Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Applications I

Similar presentations


Presentation on theme: "Computer Applications I"— Presentation transcript:

1 Computer Applications I
Period ______Student ________________________ Competency 1 – Discuss business communication hazards, techniques, system maintenance and navigation. Objective Identify digital communication hazards. 1.01

2 1. What is spyware? A category of computer programs that attach themselves to the computer’s operating system Drains the life out of your computer's processing power. Designed to track users’ Internet habits and nag them with unwanted sales offers or generate traffic for the host Web site.

3 2. What is browser hijacking?
An external code that changes your IE settings. Generally the home page will be changed and new favorites will be added. This may also disallow access to certain web pages, for example the site of an anti-spyware software manufacturer like Lavasoft. These programs can also disable antivirus and anti-spyware software.

4 Characteristics of browser hijackers
They take advantage of IE’s ability to run ActiveX scripts straight from a web page. Generally, they request permission to install themselves through a popup that loads when visiting a certain site. Use security holes within IE to install themselves automatically without any user interaction. These can be launched from popup ad windows which the user has not even intended to view. Make entries to the HOSTS file on your system. This special file directly maps web URLs to IP addresses, so that every time you type a URL you are redirected to the IP address of a sponsored search or perhaps an inappropriate site.

5 Browser hijacking isn't necessarily a virus, and isn't necessarily adware, so stopping it isn't necessarily best left to software monitoring programs.

6 3. Antivirus software Antivirus programs learn and memorize all of the different replicating viral signatures that are already out there (40,000 to date), and then compare the binary signatures of incoming files against those already-known viral signatures to see if anything suspect is lurking on your computer.

7 Antivirus software The software typically is kept running in the background to check files and messages as they are downloaded. A virus signature is a section of code that can be used to identify a known virus.

8 Virus protection Install antivirus software and keep it running.
Before downloading, make sure source is reputable. When you receive a disk, scan it with antivirus software before use. Never open an attachment unless the sender is known. Watch for information about the latest virus threats and keep your antivirus program up-to-date.

9 Purchasing guidelines
Purchase a software that provides free weekly updates. provides the coverage necessary to maintain the computer’s security. Dependable brands: Symantec Norton McAfee

10 4. Firewalls A firewall is either a piece of hardware or a software program that examines data as it passes into your computer or network and discards it if it does not meet certain criteria. This operation may take place at different points in the path between the source of the data and the application in your computer.

11

12 Packet filtering firewalls
Packet filtering firewalls work by examining data packets as they attempt to pass through the firewall. They compare them to a list of rules based on the source of the data, its intended destination, and the connection port between the target and source data.

13 Circuit level gateway firewall
This gateway is a firewall that only allows data into its protected network based on requests from computers inside that network. The firewall keeps a record of requests for data that go out, and only allows data back in that matches that request. An advantage of this type of firewall is that anyone scanning the network from outside will see only the address of the firewall and not the rest of its protected network.

14 Application level gateway firewall
Application level gateways, or proxies, are similar in operation to circuit level gateways in that they act as the only entrance into or out of a protected network and deny non-requested data from outside. The major difference is in the way they handle information. A firewall using this method runs proxy applications to view common types of data before it is allowed through the firewall. (Proxy--A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.—

15 Stateful inspection firewall
Stateful inspection is a combination of packet filtering with some elements of the gateway methods. Essentially, it is a packet filter firewall that examines more than just the addresses and port information of the data. Without using proxies, it can imitate some of the features of an application gateway by viewing the application-specific data sent in each packet.

16 6. What is a secure website?
A secure website is one that uses data encryption to protect all information.

17 How can you tell a site is secure?
There are three ways to confirm that a website is secure: Click the VeriSign icon to verify that the certificate is valid. A secure page should include a small padlock symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an https: prefix rather than the standard http: prefix. The s means that the page is secure.

18 7. Identify Theft Any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person. It intrudes into many areas of people’s daily lives.

19 Types of identity theft
Financial fraud - includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. Criminal activities - involves taking on someone else's identity in order to commit a crime, enter a country, obtain special permits, hide one's own identity, or commit acts of terrorism. Credit card fraud is identity theft in its most simple and common form. It can be accomplished either by a thief who steals your account number or when your pre-approved credit card offers fall into the wrong hands.

20 Examples of identity theft
Dumpster diving - Dug out of trash cans and dumpsters Memorization or copying by sales clerks and waiters Removal from mailboxes: tax notices, financial statements, and other bills Removal from your employer's files, secretly or with an inside accomplice Removal from hospital records, usually with an inside accomplice Removal from your financial lender's files Removal from your landlord's files Purchases (or found free) from online or offline databases Collection from "cloned" Web sites – (someone recreates a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order) Stealing from a merchant database through computer hacking Snatching by using software that mirrors keystrokes to capture credit card account information or passwords

21 Ways to protect yourself
DON'T give out your Social Security number unless it’s critical. DESTROY any unwanted credit card offers. ONLY include your name and address on checks. SHRED (cross-cut) any sensitive documents before discarding. DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse. REVIEW your credit report annually to verify its accuracy. NEVER give out personal information on the phone to someone you don't know and who initiated the call. REVIEW your credit card statement each month to make sure there are no unauthorized charges. DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box. If you're ever denied credit, FIND OUT WHY. REACT QUICKLY if a creditor calls about charges you didn't make. GUARD deposit slips as closely as you do checks.

22 8. What is Netiquette? "Netiquette" is network etiquette, the do's and don'ts of online communication. It includes both common courtesy online and the informal "rules of the road" of cyberspace. In other words, Netiquette is a set of rules for behaving properly online.

23 Core Rules of Netiquette
Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes


Download ppt "Computer Applications I"

Similar presentations


Ads by Google