140 likes | 337 Views
Sydney Baize Mrs. Shirley Miller BPC110. Personal Computer Security. “To connect your computer to the Internet is to be in danger” - Gralla. PC Revolution. Hackers. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess.
E N D
Sydney Baize Mrs. Shirley Miller BPC110 Personal Computer Security
“To connect your computer to the Internet is to be in danger” -Gralla
Hackers “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess Back Orifice: A computer program that enables a user to control a computer with Microsoft Windows OS from a remote location. Vuze LimeWire
Dangers Hackers can do infinite amounts of damage to a computer once they have control. • Gather info • History • Files • Passwords • Hack other computers
Protection Firewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic.
Spyware • Many types of Spyware • 2 things in common • Spy • Track searches • Record keystrokes • Watch pages visited • Open backdoor • Install without knowledge • Piggyback other software • Be misleading
Dangers • Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable. • Spyware is tricky • When software it piggybacked from is deleted, the Spyware is not • Can be Polymorphic- spawns new copies in other locations when detected
Protection Spyware is most commonly used to make money. • Anti-spyware is a necessity • Special spyware deleting software is sometimes needed as well
Tips Know the dangers of the Web Share as little personal info as possible Don’t look past suspicious behavior Install reputable protection software
Works Cited Gralla, Preston. How Personal & Internet Security Work. Indianapolis: QuePublishing, 2006. Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014 <http://www.microsoft.com/en- us/download/details.aspx?id=29046&utm_source=feedburner &utm_medium=feed&utm_campaign=Feed%3A+MicrosoftD ownloadCenter+%28Microsoft+Download+Center%29#tm>. Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014 <http://support.microsoft.com/kb/49500>. U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999. US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.