SPYWARE  Do you know where your personal information is?

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Security for Seniors SeniorNet Help Desk
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Hackers And Hacking.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Personal spaces.
Cyber Security By: Pratik Gandhi.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

SPYWARE  Do you know where your personal information is?

Types of Spy ware  Trojan  Web Bugs  Ad Ware  Stand alone Surveillance Software  Key Loggers  Others

Trojan  Program received by your system looks benign  Installs harmful software  Delete files  Opens Backdoors

Web Bugs  Cookies keep track of your activity  Ability to download spy ware components  Direct you to WebPages that target your interests

Ad Ware  Software installed with the help of Ad supported programs  Tracks your internet activity to send you pop ups that target your interests  May sell your information to companies

Surveillance  Monitors computer tasks  Access personal information  Legal for Employers  Used in Identity Theft

Key Loggers  Monitors keystrokes  Collects personal information  Remain hidden for long periods of time

Prevention  Antivirus software  Keep Updated  Beware of Peer to Peer file sharing  Be sure of the source and contents of all downloads and updates  FireWalls

Conclusion  Spy ware is always watching….  Protect yourself, your bank accounts, and your computer.