Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 1 This material was developed by Oregon Health & Science University,
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Introduction to Information and Computer Science Internet and the World Wide Web Lecture c This material (Comp4_Unit2c) was developed by Oregon Health.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Introduction to Information and Computer Science Security Lecture a This material (Comp4_Unit8a) was developed by Oregon Health and Science University,
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
 a crime committed on a computer network, esp. the Internet.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Network System Security - Task 2. Russell Johnston.
Managing Windows Security
Protect Your Computer Against Harmful Attacks!
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web

Unit Objectives Definition of the Internet and World Wide Web. Connecting to the Internet. Searching the Internet, filtering results and evaluating credibility of results. Internet security and privacy concerns. Ethical considerations of the Internet. Online healthcare applications and associated security and privacy issues (including HIPAA). Component 4/Unit 2 2 Health IT Workforce Curriculum Version 1.0/Fall 2010

What Devices are Usually Attacked? Routers Sends traffic from a private network to the Internet and from the Internet to a private network. If a hacker can successfully attack a router:  All network traffic can be viewed.  Traffic can be redirected to the hacker’s equipment. Component 4/Unit 2 3 Health IT Workforce Curriculum Version 1.0/Fall 2010

What Devices are Usually Attacked? (cont’d) Web Servers House Web sites. If a hacker can successfully attack a Web server, the Web server may not be able to function properly. What would happen if Amazon.com or eBay.com went down for an entire business day? Component 4/Unit 2 4 Health IT Workforce Curriculum Version 1.0/Fall 2010

What Devices are Usually Attacked? (cont’d) Computers Computers can store confidential personal and corporate data. If a hacker can gain access to this information, they might use it for personal gain, sell it to another party, or use it for blackmail purposes. Component 4/Unit 2 5 Health IT Workforce Curriculum Version 1.0/Fall 2010

How do Hackers Attack Devices? Packet sniffers can read Internet traffic. Install malware. Adware – Continuous ads on your screen. Spyware – Reports on sites you visit. Guess at user names and passwords. Don’t use easy-to-guess passwords. Do change default usernames and passwords (wireless routers). Component 4/Unit 2 6 Health IT Workforce Curriculum Version 1.0/Fall 2010

Secure Your Operating System Install critical updates For Windows operating systems (OS), critical updates fix security flaws and should be installed as soon as they are released. Optional updates should not be automatically installed. Only install optional updates if you determine that they are needed. Component 4/Unit 2 7 Health IT Workforce Curriculum Version 1.0/Fall 2010

Secure Your Files Install anti-virus (AV) protection software Commercial AV software is more robust than free AV software.  Will catch and quarantine almost all Trojan horse, virus, and worm attacks before they do any harm. AV software works by recognizing “patterns” and stopping what it considers bad behavior.  Patterns should be updated daily to protect computer against new attacks. If you decide to install more than one AV program on your computer, verify that they will work together before installation.  Some AV software do not work well together. Component 4/Unit 2 8 Health IT Workforce Curriculum Version 1.0/Fall 2010

Engage in Safe Browsing When surfing never click on a popup unless you are absolutely sure of its owner Some popups may indicate that the computer is infected with viruses and that you should click the popup to cleanse your system.  Never trust these messages. It is more likely that your AV software will locate and remove malware and viruses than a Web site’s software. Component 4/Unit 2 9 Health IT Workforce Curriculum Version 1.0/Fall 2010

Close Popup Windows Safely Press the key combination of ALT+F4 to terminate popups. This ensures that the popup will not install malware. Do not click anywhere on or in the popup window with your mouse. Clicking may install malware. Component 4/Unit 2 10 Health IT Workforce Curriculum Version 1.0/Fall 2010

Secure Your Computer System Turn on a firewall Firewalls permit or deny a computer the ability to connect to another computer. The firewall will disable ports that should not be open and restrict use of ports to certain programs. Component 4/Unit 2 11 Health IT Workforce Curriculum Version 1.0/Fall 2010

Manage Cookies A cookie is a text file that a Web site stores on your computer. Cookies cannot harm your computer. Web sites use cookies to keep track of your preferences and to record Web pages you visit. First party cookies are placed on your computer by Web site owners. These are usually okay. Third party cookies are placed on your computer by companies authorized by the Web site owner to place a cookie on your computer.  Some experts recommend accepting first party, rejecting third party, and allowing session cookies. Component 4/Unit 2 12 Health IT Workforce Curriculum Version 1.0/Fall 2010

