COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Introduction to Security Computer Networks Computer Networks Term B10.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Your Interactive Guide to the Digital World Discovering Computers 2012.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
Lesson 11: Configuring and Maintaining Network Security
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 40 Internet Security.
Discovering Computers 2012: Chapter 8
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou

Computer Threats A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks. Panayiotis Christodoulou

SPAM is electronic junk . The amount of spam has now reached 90 billion messages a day. addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users’ address books. Phishing (pronounced “fishing”) is a common form of spoofing in which a phony web page is produced that looks just like a legitimate web page. The phony page is on a server under the control of the attacker. Criminals try to trick users into thinking that they are connected to a trusted site, and then harvest user names, passwords, credit card details and other sensitive information. eBay, PayPal and online banks are common targets. Panayiotis Christodoulou

Pharming (pronounced “farming”) is an attack in which a hacker attempts to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer. Panayiotis Christodoulou

A keylogger is a software program that is installed on a computer, often by a Trojan horse or virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer. Adware is software which automatically plays, displays, or downloads advertisements to a computer. The adware runs either after a software program has been installed on a computer or while the application is being used. In some cases, adware is accepted by users in exchange for using software free-of-charge. Panayiotis Christodoulou

A Botnet (also called a “zombie army”) is a collection of software robots, or bots, that run automated tasks over the Internet. These “zombies” typically run programs such as worms, Trojan horses, or backdoors. Botnets are frequently used to launch Distributed Denial-of-Service (DDoS) attacks against websites. A computer worm is a self-replicating, malicious software program. Unlike a virus, it does not need to attach itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to other computers on the network. Panayiotis Christodoulou

A Trojan horse or Trojan is a piece of software like the Trojan Horse of Greek mythology. Trojan horses often install “backdoor programs” which allow hackers a secret way into a computer system. A blended threat is a threat that combines different malicious components, such as a worm, a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack and propagate itself. Panayiotis Christodoulou

Protection Methods Back up early and often: You can use the backup utility built into Windows to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically. Use file-level and share-level security: To keep others out of your data, the first step is to set permissions on the data files and folders. If you share the computer with someone else, you'll have to use file-level permissions. Panayiotis Christodoulou

Password-protect documents: Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. Protect data in transit with IP security: Your data can be captured while it's traveling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it Panayiotis Christodoulou

Secure wireless transmissions: Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely. Panayiotis Christodoulou

Don’t visit unknown websites Don't Open Attachments from Unknown Sources Don’t download free entertainment or security software. Free software, music, screensavers, file- sharing programs and even anti-virus programs often contain spyware. Only download software from sites you know. Even then, be cautious. Panayiotis Christodoulou

Don’t open or preview spam. Never click on the links inside s/websites that you don’t know. Close pop-ups immediately. Close pop-ups by clicking on the X in the upper right hand corner. Never click on the links inside. Only Shop at Reliable Web Sites Panayiotis Christodoulou

Computer Software Computer software: is any set of machine-readable instructions that directs a computer's processor to perform specific operations. Computer software contrasts with computer hardware, which is the physical component of computers. Graphical User Interface (GUI): is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators Panayiotis Christodoulou

Computer software can be put into categories based on common function, type, or field of use. There are three broad classifications: 1.System software is a generic term referring to the computer programs used to start and run computer systems and networks. 2.Application software is the general category of computer programs for performing user tasks. Application software may be general purpose (word processing, web browsers,...) or have a specific purpose (accounting, truck scheduling,...). Application software contrast with system software. Panayiotis Christodoulou

3.Development software, such as compilers and linkers, are used to translate and combine computer program source code and libraries into executable RAMs Panayiotis Christodoulou

System Software Operating systems Device drivers Middleware Utility software Shells and windowing systems Panayiotis Christodoulou

Application Software Business Education Entertainment Health Industry Music etc.. Panayiotis Christodoulou

Development Software Programming tools for Windows Java Development kit Linux programming Mobile software programming tools Compilers UML tools etc.. Panayiotis Christodoulou

Popular Application Software Windows Media Player Microsoft of Office Avast! Free Antivirus 7-zip TeamViewer Skype AVG Nero Panayiotis Christodoulou

Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet Panayiotis Christodoulou

Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially computer separate from the rest of the network so that no incoming request can get directly at private network resources. Panayiotis Christodoulou

Turn Windows Firewall on 1.Open Windows Firewall by clicking the Start button and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2.In the left panel, click Turn Windows Firewall on or off. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation. Panayiotis Christodoulou

3.Click Turn on Windows Firewall under each network location that you want to help protect, and then click OK. If you want the firewall to prevent all programs from communicating, including programs that you have previously allowed to communicate through the firewall, select the Block all incoming connections, including those in the list of allowed programs check box. Panayiotis Christodoulou

Antivirus Antivirus or anti-virus software (often abbreviated as AV) is computer software used to prevent, detect and remove malicious software. Antivirus software was originally developed to detect and remove computer viruses, hence the name. Panayiotis Christodoulou

Free Antivirus Software AVG Avast Avira Panayiotis Christodoulou