Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
How to Protect Your PC Grayware Adware, Malware, Spyware.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Safe Surfing Through the World Wide Web Safe Surfing Through the World Wide Web The World Wide Web connects people from all over the world. The Web allows.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Protecting Students on the School Computer Network Enfield High School.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
For more information on Rouge, visit:
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Presentation transcript:

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such as key loggers and rogue diallers

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware should not be confused with legitimate software that may contain errors or bugs.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Spyware is computer software that secretly gathers information about a user that can be passed back to a 'spy' through a user's Internet connection.

Internet Safety Topic 2 Malware This presentation by Tim Fraser can be unwittingly downloaded to a user's system when certain websites are visited

Internet Safety Topic 2 Malware This presentation by Tim Fraser alter the security setting for the browser you are using is set high enough to be able to detect unauthorized downloads How to configure your Browser to minimize the chance of Drive-by Downloading :

Internet Safety Topic 2 Malware This presentation by Tim Fraser is difficult to find and as such can be tricky to remove a)your default browser home page changes b)nuisance popup adverts appear c)system slows downspyware

Internet Safety Topic 2 Malware This presentation by Tim Fraser much faster - but is not as thorough. This scans for known spyware locations in the filesystem and the Windows Registry. This scan searches the entire filesystem. It can take a very long time.

Internet Safety Topic 2 Malware This presentation by Tim Fraser All good anti-spyware software allows for the regular updating of its spyware database. There are a growing number of different spyware programs created every day. Updates can be downloaded manually on a regular basis or automatically. (often during the night).

Internet Safety Topic 2 Malware This presentation by Tim Fraser Anti-spyware software works like anti-virus software. It is run and the software scans for spyware, diallers, Trojans, registry entries, etc. Once found the offending items can be removed.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Adware Adware is any software that causes unwanted adverts to appear when a user is using their system.

Internet Safety Topic 2 Malware This presentation by Tim Fraser It may take the user many clicks of the mouse to get rid of the adverts, even to the extent of closing their browser or shutting down or restarting their system. Sometimes these adverts appear as pop-up boxes that cause other pop-up boxes to appear even when the user tries to close them down.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Adware spies on users Adware should not be confused with legitimate advertising that commercial interests pay for to appear on popular web sites. (right hand pane of a google search) and tries to display adverts based on a user's browsing habits.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Some freeware publishers bundle adware with their software because they receive money to do so. In this case, the publisher will include a warning about the adware during program installation

Internet Safety Topic 2 Malware This presentation by Tim Fraser Ad-Aware SE Personal Edition. This program can be downloaded for free personal use and it includes a comprehensive adware and spyware database that is updated regularly.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Key Loggers are programs designed to capture and record every key you press, including your passwords and confidential information. A thief could then raid your bank account! You might find out when it is too late?

Internet Safety Topic 2 Malware This presentation by Tim Fraser This type of attack is only a problem for systems that use a dial-up connection to access the Internet. This type of software should not be able to affect broadband users. Tries to disconnect your system from its usual Internet Service Provider (ISP) and reconnecting your dial-up modem to another ISP. The user is then billed at a much higher rate for Internet access.

Internet Safety Topic 2 Malware This presentation by Tim Fraser This type of attack is based upon flooding key servers with useless traffic. The server has to spend so much time dealing with this traffic that has to be dealt with so that users are denied normal service.

Internet Safety Topic 2 Malware This presentation by Tim Fraser Spam is the term used to define all of the unwanted that takes up space in a user's inbox.

Internet Safety Topic 2 Malware This presentation by Tim Fraser The type of software used to block unwanted s is known as a spam filter and works by trapping suspect s before they get near to a user's inbox. If you think any of the mail in your inbox is spam, delete it immediately without opening it. If you do open a spam by accident, delete it. Never open any files that are attached to spam as these will more often than not contain a virus.