Manage Cookies (cont’d) Recommended settings in Internet Explorer… Component 4/Unit 2 13 Health IT Workforce Curriculum Version 1.0/Fall 2010

Passwords and the Internet Use complex passwords: At least six characters. At least one upper-case character. At least one number. At least one symbol (# $ %, etc.). Never use common information in a password. Do not write passwords on paper. Hackers know to search around the monitor, keyboard, and general computer area to find passwords. Component 4/Unit 2 14 Health IT Workforce Curriculum Version 1.0/Fall 2010

Know Who Uses Your Computer Utilize user accounts on your computer Don’t log in using the “administrator” account. Tracks who has logged in and some of the things they do while logged in. Require all computer users to have their own user account and password. Don’t set up users as administrators. Set users as Power Users or Users to decrease the chances of them infecting your computer. Component 4/Unit 2 15 Health IT Workforce Curriculum Version 1.0/Fall 2010

Other Internet Security Considerations Never use a public computer to conduct personal business. Use your personal computer with commercial, up-to-date AV software installed. Use strong passwords on all online accounts to prevent others from viewing or stealing your data. Always log out of any session you logged into before leaving the computer. Never open an from an unknown recipient.  Don’t even click it once. Never open or save an attachment unless you know and trust the sender. Component 4/Unit 2 16 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms A Trojan horse is a malware program that usually impersonates a known good file installed on the system by replacing (deleting) the good file. Gets its name from the Greek Trojan Horse myth. The Trojan then does its dirty work on a certain date, through a user action, or on command. Trojans can destroy or copy data, install adware, or install a browser toolbar. Trojans can record keystrokes and send this to the attacker and scan computer ports. Component 4/Unit 2 17 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) A virus is computer program that can harm a computer and make it inoperable. Some viruses are only an annoyance. Viruses usually do not replicate (make copies of) themselves on other computers. Removing the virus usually cleans the computer. Sending a virus via may replicate the virus. In 2008, the Fun.exe virus spread itself via throughout the world and was very difficult to remove as it made many copies of itself on an infected computer. Component 4/Unit 2 18 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) Macro viruses usually infect Microsoft Office files and install themselves when users click files. A macro is a small program, usually written in VBA (Visual Basic for Applications). Macro viruses spread when users click files in which the macro virus resides. Macro viruses may also delete files, etc. on an infected system. Component 4/Unit 2 19 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) A worm is a program that works to create a lot of network traffic. Some worms are not malware as they crawl the network searching for reporting information. Most worms replicate themselves, making the network unusable. The ILOVEYOU worm successfully attacked millions of computers (users clicked the attachment) in May Component 4/Unit 2 20 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) Phishing Phishing is an attempt to trick you into revealing personal information to an attacker so they can impersonate you. Pronounced like the word “fishing,” the attacker is fishing for information about YOU! You may receive an that appears to be from your financial institution, eBay, or Amazon, asking you to login to verify a transaction. Component 4/Unit 2 21 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) When you click the link in the , the Web site looks as you expect it to. No reputable organization will every ask you to do this. Report the attack to your organization so they are aware of the attack. Most companies will act on reported phishing attempts. Most software includes the ability to monitor for phishing and move the suspected e- mail to a non-functional (Junk ) folder. Component 4/Unit 2 22 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) Hoaxes Hoaxes are usually harmless and attempt to convince you of something that is not true. Hoaxes usually come in the form of an . Some hoaxes invite you to send money to someone in another part of the world, others ask you to contribute to find missing children, etc. Use your search engine to determine whether the e- mail’s message is true by entering the subject line in a search engine. The result will usually indicate whether the is a hoax. Component 4/Unit 2 23 Health IT Workforce Curriculum Version 1.0/Fall 2010

Trojans, Viruses, and Worms (cont’d) Uncloak a Hoax Use trusted Internet sites to detect hoaxes. Snopes.com - Urban Legends Online Never forward chains without verifying their source. Component 4/Unit 2 24 Health IT Workforce Curriculum Version 1.0/Fall 2010

Ethical considerations of the Internet Sharing Internet connection with neighbors. Should neighbors have the ability to pool together, lease an Internet connection from an ISP, and pay for shared one connection? Downloading software from the Internet. Should license “key generator” sites be allowed to operate? Should people be able to download pirated software from the Internet? Pirating software is a copyright infringement; selling unauthorized copies of commercial software, usually at a very low price. Component 4/Unit 2 25 Health IT Workforce Curriculum Version 1.0/Fall 2010