Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network problems Last week, we talked about 3 disadvantages of networks. What are they?

Similar presentations


Presentation on theme: "Network problems Last week, we talked about 3 disadvantages of networks. What are they?"— Presentation transcript:

1 Network problems Last week, we talked about 3 disadvantages of networks. What are they?

2 Why Not Use Networks? The computer is vulnerable to hackers If the network breaks, many tasks become very difficult Your computer can more easily be attacked by a virus

3 Network security Why would someone want to attack your computer?

4 Why? To access your data To use your computer to attack other computers

5 Accessing your data What details could be stolen from you? For what purpose could they be used?

6 Spyware Collects personal data Collects internet usage history Often used for unwanted advertising

7 Unwanted advertising!

8 Fraud Using your personal data to steal money! Credit card details targetted.

9 Botnet

10 Storm Botnet Estimated: between 200,000 and 1,000,000 computers infected Estimated 8% of all malware on Windows Used for spam email Used to attack international banks

11 Kraken Botnet About 400,000 computers infected 50 Fourtune 500 companies infected Sends about 9,000,000,000 spam email messages/day

12 Srizbi Botnet Roughly 400,000 infected computers Estimated 60,000,000,000 spam emails sent/day Nov 2008 – controlling network taken offline –Global spam email decreased 75%

13 How is a computer attacked? What do you know?

14 How is a computer attacked? Port scanning Phishing Trojan

15 Port Scanning This is an active attack A hacker runs a program to find vulnerable spots in the network The hacker can then run another program to access your computer

16 Port Scanning

17 Port scanning protection Firewall Updates

18 Firewall A program that checks incoming data If it is not from a trusted source, the data is blocked

19 Updates The hacker must find a vulnerable program When a vulnerability is found, the company will patch the software The patch fixes the vulnerability The hacker can’t attack in that way

20 Phishing An attack through email or IM A fake link that takes you to a dangerous website The website can then run a dangerous program, or collect your information

21 Phishing Email

22 Phishing – How to identify

23 Phishing – how to prevent it Read emails and IM’s carefully Be suspicious of links Run ONE anti-virus program

24 Trojan A program that says it will do something, but does something else.

25 Sources of trojans Email attachments A downloaded program (.exe files, like cracks or keygens) Dangerous programs on the internet

26 Trojans – how to prevent! Don’t run a program you don’t trust Scan suspicious files with an anti-virus tool Run Windows as a user, not as administrator

27 If you have a virus Run ONE anti-virus program Run anti-spyware and/or anti-adware scans Update all programs!

28 Homework exercise Remember, there will be a quiz next week very similar to this exercise. If you have questions, ask!

29 Homework exercise Imagine you are the class teacher for your class. You must create a database of your students. Create a table in design view containing the fields you think are important. Remember to choose a primary key. Add data to the database. You can invent the data, it does not have to be true. Fill in 3 records.


Download ppt "Network problems Last week, we talked about 3 disadvantages of networks. What are they?"

Similar presentations


Ads by Google