250 likes | 349 Views
Internet Security. How to be “Reasonably Safe” on the Internet. The following slides are an explanation of the terminology used in the antivirus and antimalware definitions. Virus. A computer virus is a computer program that can replicate itself and spread from one computer to another.
E N D
Internet Security How to be “Reasonably Safe” on the Internet
The following slides are an explanation of the terminology used in the antivirus and antimalware definitions
Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another.
Worms • A computer worm is a self-replicating malwarecomputer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
Trojan • A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.
Keylogger • Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
Adware • Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.
Spam • Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
Root Kit A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications.
What can you do about all of these • 1. Have a good anti-virus with currently updated virus signatures and scan regularly. • 2. Have several spyware removal programs and scan frequently. • 3. Have a good firewall (either hardware or software preferably both).
Online Virus Scanners • House Call(housecall.trendmicro.com) • Bitdefender(www.bitdefender.com/scanner/online) • Kaspersky (www.kaspersky.com/virusscanner) • Symantec (security.symantec.com) • Eset (eset.com/us/online-scanner) • McAfee (home.mcafee.com/Downloads/FreeScan.aspx) • Also there are others
Antivirus Programs • Avg • Avast • Microsoft Security Essentials • Symantec Antivirus • McAfee Antivirus • Kaspersky Antivirus • And many others
Free versus Paid Programs • All free programs offer fairly good protection • Paid versions offer more protection
Free Antivirus Programs • Protection is very basic • Do not have the in-depth scanning as the paid ones • Do not have as many active scanning modules • Malware protection very basic
Paid Antivirus • More robust antivirus scanning • More active scanning modules • More antimalware scanning prevention • In general are more protective than the free versions
Antimalware Programs • Malwarebytes Antimalware • Super antispyware • Spyware blaster • BoClean • Emsisoft Antimalware • And some others
Antimalware Programs Free vs Paid • Free versions usually have to be updated and scanned manually. • Paid versions have automatic updating, scanning on schedule, and finally have active scanning modules running.
Internet Searching • Programs are available to keep you reasonably safe doing a search on the internet. • Remember that nothing is ever really safe on the Internet.
Internet Site Scanners • Safe Search (Google) • Site Advisor (McAfee) • WOT (MyWot) • Link Scanner (AVG) • And Others
Firewalls • Symantec • McAfee • Zone alarm • Kaspersky • Trend Micro • Windows
Firewall Recommendation • You can use the built-in Windows firewall • You can use free or paid firewalls • You can use only one firewall at a time • You can use a hardware firewall such as a router.
Summing Up • You can have all of the best Internet Security that is available but all of that is useless if the following is in place