190 likes | 392 Views
Safe computing and Malware. Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander W inans. O verview. Malware Types of Malware. Phishing DoS Attack Identifiers. Safe Web browsing General maintenance . Safe Computing Password creation. Safe computing .
E N D
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans
Overview • Malware • Types of Malware • Phishing • DoS Attack • Identifiers • Safe Web browsing • General maintenance Safe Computing Password creation
Safe computing • Safe: protected from or not exposed to danger or risk; not likely to be harmed or lost. • Computing: the use or operation of computers.
Why should you be safe? Privacy Identity theft Saves you time and money
Bad Habits How many of you use simple passwords like your birthday or nicknames? Never use consecutive numbers or simple patterns for passwords Not locking your computer. Its as simple as hitting windows key + L
Good habits you should start using Get antivirus software Common sense is your friend Strong passwords
Safe Web Browsing Prepare your self for battle! Firewall up You can trust websites that use https: Make sure your using social media correctly Never share your social security number or financial information
Creating a strong password Complex Uses information that is not obvious Try using combining interests to create an idea that is unique Make sure you can remember it Use uppercase and lower case letters, numbers, and symbols Make sure its 8-16 characters long Don’t forget to change your passwords often
General maintenance Defragmentation Windows updates – driver updates Clean hardware
Using antivirus Software designed to detect and destroy computer viruses Use a reputable antivirus software Make sure to update the virus definitions frequently Every 3 to 6 months scan with a different software
Backing up data External storage devices – different types Cloud – reputable sites Benefits
Malware Malware: malicious software designed specifically to damage or disrupt a system.
A Brief History Creeper Worm The Animal Elk Cloner
Types Of Malware Trojan Horse Worm Spyware
Want to Go Phishing? How hackers go phishing Avoiding it
Denial of Service Attack In Computing Perpetrators of DoS attacks Denial-of-service attacks are considered
Modern Use Marketing Stats Steal personal info Gather guarded info Disrupt Operation Zombie Computer
Identifiers Anti-virus Anti-malware and firewalls Safe guard, identify, and protect
Conclusion Safe computing is good Malware is bad Remember to take this presentation and apply it.