Computer Security Presented By : Ebtihal Mohammed AL-Amro.

Slides:



Advertisements
Similar presentations
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
The Internet = A World of Opportunities
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
VIRUSES and DESTRUCTIVE PROGRAMS
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
INTERNET SAFETY FOR KIDS
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Chapter 40 Internet Security.
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Presentation transcript:

Computer Security Presented By : Ebtihal Mohammed AL-Amro

Introduction IIn this presentation I’ll explain to you The Principal Threats that affect on your computer and how can protect our computers from these threats, and how can we deal with it.

Computer Security CComputer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system.

The Principal Threats Hacking 1 Viruses 2 Spam 3 Spyware 4

Hacking ““Illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems”

Hacking Examples Worm worms are programs which reproduce by copying themselves over and over, using up resources and sometimes slowing down the systems Logic Bomb Code which will trigger a particular form of 'attack' when a designated condition is met. For instance, a logic bomb could delete all files on Dec. it does not make copies of itself It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than what it claims to do, usually something malicious Trojan Horse

Viruses SS oftware programs capable of reproducing themselves and usually capable of causing great harm to files or other programs on the same computer.

Spam IIs an unsolicited mail message offering goods or services often with immoral content.

Spyware CComputer programs that gathers and reports information about a computer user without the user's knowledge or consent.

7 Tips to Protect your computer 7 Tips  Use an Internet “firewall”   Keep your operating system up to date   Install and maintain antivirus software   Install and maintain antispyware software  Back up your important files and information  Use hard to guess Password  Think before you click

Use an Internet firewall AA firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network.

Keep your operating system up to date IInstall all security updates as soon as they are available. AAutomatic updates provide the best protection.

Install and maintain antivirus software AAntivirus software can detect and destroy computer viruses before they can cause damage yyou should to keep the antivirus software up to date to be effective Don’t let it expire

Some Antivirus programs

Install and maintain antispyware software UUse antispyware software so unknown people cannot lurk on your computer and potentially steal your information.

Back up your important files and information YYou can use the backup utility in Windows to copy the important files and data on your hard drive and archive it on another hard drive, a disk, a CD, a DVD, or another computer. If your hard drive is erased or damaged, you can easily restore the data from the archived copy.

Use hard to guess Password SS implest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network. VV irtually ineffective if people do not protect their passwords. TT he golden rules, or policies for passwords are: MMake passwords as meaningless as possible CChange passwords regularly DDon’t let any one knows your password

Think before you click DD on’t open attachments unless you know what they contain and who sent them. OO nly download files from websites you trust. AA lways use the red “X” in the corner of a pop-up screen. Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC.

References  Six steps to computer security HP.com  10 tips to computer security By Cheryl Allebrand Bankrate.com  Simple Steps to Protect Your Computer By Rick Hellewell DigitalChoke.com  Internet Security Threats Lexicon By xtra Tiny