Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
CTP FALL Firewalls Filtering Properties Anti-virus Programs.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Keeping Your Computer Safe and Running Efficiently.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Protect Your Computer Against Harmful Attacks!
Information Security Session November 11, 2004
6.6 Firewalls Packet Filter (=filtering router)
HOW DO I KEEP MY COMPUTER SAFE?
G061 - Network Security.
Presentation transcript:

Sydney Baize Mrs. Shirley Miller BPC110

“In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess Send probes See which computers have Back Orifice Controls Uses BO to enter computer and gather whatever information they want Back Orifice: A computer program that enables a user to control a computer with Microsoft Windows OS from a remote location. VuzeLimeWire

Hackers can do infinite amounts of damage to a computer once they have control.  Gather info  History  Files  Passwords  Hack other computers

Firewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic. Examine Check data packets the computer is receiving Search Look to see if packets are being sent to certain ports Block and/or Alert

Block selectively or all packets sent to common hacker used ports Alert user when programs attempt to connect to Internet Block specific IP addresses Keep log of every attempted probe/attack made

 Many types of Spyware  2 things in common 1.Spy ▪ Track searches ▪ Record keystrokes ▪ Watch pages visited ▪ Open backdoor 2.Install without knowledge ▪ Piggyback other software ▪ Be misleading

 Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable.  Spyware is tricky  When software it piggybacked from is deleted, the Spyware is not  Can be Polymorphic- spawns new copies in other locations when detected

Spyware is most commonly used to make money. Anti-spyware is a necessity Special spyware deleting software is sometimes needed as well

Scans Searches system for bits called signatures: signs of obvious infection Compares Compares found signature to ones in its database. If a match is found- there is an infection. Deletes Deletes the spyware once it’s found, may require special program since spyware can often leave traces in more than one place

Looks for suspicious behavior Constantly updates to keep track of latest infections Works in real time: watches for signs of spyware being installed or pages being hijacked

Tips Know the dangers of the Web Share as little personal info as possible Don’t look past suspicious behavior Install reputable protection software

Gralla, Preston. How Personal & Internet Security Work. Indianapolis: Que Publishing, Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview Microsoft Support. List of Antivirus Software Vendors. 20 July U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.