Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
CONTENTS What is Virus ? Types of computer viruses.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Computer virus Done: Aaesha Mohammed ID: H
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to identify and address these threats. Several of the most common are described below as well as links to websites with more in-depth information.

Adware is commercial software that delivers targeted advertising to users computers without consent. This software may track usage or surfing habits to ensure the advertisements are appropriately targeted for different users. Computers with adware may have a slow boot time or internet response, frequent system program crashes and/or a changed home page. Adware is sometimes offered in exchange for free services, such as music downloads. Cyber(smart:) Cyber(smart:)

An abbreviation for malicious software, malware is a piece of software that can be unintentionally downloaded and installed without users knowledge. Once operational, it can infect a computer with viruses, steal personal information and use the computer to send spam and commit fraud. Cyber(smart:)

The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e- mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the users information. (Webopedia)Webopedia

The information gathered from adware, malware and spyware can be used for targeted scams or identity fraud. Cyber(smart:)Cyber(smart:)

Spyware software is sometimes unintentionally downloaded from the internet with legitimate program downloads. It will install itself in the background, often without users knowledge, and is designed to monitor users surfing habits. Spyware distributors may pass the information gathered to third parties who may use it to target advertising for products or services or it can be used in targeted online scams or identity fraud. The following signs may indicate that spyware is on a computer: the web browser opens on a different homepage the computer is slower than normal random error messages appear new toolbars and icons have been installed. Cyber(smart:)

A trojan is a type of malware disguised as a useful piece of software that really has a malicious intent; for example, it may present as a free screensaver or game. Trojans are used to gain unauthorised access to the computer. For example, a trojan infection can result in the logging of key strokes on a keyboard and can record usernames, passwords and sensitive personal information that is sent back to the controller. Cyber(smart:) Cyber(smart:)

A virus is a piece of computer code that may be introduced to a computer by an insecure internet connection, an infected website, a device plugged into the computer, or an or downloaded file, without the knowledge of the user. The purpose of a virus is to corrupt the computer system or destroy data. Computer viruses can be hidden in documents or files and transmitted as attachments, embedded in computer games, video clips or photos. The most common symptoms that a computer has been infected by a virus include: files and data have been deleted the computer takes longer to load programs or applications the computer takes longer to boot, continually restarts or does not start at all items and images on the screen are distorted and unusual images and text appear excessive network activity (lights blinking excessively on modem) the web browser opens on a different homepage internet pages are slow to load the hard disk may be inaccessible or appear to be working harder than normal disk space and filenames change frequent system or program crashes. This is not an exhaustive list and these symptoms may occur for reasons other than a virus infection. Seek advice from a computer professional if you suspect your computer may have become infected by a virus. Microsoft Security Anti-Virus products Cyber(smart:) Cyber(smart:)

A worm is a self-replicating program that can spread without user intervention. Worms are designed to further infect computers with other types of malicious software, such as programs that send spam. A worm can spread by sending itself to all the contacts in an program's address book, or via a security flaw in a program or in the computers operating system. Cyber(smart:) Cyber(smart:)