Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.

Similar presentations


Presentation on theme: "INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT."— Presentation transcript:

1 INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

2 WHY IS PROTECTING YOUR COMPUTER IMPORTANT? When we use the internet, information is shared and sometimes the shared information could be personal information like bank account numbers and credit card numbers. Without the use of Internet security, the information you share is exposed to hackers to access, view, and steal your information. There are other threats that you can become susceptible of like viruses, worms, Trojan Horses and E-mail viruses.

3 VIRUSES A computer virus is a program that infects your computer and multiplies. A computer virus is a program that infects your computer and multiplies. Once a computer or program is infected, the reproduction of the virus can continue to infect other programs and even other people’s computers if information is shared between multiple users. Once a computer or program is infected, the reproduction of the virus can continue to infect other programs and even other people’s computers if information is shared between multiple users. When a computer virus spreads it does so after the initial attack and continues to be spread through common use of the computer or program. When a computer virus spreads it does so after the initial attack and continues to be spread through common use of the computer or program.

4 Computer viruses have their own distinctive methods of causing harm. Computer viruses have their own distinctive methods of causing harm. Some have an attack phase, otherwise known as a “payload”. A payload is a damaging effect of the virus that causes damage by deleting files or randomly changing data. Some have an attack phase, otherwise known as a “payload”. A payload is a damaging effect of the virus that causes damage by deleting files or randomly changing data. Other viruses may take some time to cause permanent damage to your computer. Other viruses may take some time to cause permanent damage to your computer.

5 WORMS Worms are similar to viruses. They spread from computer to computer but unlike viruses there is no need for human assistance for the worm to travel. Worms are similar to viruses. They spread from computer to computer but unlike viruses there is no need for human assistance for the worm to travel. Worms have to ability to copy itself multiple times Worms have to ability to copy itself multiple times Once a worm replicates itself it can access your address book and send its copies to everyone in your address book. This cycle will keep repeating. Once a worm replicates itself it can access your address book and send its copies to everyone in your address book. This cycle will keep repeating. Worms will eventually take up too much system memory and cause the computer to crash and damaging the computer as well. Worms will eventually take up too much system memory and cause the computer to crash and damaging the computer as well.

6 TROJAN HORSES Unlike worms and viruses, Trojan horses do not replicate. Unlike worms and viruses, Trojan horses do not replicate. Trojan horses disguise themselves as a harmless document or file and trick you into thinking that theses programs will help your computer. Trojan horses disguise themselves as a harmless document or file and trick you into thinking that theses programs will help your computer. Trojans are mostly used by cybercriminals to access your files or to just damage your computer. Trojans are mostly used by cybercriminals to access your files or to just damage your computer. Trojans can even use something called a key logger which tracks what kind of text field you are using and what content you are entering. Usernames and passwords can be stolen using this method. Trojans can even use something called a key logger which tracks what kind of text field you are using and what content you are entering. Usernames and passwords can be stolen using this method.

7 E-MAIL WORMS An e-mail worm is a form of malware that appears to be harmless, but when the user opens an e-mail it activates. An e-mail worm is a form of malware that appears to be harmless, but when the user opens an e-mail it activates. These worms can infect one’s e-mail account and automatically send e-mails with a copy of the worm to anyone in your address book. These worms can infect one’s e-mail account and automatically send e-mails with a copy of the worm to anyone in your address book. Once the e-mail is opened the user will need to click on a link or attachment to get the worm. Once the e-mail is opened the user will need to click on a link or attachment to get the worm. The worm can then cause damage to your computer. The worm can then cause damage to your computer.

8 HOW TO PROTECT YOURSELF The best way to protect yourself from these dangers is to use specially designed software to guard against malware. The best way to protect yourself from these dangers is to use specially designed software to guard against malware. Anti-malware software is used to warn the user of potential threats and to prevent these threats from damaging your computer. Anti-malware software is used to warn the user of potential threats and to prevent these threats from damaging your computer. Using a Firewall is a effective method of protecting your computer. Using a Firewall is a effective method of protecting your computer. A firewall monitors all incoming and outgoing communication preventing harmful programs from getting onto your system. A firewall monitors all incoming and outgoing communication preventing harmful programs from getting onto your system.

9 Anti-virus programs is a very useful tool to protect your computer. Anti-virus programs is a very useful tool to protect your computer. Anti-virus programs scan your computer for anything that can damage your system. Anti-virus programs scan your computer for anything that can damage your system. When a threat is found the program will give you the option to either ignore the threat, remove the threat, or contain the threat. When a threat is found the program will give you the option to either ignore the threat, remove the threat, or contain the threat. Norton and McAfee are very popular anti-virus software. Norton and McAfee are very popular anti-virus software. ESET Smart security is not as popular but is more effective then most anti-virus software. ESET Smart security is not as popular but is more effective then most anti-virus software.


Download ppt "INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT."

Similar presentations


Ads by Google