1 / 14

Personal Computer Security

Sydney Baize Mrs. Shirley Miller BPC110. Personal Computer Security. “To connect your computer to the Internet is to be in danger” - Gralla. PC Revolution. Hackers. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess.

sabina
Download Presentation

Personal Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sydney Baize Mrs. Shirley Miller BPC110 Personal Computer Security

  2. “To connect your computer to the Internet is to be in danger” -Gralla

  3. PC Revolution

  4. Hackers “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess Back Orifice: A computer program that enables a user to control a computer with Microsoft Windows OS from a remote location. Vuze LimeWire

  5. Dangers Hackers can do infinite amounts of damage to a computer once they have control. • Gather info • History • Files • Passwords • Hack other computers

  6. Protection Firewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic.

  7. Firewalls

  8. Spyware • Many types of Spyware • 2 things in common • Spy • Track searches • Record keystrokes • Watch pages visited • Open backdoor • Install without knowledge • Piggyback other software • Be misleading

  9. Dangers • Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable. • Spyware is tricky • When software it piggybacked from is deleted, the Spyware is not • Can be Polymorphic- spawns new copies in other locations when detected

  10. Protection Spyware is most commonly used to make money. • Anti-spyware is a necessity • Special spyware deleting software is sometimes needed as well

  11. Anti-Spyware

  12. Anti-Spyware

  13. Tips Know the dangers of the Web Share as little personal info as possible Don’t look past suspicious behavior Install reputable protection software

  14. Works Cited Gralla, Preston. How Personal & Internet Security Work. Indianapolis: QuePublishing, 2006. Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014 <http://www.microsoft.com/en- us/download/details.aspx?id=29046&utm_source=feedburner &utm_medium=feed&utm_campaign=Feed%3A+MicrosoftD ownloadCenter+%28Microsoft+Download+Center%29#tm>. Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014 <http://support.microsoft.com/kb/49500>. U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999. US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.

More Related