Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
SECURITY CHECK Protecting Your System and Yourself Source:
Breaking Trust On The Internet
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Unit 6 Digital Literacy Study S3 Obj 2-2
Using internet and cell phones safely
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
How It Applies In A Virtual World
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 2 - Hardware Computer Security.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
INTERNET: The Good, The Bad and The Ugly
What is Spam? d min.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Safety.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli

Agenda Introduction Different kinds of malware Internet scams Youth, a poorly protected group Invasions of privacy Different internet threats Protection against all dangers

Introduction The internet is a global village with around 2 billion users Vast range of information Traditional communication media are redefined New forms of human interaction Changes for business and companies Many people, many crimes Nearly impossible to regulate it

Malware Malware, short for malicious software, is a software designed to harm or secretly access a computer system without the owner's informed consent. Different types of malware: Virus Worm Trojan Spyware Adware Backdoor

Computer Virus Definition: A computer virus is a program that can copy itself, and infect files, programs and computers. How it inflicts a damage: It is placed in commonly used programs, and will run when the infected program boots. Once a virus is active, it saves itself to your hard drive or copies itself to applications or system files you use. Damages the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.

Computer Worm Definition: A computer worm is a self-replicating malware program, that uses a computer network to send copies of itself to other computers of the network without any user intervention. How it inflicts a damage: It targets network vulnerability and spread through s, instant messaging, file sharing networks or the internet. The security threat of worms is equivalent to that of viruses.

Trojan horse Definition: A Trojan horse (Trojan), is a malware that appears to perform a desirable function for the user but instead facilitates unauthorized access, steals information or harms the system. How it inflicts a damage: Trojan horses disguise themselves as valuable and useful software available for download on the internet. Once the client Trojan executes on your computer, the attacker has a high level of control over your computer.

Spyware Definition: A computer spyware is a type of malware that can be installed on computers to collect information about users without their knowledge. How it inflicts a damage: Typically, spyware is secretly installed on the user's personal computer. Spyware programs can collect various types of personal information. They can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity or even change computer settings.

Adware Definition: Adware, or advertising-supported software, is any software which automatically plays, displays, or downloads advertisements to a computer. How it inflicts a damage: These advertisements are usually in the form of a pop-up. Adware, by itself, is harmless. Can occur with integrated spyware. Interruptions or annoyances, or distractions from the task at hand.

Backdoor Definition: A backdoor in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. How it inflicts a damage: It enables an alternative access to an application or the whole computer system. It gives access to your e-banking account or private mail.

Scams on the net On the web, there are more and more websites trying to rip you off or steal your money. Constantly, new swindles appear and the only way to protect internet users are the warning campaigns against this phenomenon. Example of swindles circulating right now on the web: credit card fraud fake website

Youth: a public poorly protected Young people are the most exposed and most targeted by predators of all kinds on the web. In 2003 more than 87% of 12/17 year olds have been connected to Internet and the phenomenon is growing with the development of mobile Internet. The web: A ludic but risky space in which they enter with a simple click! The dangers they are facing.

Invasion of Privacy This can be done in different ways When they: fill out forms to participate in contests for commercial websites. provide informations about themselves to strangers in chat or instant messaging. give personal information, when registering to various Internet services or software (instant messaging, chat, file sharing, etc.). complete a personal profile, when registering for accounts and free instant messaging.

Pornography The easy access provides by internet to the pornography is among the main anxieties of parents of young Internet users. It is possible to stumble across a pornographic website, by: using a search engine. making a mistake in typing the address of a website. clicking on a link in an , instant messaging or chat. using file sharing software that carry a lot of pornographic images and videos easily accessible.

Internet predators Chats, s and instant messaging are environments where young people may encounter predators. Anonymity specific to Internet means trust and intimate revelations. Predators are using it to quickly establish a relationship of trust with young people who are still lacking of experience and Judgment.

Violent and hateful content On Internet you can find a world of violence that target the youth once more. With a simple click, young people can download: Pictures of torture and sadism. Music with very violent words (sometimes censored in the discs sold in stores). Young people also like the "bloody" sites, that show real pictures of accidents, torture or mutilation. Moreover, hate groups like those campaigning for the supremacy of the white race, are increasingly using the Internet to recruit young people. They use , and private chats to address the most vulnerable adolescents.

Disinformation The Web is full of dubious and worthless information. Insofar where anyone can post their personal views or theories. The disinformation is commonplace in many aspects: Web pages, usually personal, where anyone can publish whatever they want by pretending it's true, and present simple opinions as facts. Sites Parody or spoof, which induce deliberately mislead the visitor, whether for fun or for political reasons. Hoaxes circulated by mail, which broadcast false virus warnings, bogus methods to supposedly make a fortune, urban legends and unsubstantiated health alerts. And a phenomenon increasingly popular for spreading false rumors through the social network (such as the death of a celebrity).

Another danger conveyed by internet There are several profiles of Internet users, youth and even adults, who feel very addicted to the Internet and this according to their main activity on the web: games (poker, contests, etc..) network game (Wow, Counter-Strike, etc..) chat forum instant messaging blog type Skyblog, social network type of MySpace, Facebook the type of video sharing YouTube and Dailymotion

The risk of using Internet for your health: A lack of sleep, tiring Headaches Irritability A tiring eyes A loss or weight gain depend of individuals Up to a loss of sense of reality (concerning the social aspect or financial) Strongly affect social relationships

Protection against: Virus: Using a good Antivirus updated Execute only familiar programs Don't open suspicious Worms: Using a good Antivirus updated Using a good Firewall Installing Update and Patch for your OS and your programs

Protection against: Trojan: Using a good Antivirus updated Using a good Firewall Don't open suspicious Spyware Installing an Anti-spyware software

Protection against: Adware Using a good Antivirus updated Block Spy Software in your browser Backdoor Download software/applications on the website of the programmer or distibutor Check on a list like «BugTraq» to know if the software has backdoors

How to protect against scams? For a transfer check if the website is secured (HTTPS) Open a Paypal account if it's usual for you to buy on the Internet Don't answer mail from unknown person Don't click on the links of suspicious mail Activate the filter anti-spam and anti-phishing of your browser

How to protect young public In general: Teach to your kids how to use the Internet Follow them in the apprenticeship of the Internet Tell them the dangers of the Internet

How to protect young public Against Pornography, hateful content and Internet predators: Installing parental controls Check what are they doing Never let them alone on the Internet

Protection against disinformation: Ask Verify Keep position

How to protect against: Gambling: Self control Consult specialists if you're feeling addicted Video Gams: Limit the hours of video game per day Have a social life besides the video games

Thank you for your attention! Any questions?