Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
The Internet = A World of Opportunities
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Protecting Students on the School Computer Network Enfield High School.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Small Business Security Keith Slagle April 24, 2007.
What is Spam? d min.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
COMPUTER MALWARE. Malware is a general term for any type of unwanted software that does mischief or permanent damage to your computer. Malware is created.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network System Security - Task 2. Russell Johnston.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Introduction-Cyber Safety
Presentation transcript:

Detrick Robinson & Amris Treadwell

 Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet worm › Virus › Spyware › Spam Detrick Robinson & Amris Treadwell

 Internet Worm-is a program that replicates itself so many times that it causes the internet server to crash.  The internet worm was the very first successful virus that was able to shutdown computers all over the world. Detrick Robinson & Amris Treadwell

 Spyware- is software that obtains information from a user's computer without the user's knowing. Examples: › Parasite Ware -is a way for webmaster to sell products and help fund websites by overwriting tracking links. › Adware –is a program that can do a number of things like sending pop-ups and annoying ads while surfing on the web. › Malware – is a virus setup to disrupt the computer system. A Trojan horse popping up can be classified as malware. › Page hijackers- is an application that is used to control the home page on your computer and reset it to the hijackers choice. Detrick Robinson & Amris Treadwell

 Spam-is the abuse of sending unwanted bulk messages. › Unsolicited Bulk - is mail sent to many different recipients that don’t ask for them. › Unsolicited Commercial - is some what the same as UBE. Organizations have found a way to send information regarding their company to your even though you don’t want it and have blocked it. › Mail Bombing- is when people receive a huge amount of messages in their inbox just to overload their . › Flaming- is sent with offensive content. Detrick Robinson & Amris Treadwell

 Computer safety is the technological precautions that you practice on your computer system to ensure the availability, integrity and confidentiality of information.  Examples: › Window Defender › Firewall › Activate Window Update › Firefox Detrick Robinson & Amris Treadwell

 Windows Defender-is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware. It detects the infects and removes them. › The benefits of having Window Defender:  Spyware detection and removal- Window Defender is able to point out different viruses that are caused by spyware and removes them.  Improved Internet browsing safety- Window Defender works in the background by removing spam and spyware while you browse different internet sites. Once you go to a site that is full of spam, Window Defender points it out and removes it.  Protection against the latest threats- Window defender was set up by Microsoft to make it so that your computer could be protected from the latest threats by giving your computer a update automatically. Detrick Robinson & Amris Treadwell

 Firewall- Forms a barrier of protection from the spread of viruses throughout your computers. › Different Types of Firewall  Packet filtering firewall- This type of firewall has security rules which can block IP protocol, IP address and/or port number.  Deep Packet Inspection firewall- examines the data in the packet, and can therefore look at application layer attacks.  Application-aware firewall- this type of firewall understands certain protocols and can parse them, so that signatures or rules can specifically address certain fields in the protocol.  Application proxy firewall- An application proxy acts as an intermediary for certain application traffic (such as HTTP, or web, traffic), intercepting all requests and validating them before passing them along. Detrick Robinson & Amris Treadwell

Firefox-is an internet browser that eliminates viruses and enables you to surf the web at the same time. Detrick Robinson & Amris Treadwell

Window Update- uses active control and scripting to determine which updates to apply to your computer without you getting a viruses. Detrick Robinson & Amris Treadwell

 When using a public computer, shut it completely down after it’s use. › Public computers are the main way internet hijackers can steal your information. By shutting down your computer after you use it, you will delete your information that was entered. Detrick Robinson & Amris Treadwell

 Never leave your login information up at anytime. › Always log out of the site when you re finish using the computer. Many websites have automatic login features that will save your information. Detrick Robinson & Amris Treadwell

 Erase your tracks › Make sure you delete your history after you use a public computer. Internet Explore has software that can keep a record of the information you enter even after you logout. Detrick Robinson & Amris Treadwell

 Make sure you watch who is around you went logon the computer. › When using the public computer always watch for thieves standing behind, while you enter your personal information. Detrick Robinson & Amris Treadwell

 Never type personal information into a public computer. › Avoid typing your credit card number and any other financial information into a public computer. Internet hijackers can install software on public computers that can record your information and send it back to them. Detrick Robinson & Amris Treadwell

 Anti-Virus Programs › Always make sure your computer has anti- virus programs. This enables your computer to be free from different viruses that may destroy your computer and make it crash. Detrick Robinson & Amris Treadwell

 Data Backups › When using your personal computer, you should have data backups. This ensures that when problems with your arises, your information will be saved. Detrick Robinson & Amris Treadwell

 Strong Passwords › When setting up your different accounts, make sure you use only strong passwords. Using your birthday, child's name, or your cats name is not a good password. You should use a strong password that no one will think of, therefore no one will be able to get in to your accounts. Detrick Robinson & Amris Treadwell

 Attachments › Be very careful when accepting different attachments from people. attachments can be used by hackers to get into your computer system and steal your information. When receiving attachments, make sure you know who it is from before you open it. Detrick Robinson & Amris Treadwell

 Downloading and Installation › Downloading and Installing any kind of program to your computer is the easiest way for computer hackers to receive your information. Make sure you check the program before you download it. Detrick Robinson & Amris Treadwell

 Active window defender: mspx mspx  Computer protection:  Computer Protection at home: 2protect.pdf.com 2protect.pdf.com  Computer Safety tips:  Different types of spam:  Different types of spyware: types-of-spyware types-of-spyware  Different Types of viruses: Detrick Robinson & Amris Treadwell

 FireFox Protection:  FireWall Protection:  Safety tips:  Safety Tips at Home:  Spyware protection: spyware.mspx spyware.mspx  Tips: do-to-protect-your-computer.pdfhttp:// do-to-protect-your-computer.pdf  Windows Update: us us Detrick Robinson & Amris Treadwell