1 / 24

Internet Safety

Internet Safety. CSC 101 1.0 October 7, 2010. Internet Threats. Malware (viruses) Spyware Spam Hackers Cyber-criminals. Malware. Malicious Software. Types of Malware. Virus Worm Trojan Horse. Viruses.

nicoleduke
Download Presentation

Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Safety CSC 101 1.0 October 7, 2010

  2. Internet Threats • Malware (viruses) • Spyware • Spam • Hackers • Cyber-criminals

  3. Malware Malicious Software

  4. Types of Malware • Virus • Worm • Trojan Horse

  5. Viruses • Virus: A program that attaches itself to another program and spreads itself to other computers • Viruses are hidden within the code of a host program • Replicate themselves • Slow down networks • Secondary objectives • Display annoying messages • Delete files on the hard drive • Change computer settings • Need human action to spread

  6. How Computers Catch a Virus • Viruses copy themselves and infect a file on your computer • Spread by • Sharing disks or flash drives • Opening an e-mail attachment • Downloading infected audio or video files

  7. Worms • Infect computer networks • Copy themselves over the network • Slow down network traffic • Do not need human action to spread

  8. Trojan Horse • Looks like something else • Screen saver • Game • Malicious code hidden inside • Cannot spread by itself • Commonly opens up a back door to your computer

  9. Spyware • Piggybacks on another program • May or may not be malicious • Records web sites visited • Key logger • Adware • Downloads or displays ads

  10. Spam • SPAM: Unwanted or junk e-mail • To avoid SPAM • Create free Web-based e-mail account for filling out online forms or making online purchases • Use a spam filter • Do not try to “unsubscribe” from spam e-mails • Use an e-mail forwarding service • SPIM: Unsolicited instant messages

  11. Hackers • Anyone who unlawfully accesses a computer system • Types of hackers • White hat • Black hat • Gray hat • Script kiddies • May work for computer criminals

  12. What Hackers Steal • Hackers try to steal data stored on hard drives: • Credit card numbers • Bank account numbers • Also can steal information through packet sniffing • Use information to commit identity theft

  13. Cyber Crime Criminal acts conducted by cybercriminals through the use of computers

  14. Types of Cyber Crimes • Fraud-related (58 percent of cybercrime) • Auction fraud • Identity theft • Credit and debit card fraud • Non-fraud-related • Computer intrusions • Unsolicited e-mail • Child pornography / child exploitation • Extortion

  15. Social Engineering • Uses social skills to generate human interaction to entice individuals to reveal sensitive information • Usually does not use a computer or face-to-face interaction • Pretexting • Kevin Mitnick

  16. Phishing & Pharming • Phishing • Uses e-mail to lure user to fake Web sites • Tricks user into revealing private data • Pharming • Malicious code changes Web browser’s ability to find Web addresses • Bogus web sites spoofing real sites

  17. Botnets • Zombie computers • Backdoor access • Tended by bot herders • May contain millions of computers • Used by criminal gangs for: • Spam • DOS & DDOS

  18. Computer Protection • Anti-virus program • Firewalls • Passwords • Back ups

  19. Anti-virus Programs • Programs designed to detect viruses • Scan files looking for virus signatures (unique code) • Provide options for deleting or fixing infected files • Inoculate files against further infection • Needs to be updated frequently • Good guys always one step behind • Rogue security software

  20. Good Passwords • Create a strong password • At least 14 characters, including numbers, symbols, and upper- and lowercase letters • Not a single word or a word from a dictionary • Not easily associated with you (birthday, name of pet, nickname) • Use different passwords for different sites • Do not tell anyone or write down password • Change password regularly (every month)

  21. Firewalls Software programs or hardware designed to close computers to invaders A software firewall is built into Windows Other software firewalls are available from vendors Network routers can contain a hardware firewall Firewalls are critical if you have an always-on broadband connection Test your computer’s vulnerability

  22. Data Back-up • Backup • A copy of a file that can be used to replace the original • Types of files to back up • Program • Data • Backup routine • Frequency • Changed files

  23. Data Back-up • Software programs for easy backup • Schedule automatic backups • Can back up files, folders, or entire drives • Back up to USB device, CD, or DVD • Entire system backup software • Takes an image of the entire system • Stores on a separate hard drive • In case of failure, a new drive is inserted

  24. Data Back-up • Store backups offsite • Online backups • Store backup files on Internet servers • Fees for the service • Hardware can be replaced, data cannot

More Related