WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
SECURITY CHECK Protecting Your System and Yourself Source:
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Nasca Internet Networking and Security viruses.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Computer Viruses A guide to virus protection,detection, and removal for the average computer user.
Security Advice Georgie Pepper Campsmount Acadamy.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Chapter 1: Explore the Network
Business Technology Applications What is Malware.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Safe’n’Sec complex solutions for home PCs protection.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Network System Security - Task 2. Russell Johnston.
Managing Windows Security
3.6 Fundamentals of cyber security
Cyber Security By: Pratik Gandhi.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Security.
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE

DISCUSSION ACTIVITY (5 MINUTES) How do you use the internet at home and how do you secure cyberspace? How do you secure yourself against biological viruses?

WHAT IS CYBER SPACE? WHY IS IT IMPORTANT? Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel, power our homes, run our economy, and provide government services.

WHAT TYPE OF THREATS EXIST? Intrusions into information through attacks: Social networking sites s Browsing the web Send malicious software: Viruses and worms Trojans and spyware Logic and time bombs

HOW DO YOU SECURE CYBERSPACE? Engineers and scientists design programs to protect communication and computer networks They analyze available data to create better prevention programs and design solutions.

COMPUTER VIRUS Infects files from visiting places online Spreads throughout computers using an infected file’s resources Detected when making unusual computer actions Removed by deleting all infected files

ACTIVITY (25 MINUTES) Explore the web to get a better understanding of computer and biological viruses. Compare the behavior listing the similarities and differences between the two. Some good resources: microscopic/virus-human.htm microscopic/virus-human.htm

COMPARISON…. Biological Can infect animals, plants, and other microorganisms They reproduce very quickly, but only in living hosts Vaccines can protect individuals from being infected Computer Can infect devices that are capable of being connected to the internet or network They reproduce very quickly, but only if the file is run or opened. Antivirus programs can prevent virus code from running.

SUMMARY SLIDE Cyberspace refers to the collection of information that is assessable on the web. Several types of threats exist, usually resulting from some malicious type of software. Engineers and Scientists secure cyberspace by monitoring network access, and designing programs that protect sensitive data or computers. These concepts can be related to biology by looking at how biological viruses attack the body. Viruses (both computer and biological) can affect the host and use it for its own function. Vaccines and Antivirus Software prevent viruses from spreading to more people and computers.