Computer Applications I

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Information Security Sharon Welna Information Security Officer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Computer Security Keeping you and your computer safe in the digital world.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IT Security  .
Protecting Your Identity:
Definition Common Rules
Protect Your Computer Against Harmful Attacks!
Identify digital communication hazards.
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Computer Applications I
Computer Applications I
Identify digital communication hazards.
G061 - Network Security.
Presentation transcript:

Computer Applications I Competency 1 – Discuss business communication hazards, techniques, system maintenance and navigation. Objective 1.01 - Identify digital communication hazards. 1.01

Spyware and browser hijacking Definitions and implications

What is spyware? Spyware is a category of computer programs that attach themselves to the computer’s operating system in various ways. It can drain the life out of your computer's processing power. It is designed to track users’ Internet habits and nag them with unwanted sales offers or generate traffic for the host Web site.

What is browser hijacking? The most generally accepted description of browser hijacking software is external code that changes your Internet Explorer settings. Generally the home page will be changed and new favorites will be added that point to sites of strange content. In most cases, the hijacker will make registry changes to the system, causing the home page to revert back to the unwanted destination even if it is changed manually. A browser hijacker may also disallow access to certain web pages, for example the site of an anti-spyware software manufacturer like Lavasoft. These programs have also been known to disable antivirus and anti-spyware software.

Characteristics of browser hijackers They take advantage of Internet Explorer's (IE) ability to run ActiveX scripts straight from a web page. Generally, these programs will request permission to install themselves via a popup that loads when visiting a certain site. If the user accidentally gives permission to install, IE will execute the program on your computer and change your settings. Use security holes within Internet Explorer to install themselves automatically without any user interaction at all. These can be launched from popup ad windows which the user has not even intended to view. Make entries to the HOSTS file on your system. This special file directly maps DNS addresses (web URLs) to IP addresses, so that every time you type a URL you are redirected to the IP address of a sponsored search or porn site.

Some browser hijackers may also install themselves onto your computer system as legitimate programs, leaving an entry in the 'add-remove programs' list in the control panel. There are many faces of browser hijacking, and to combat the situation, you have to be aware of all tricks and loopholes that make this scourge possible. Browser hijacking isn't necessarily a virus, and isn't necessarily adware, so stopping it isn't necessarily best left to software monitoring programs.

Definition How to protect yourself Purchasing guidelines Antivirus software Definition How to protect yourself Purchasing guidelines

Antivirus software definition Antivirus programs learn and memorize all of the different replicating viral signatures that are already out there (40,000 to date), and then compare the binary signatures of incoming files against those already-known viral signatures to see if anything suspect is lurking on your computer. The software typically is kept running in the background to check files and e-mail messages as they are downloaded. A virus signature is a section of code that can be used to identify a known virus.

Virus protection Install antivirus software and keep it running in the background. Before downloading a file, make sure the source is reputable. When you receive a disk, scan it with antivirus software before using it. Never open an e-mail attachment unless the sender is known. Watch for information about the latest virus threats. Keep your antivirus program up-to-date.

Purchasing guidelines Use software that provides free weekly updates. Use software that provides the coverage necessary to maintain the computer’s security. The two most popular brands: Symantec McAfee

Firewalls What are firewalls? Packet filtering Circuit level gateways Application level gateways Stateful inspection

What are firewalls? A firewall is either a piece of hardware or a software program that examines data as it passes into your computer or network and discards it if it does not meet certain criteria. Depending on the type of firewall used, this operation may take place at different points in the path between the source of the data and the application in your computer. Different criteria will be used to examine the data, but the basic operation remains the same for all firewalls.

Packet filtering firewalls Packet filtering firewalls work by examining data packets as they attempt to pass through the firewall. They compare them to a list of rules based on the source of the data, its intended destination, and the connection port between the target and source data.

Circuit level gateways A circuit level gateway is a firewall that only allows data into its protected network based on requests from computers inside that network. The firewall keeps a record of requests for data that go out, and only allows data in that matches that request. An advantage of this type of firewall is that since it acts as the gateway to the network it is protecting, anyone scanning the network from outside will see only the address of the firewall and not the rest of its protected network.

Application level gateways Application level gateways, also known as proxies, are outwardly similar in operation to circuit level gateways in that they act as the only entrance into or out of a protected network and deny all non-requested data from outside. The major difference is in the way they handle information. A firewall using this method runs proxy applications to view common types of data before it is allowed through the firewall.

Stateful inspection Stateful inspection is a combination of packet filtering with some elements of the gateway methods. Essentially, it is a packet filter firewall that examines more than just the addresses and port information of the data. Without using proxies, it can imitate some of the features of an application gateway by viewing the application specific data sent in each packet.

Definition Security confirmation Secure websites Definition Security confirmation

What is a secure website? A secure website is one that uses data encryption to protect all information.

How can you tell a site is secure? There are three ways to confirm that a website is secure: Click the VeriSign icon to verify that the certificate is valid. A secure page should include a small padlock symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an https: prefix rather than the standard http: prefix. The s means that the page is secure.

Identity theft Definition Types of identity theft Examples of identity theft Protect against identity theft

Definition Any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person. It intrudes into many areas of people’s daily lives.

Types of identity theft Financial fraud - includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. Criminal activities - involves taking on someone else's identity in order to commit a crime, enter a country, obtain special permits, hide one's own identity, or commit acts of terrorism. Credit card fraud is identity theft in its most simple and common form. It can be accomplished either by a thief who steals your account number or when your pre-approved credit card offers fall into the wrong hands.

Examples of identity theft Common modes of identity theft: Dumpster diving - Dug out of trash cans and dumpsters Memorized or copied by sales clerks and waiters Removed from mailboxes in the form of tax notices, financial account statements, and other bills Removed from your employer's files, either secretly or with the help of an inside accomplice Removed from hospital records, usually with the help of an inside accomplice Removed from your financial lender's files Removed from your landlord's files Purchased (or found free) in online (or offline) databases Collected from "cloned" Web sites - someone may recreate a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order. Stolen from a merchant database through computer hacking (not as simple as other forms of theft) Snatched using software that mirrors keystrokes to capture credit card account information

Ways to protect yourself DON'T give out your Social Security number unless it’s critical. DESTROY any unwanted credit card offers. ONLY include your name and address on checks. SHRED (cross-cut) any sensitive documents before discarding. DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse. REVIEW your credit report annually to verify its accuracy. NEVER give out personal information on the phone to someone you don't know and who initiated the call. REVIEW your credit card statement each month to make sure there are no unauthorized charges. DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box. If you're ever denied credit, FIND OUT WHY. REACT QUICKLY if a creditor calls about charges you didn't make. GUARD deposit slips as closely as you do checks.

Definition Common Rules Netiquette Definition Common Rules

What is Netiquette? "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette includes both common courtesy online and the informal "rules of the road" of cyberspace. In other words, Netiquette is a set of rules for behaving properly online.

Core Rules of Netiquette Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes http://www.albion.com/netiquette/corerules.html