Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Threats To A Computer Network
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Viruses & Destructive Programs
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Viruses & Destructive Programs
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
The Internet TexPREP Summer Camp Computer Science.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Security and Your Computer Welcome to Boot Camp.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Business Technology Applications What is Malware.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Computer Security Keeping you and your computer safe in the digital world.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
TexPREP Summer Camp Computer Science
Computer Worms & Viruses
Computer Technology Notes 5
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Presentation transcript:

Downloading + Viruses

Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite

Downloads Music Movies Books Applications Photos/Images Text Files Server vs. Peer to Peer

Cost of Downloaded Programs Freeware Drivers, etc. Shareware Trial Purchased Programs

ftp Sites Upload and download files on the internet. Greatly replaced by web files downloads. FTP sites accessed through a browser for downloads: (ftp://citadel.sjfc.edu)ftp://citadel.sjfc.edu FTP software can work with a command line or graphic interface.

Downloading Plug-Ins Flash ( Quicktime RealPlayer Shockwave Acrobat Reader VRML

Viruses A program which infects (affects) other programs or sectors of a disk or hard drive. Transmitted with an infected disk, program or file. An virus is transmitted by opening an “executable” attachment received via A virus can attack the BIOS, erase files, erase the hard drive, or simply reveal messages Some types: polymorphic, stealth “in the wild”

Types of Viruses Harmless Paper-tigers Harmful Hot Famous viruses include: Michelangelo ( angelo'_computer_virus), Melissa, Loveletterhttp:// angelo'_computer_virus

Worms Many viruses are actually worms. Transmitted over network (internet) if there is a security hole. (Windows vs. Macs and Unix) Frequently spreads by copying addresses from address books. May be “harmless” (just take up processing time) or ruin files or erase hard drives. Always replicate themselves to spread. Robert Morris story—disconnect computer when experimenting

Mydoom Virus Causing problems in January 2004 Attacking companies, including Microsoft Moves through (as a Technical Message) and if opened, may reprogram your computer into a “zombie” (a computer which attacks other sites), replicates by sending to addresses in address book, and/or connects to Kazaa and disguises itself as a bootleg copy of Microsoft Office living on your computer.

Trojan Horses Programs hidden within other programs (have two simultaneous functions). Cause damage to files or a hard drive or create some frivolous effect: an annoying greeting. If one program is indeed useful, malicious purpose is never discovered.

Spyware Keylogger Information may be sent to chat room or other “public” place May be hidden in “Adware”

Programs to Fight Viruses Scanners Monitors Integrity Checkers Immunizers Behavior Blockers

Avoiding Viruses Update antivirus program Be careful with attachments Install program updates Check disks and other “mobile media” Back up files Create a virus-free startup disk Use multiple techniques

Other Methods of Affecting Your Computer Remote-access software Web Sites (possibly with Active X)

How Hackers Find You Must discover your IP address This happens when you: Visit the hacker’s site Visit a site that has been “hijacked” Open an with HTML that connects to the hacker’s site. Send an to the hacker’s site Post to a newsgroup A virus that “phones home” Share an ISP/LAN Or…War Dialing

Hackers also… Find holes in popular programs e.g. AOL Instant Messenger Look at your hard drive Clean-Up Afterwards?

Other malevolent approaches Cookies: used by multiple sites hoaxes: (they are the viruses) or directions to erase a file Website Hosts, including redirection (bush2004.com???)

Protective Measures Use virus programs. Add a firewall, especially if you have a high-speed connection. Own a Macintosh (or Unix) computer. Supposedly safe attachments: txt; jpg, gif, bmp, tif,wmf; avi,mpg,mov,wmv;pdf;mp3,wav Possibly unsafe attachments: bat,com,exe,js,jde,pif,reg,scr,shs,vbe,vbs, wsf,wsh Be wary of Peer-to-Peer, remote access applications, public wireless systems, as well as personal web servers Choose good passwords