Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
The Internet = A World of Opportunities
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Viruses & Destructive Programs
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Data Security.
Protecting Your Computer & Your Information
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Viruses.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
links and attachments: Help stop malware from spreading
3.6 Fundamentals of cyber security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Lions? And Tigers? And Bears? Oh my!

In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the yellow brick road. As we travel through the internet we might be saying “Malware, and Spyware and Viruses…Oh, my! Let’s take a look at these and try to make ourselves aware of any dangers …

Malware Malware is short for malicious software. It is software specifically created to destroy, or damage your computer. Malware is often a catch all term which is used to describe Spyware and Viruses as well.

Spyware Spyware are programs installed without your consent and they monitor and control your computer. It may be used to send you unwanted ads, monitor your internet surfing, and/or record your keystrokes (which could lead to identify theft).

Viruses Viruses are programs that copy themselves onto your computer without your permission. Surely, your mom has said when you are sick, “I think you caught a bug.” Viruses are bugs for your computer that are extremely hard to get rid of. Just like you can catch and spread a virus you can catch and spread, computer viruses in much the same way! They can be spread from computer to computer!

Types of Viruses Trojan Horse – this virus usually comes to the user disguised as a good program or application but in reality once it is installed it starts to infecting files on your computer. Worm --The biggest danger with a worm is its ability to copy itself on your system. Worms are able to multiply, and instead of sending out a single one, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.

Some Do’s and Don’ts Don’t open attachments or click on links in an unless you are really sure of the person who sent it to you. Don’t download programs or install software unless you know and trust that website. Do talk with your siblings and parents and let them know that it is risky to click on pop-up ads or download “free” games (which might have a virus.)

Is your computer infected? Things to look for: Is your computer running slower than usual? Are there error messages displayed repeatedly? Do you have trouble shutting your computer down? Are you plagued by pop-up ads? Are web pages being displayed you didn’t intend to use or s being sent that you didn’t write?

What to do? You could hire a private eye to keep you safe and secure but that would be very costly. There are programs out there that can detect if you have Spyware or viruses. However you may have to get professional help if you have exhausted all the free options. Be careful some Anti-Spyware is Malware in disguise…find a legitimate distributor of these products.

Malware, Spyware and Viruses… Oh My!

Be very careful… the malicious code writers are hard at work thinking up new ways to get Malware on to your computer!

Additional Information Using you skills in searching the internet find at least 3 sites that explain more about Malware, Spyware and Viruses. Keep track of those sites you will be using them in your upcoming assignments.

Assignments Please refer to the Malware Wiki Assignments page for directions. You have 3 different assignments. As always please contact me if you need further directions.