What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
SECURITY CHECK Protecting Your System and Yourself Source:
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Computer & Your Information
Viruses.
Unit 2 - Hardware Computer Security.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
IT Security  .
Instructor Materials Chapter 7 Network Security
Network security threats
Computer Viruses By Aylmer Or.
Protect Your Computer Against Harmful Attacks!
Malware, Phishing and Network Policies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to: – Performance – Data

Goals of Attackers 1.Prank 2.Data 3.Access 4.Identity 5.Damage

Examples Software Website forgery Social Engineering Keystroke logging Password Cracking

Viruses a program that can copy itself and infect a computer without the owner’s knowledge the term “virus” usually refers to all types of malware including viruses, worms, trojan horses, spyware, etc.

How they Spread For a virus to spread, the host must be taken to target computer Viruses can be spread via the internet, , file sharing, instant messaging, a USB drive, etc.

Infection To infect a target, the virus must be allowed to execute code and write itself to memory Thus, viruses are often software that attach to a program (such as Microsoft Word) As soon as the Word document is opened, the virus is free to infect target computer

History 1971: First identified virus called the Creeper Virus was a self-replicating program 1981: Viruses began to be spread via removable media (floppy disk)

Origins Factors that lead to the spread of viruses in the late 1980s: – Use of Personal Computers – Bulletin Boards (download programs) led to the precursor to viruses- trojan horses (program would erase files) – Introduction of floppy disk

Examples Viruses show the vulnerability, but also the sophistication of humans 1999: Melissa virus: Microsoft forced to shut down entire system 2000: ILOVEYOU virus 2004: MyDoom worm: infected a quarter million people in one day

Phishing - an illegal act where the criminal pretends to be a reputable organization to obtain through trickery the personal information from the victim with the intent of stealing money.

Types of Phishing -Link manipulation -Website forgery -Phone phishing -Dumpster diving -Mail theft

Main Phishing Technique -Urgency phrases like… -“To restore you bank account…” -“We suspect that you are a victim of identity theft… to confirm…” -“Please help support your local fire department…” -“You account needs to be confirmed… Please follow this lin and login…”

Phishing Damages “3.6 million adults lost US $ 3.2 billion in the 12 months ending in August 2007”

What can you do? Be aware, ask questions, confirm messages

Recent Developments Peer-to-peer viruses Computer espionage Future Attacks

Peer-to-peer Viruses 2008 Conficker virus Estimated 15 million computers infected Used peer-to-peer networks to download updated versions of itself Still active today, accepting commands from spammers Peer-to-peer nature essential to its success

Computer Espionage Pentagon and CIA have been warning of threat since early 2000s 2008 CIA press release reveals Chinese hacking network targets US Government websites Power grids, banking systems, and other essential services could be at risk, analysts say Some say threat overstated

Future Attacks “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” – Gene Spafford, Security Expert As long as there are computers, there will be attacks targeting them

Malicious Attacks: Prevention Firewalls Virus Scanners – Use caution when downloading files – Filtering Spam Avoid Pop Ups Use Trusted Websites Add-ons for Web Browsers

Malicious Attacks: Prevention Software – Ad-Aware – Spybot: Search and Destroy – AVG – Norton Antivirus – MalwareBytes Frequently Update Anti-Virus Definitions Files