop the requests

Spoofing Program or person pretending to be something or someone they are not to send false information Data appears to be coming from somewhere other than its original place Makes modifications in addresses, IP headers or other source of information Often works with phishing

Botnets and their Zombies Bot - like a robot - remotely controlled by IM (Instant Messaging) or IRC (Internet Relay Chat) Performs automated tasks Botnet is a group of bots that run automatically Goal is to take over as many systems as possible Zombies - assembled botnets of individual compromised computer that are remotely controlled Look on the Internet for more hosts to infect Launch DDoS (distributed denial of service) attacks Can shut down a server