IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
eScan Total Security Suite with Cloud Security
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch9. Fundamental Security.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
IT Essentials: PC Hardware and Software v4.0
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
What they are and how to protect against them
Three Things About Malware
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

IT Computer Security JEOPARDY

RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands Viruses Spyware Web Security Web Security Security Security Threats Prevention Removal ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Question A program written with malicious intent. Viruses 100 A: What is a virus?

Question A: What is a worm? A self-replicating program that is harmful to networks Viruses

Question A: What is a Trojan? This is often disguised as useful software. Viruses 300

Question A: What is Consume the Network Bandwidth? Worms are harmful in a network because they do this to network bandwidth. Viruses 400

Question A: What is a Keylogger? A virus that records anything typed into the computer by the keyboard and sends a log to the virus author. Viruses 500

Question A: What is Adware? Displays advertising on the user’s computer. Spyware

Question A: What is Spyware? Monitors activity on the computer. Spyware 200

Question A: What is a Tracking Cookie? A file that may or may not be harmful that tracks user web browsing behaviour Spyware 300

Question A: What is a Shareware/Bundled Software? Installing this type of software is usually how adware is installed on a user’s system. Spyware 400

Question A: What is Grayware or Malware? Unwanted software designed to infiltrate a computer system and send out personal information. Spyware 500

Question A: What are ActiveX, Java, Javascript? Two of the three web tools that attackers use to install a program on a computer Web Security 100

Question A: What are pop-ups? Multiple windows appearing on the screen above your browser window. Web Security 200

Question A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer or website. Web Security 300

Question A: What is the Internet Security Bar? This prompt will appear in IE to prevent unwanted software from being installed by websites. Web Security 400

Question A: What is the Security Tab? This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings. Web Security 500

Question A: What is a Physical Threat? An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc. Security Threats 100

Question A: What is a Data Threat? An event or attack that results in the removal, corruption, or unauthorized access of confidential information. Security Threats 200

Question A: What is an Unstructured Attack? When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network. Security Threats 300

Question A: What is a Structured Attack? When attackers use code to access operating systems and software. Security Threats 400

Question A: What are Internal Threats? Accidental or intentional attacks from company employees. Security Threats 500

Question A: What are No Subject Line, Incomplete return address, Computer general , Return not sent by user? Two common indications of SPAM e- mail that anti-spam software will recognize. Prevention 100

Question A: What is System Restore? This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point. Prevention 200

Question A: What is Spybot’s TeaTimer & SD Helper? When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs. Prevention 300

Question A: What are Operating System and Software Updates and Patches? Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated. Prevention 400

Question A: What is a Pop-up Blocker? This type of software will prevent websites from displaying annoying and unwanted windows. Prevention 500

Question A: What is the Advanced Startup Menu & Safe Mode? Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature.. Removal 100

Question A: What is normal mode? After scanning for a virus in Safe Mode, an additional scan should be run in this mode Removal 200

Question A: What is Two? The number of different spyware scanners you should utilize when removing spyware. Removal 300

Question A: What is Delete or Move to Vault/Quaruntine? This should be done when a virus is detected on your system by your anti- virus program. Removal 400

Question A: What is a boot-time scan? This type of virus scan should be done if you suspect your computer has a startup or boot sector virus. Removal 500

Question A: What are computer starts acting abnormally, program does not respond to mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, program begins sending out large quantities of ? These are three signs that your computer may be infected. Final Jeopardy