3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Viruses & Destructive Programs
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Managing Windows Security
3.6 Fundamentals of cyber security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics

Introduction The objective of computer security includes – protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

Introduction At the end of this lesson, student will be able to: – Practice safe, ethical, and legal use of technology systems and digital content. (ACOS #13) – Explain consequences of unsafe and illegal use of technology systems and digital content (ACOS #13.B1) – Distinguish between various forms of malicious code

Lesson: Computer Crime In the early days of computing, a hacker was a person who enjoyed learning details of computer systems and writing clever programs, referred to as hacks. Although many people still use the term hacker to describe software manipulation, it more commonly refers to unauthorized access to computer systems. In addition to programming his own computer, the hacker may break into others.

Lesson: Computer Crime The most famous case of electronic trespassing was documented in Cliff Stoll's best-selling book, The Cuckoo's Egg. While working as a system administrator for a university computer lab in 1986, Stoll traced a 75-cent accounting error to a ring of hackers working for the KGB.

Lesson: Computer Crime The most common form of computer crime, however, is theft. Computers are used to steal money, goods, information, and computer resources. This may be accomplished through the use of malicious code, or malware, which is software designed to infiltrate a computer system without the owner's consent. Malware includes but is not limited to the following: – adware, – computer viruses, – spyware, – Trojan horses, and – worms.

Lesson: Computer Security Definitions Malware, (malicious) is software designed to infiltrate a computer system without the owner's consent. – Malware includes the following: Adware automatically plays, displays, or downloads advertisements to a computer after the software is installed on it Computer virus is a computer program that can copy itself and infect a computer. Viruses can increase their chances of spreading to other computers by infecting files on a network file system Spyware is a type of malware that is installed on computers and collects information about users without their knowledge Trojan Horse appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system Worm uses a network to send copies of itself to other nodes (computers on the network)

Lesson: Computer Security Definitions Adware – Advertising is integrated into or bundled with the software Developer gets income from advertisers Users may find ads to be – Interruptions or annoyances – Distractions be given option to pay for a “licensed” copy to do away with the ads – Often appears in software that is free – Often designed to note what Internet sites the user visits – Adware can also download and install Spyware

Lesson: Computer Security Definitions Computer Virus – Definition: a series of instructions buried into a program which cause the computer to destroy data when given a certain signal – Virus is duplicated each time the software is copied It spreads Can spread to all computers on a network

Lesson: Computer Security Definitions Spyware – The presence of spyware is typically hidden from the user. – Spyware is known to change : computer settings, resulting in slow connection speeds different home pages and/or loss of Internet

Lesson: Computer Security Definitions Trojan Horse – Designed to allow a hacker remote access to a target computer system – Possible for a hacker to access it remotely and perform various operations, such as: Data theft (e.g. passwords, credit card information, etc.) Installation of software (including other malware) Downloading or uploading of files Modification or deletion of files Keystroke logging Viewing the user's screen Wasting computer storage space – Trojan horses require interaction with a hacker to fulfill their purpose – It is possible for hackers to scan computers on a network in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer

Lesson: Computer Security Definitions Worm – A computer worm is a self-replicating computer program – It uses a network to send copies of itself to other nodes (computers on the network) – This is due to the poor security the computers infected have – Unlike a virus, it does not need to attach itself to an existing program – Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer – To prevent Be wary of opening unexpected Don’t run attached files or programs or visit web sites that are linked to such s Anti-virus and anti-spyware software are helpful, but must be kept up-to-date The use of a firewall is also recommended.

Lesson: Computer Security Definitions Phishing – Definition: The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy site. – The term is a variant of fishing; alludes to baits used to “catch” financial information and passwords – Characteristics: Lures unsuspecting public Typically carried out by or instant messaging Often directs users to enter details at a fake website that looks almost identical to the legitimate one.

Lesson: Computer Security Definitions Computer Crime – Willful destruction of computer data is vandalism – Electronic destruction More costly than physical destruction May be life-threatening – Computer crimes cost the nation billions of dollars each year

Lesson: Computer Security Do you let spyware sneak onto your computer to give others a peek at information you enter online? – Get wise to the spyware guise and test yourself by taking the On Guard Online Spyware Quiz. Take a screenshot at the end of the quiz – Save to your F Drive in your Unit 3 Folder as » 3.04 On Guard Online Spyware Quiz

Lesson: Computer Security A software virus works in the same way as a biological virus, which can invade the cells of another organism and use the reproductive machinery of each host cell to make copies of itself. A software virus spreads from program to program, or from disk to disk, and uses each infected program or disk to make more copies of itself. Virus software is usually hidden in the operating system of a computer or in an application program. Some viruses do nothing but reproduce; others display messages on the computer's screen; still others destroy data or erase disks.

Lesson: Computer Security Definitions Like viruses, worms (named for tapeworms), use computer hosts to reproduce themselves. But unlike viruses, worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A typical worm segment resides in a workstation's memory rather than on disk, so the worm can be eliminated by shutting down all of the workstations on the network.

Practice Open Microsoft Word and answer the 6 questions below – Save to your F Drive in your Unit 3 Folder as 3.04 Practice – Number 1. automatically plays, displays, or downloads advertisements to a computer after the software is installed on it – Number 2. a computer program that can copy itself and infect a computer – Number 3. a type of malware that is installed on computers and collects information about users without their knowledge – Number 4. appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system – Number 5. uses a network to send copies of itself to other nodes (computers on the network) – Number 6. Often directs users to enter details at a fake website that looks almost identical to the legitimate one

Review Willful destruction of computer systems and information is considered vandalism and is a crime. As a matter of fact, electronic destruction is more costly than physical destruction. Of course, theft is theft whether it is robbing a bank or stealing money by gaining access to a person’s account numbers through computer hacking. Malicious software can certainly be aggravating to the user, but it can also destroy your computer and data. Criminals often use some form of malicious software to steal money from your bank accounts and to steal your identity. To protect yourself and your data, you should be aware of the potential threats.

Task Review the vocabulary words in this lesson – Complete the 3.04 Vocabulary Practice. – The Quiz will ask you to match the vocabulary words to definitions and to select the appropriate word for a given sentence. » You may use your notes and this PowerPoint to complete it.

Are you finished? You should have 14 things saved on your F Drive in your Unit 3 Folder Network Tutorial How Networks Work History and Internet Dropbox Skills Check Boolean QC Chart How Stuff Works Brain Quiz Searching the Web Dropbox Intel Education Tutorial for Info Power Side Trip Evaluating Web Sites Dropbox On Guard Online Spyware Quiz Practice Vocabulary Practice So, are you finished?