Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Internet Security
can spread to other computers
used to steal information, harm host computers/networks, create botnets, steal money, render advertisements, etc. Trojan Horse also known as a "trojan"
disguises itself as normal file
trick users into downloading and installing
possible to steal data (logins, financial data, electronic money)
install more malware, modify files, monitor activity(keylogging) Rootkit designed to remotely access or control a computer w/o being detected
can remotely execute files, access/steal information, modify system configurations, alter software, install concealed malware
difficult to remove, detect, and prevent since it hides presence
detection by manual monitoring, scanning, analysis
patching software vulnerabilities, updating software, and avoiding suspicious files are the best ways to avoid Adware "advertising-supported software"
automatically delivers advertisements
sponsored by advertisers, a revenue generating tool
Warning: some adware is bundled with spyware that can keylog and steal information; this combination is significantly more dangerous than the adware alone Spyware functions by spying on user activity
include activity monitoring and collecting keystrokes, account information, logins, financial data, etc.
spreads by exploiting software vulnerable, bundling itself with legitimate software or in trojans Backdoor Method of bypassing normal authentication procedures
a compromised system can have a backdoor installed for easier access in the future
a trojan or worm can be used to install a backdoor Worms among the most common malware
spread by exploiting OS vulnerabilities
cause harm by consuming bandwidth and overloading web servers
distinguished from viruses since they can self-replicate and spread independently
can be spread via mass emails with the worm attached Symptoms of Malware Malware Prevention and Removal Following these recommendations will greatly increase a user's protection from a wide range of malware:
installing anti-malware and firewall software
keeping software and os up to date with the latest patches
always be careful when downloading files, programs, attachments, etc.
Common Email Scams Phishing: a email which asks a victim to click a link and visit a website in order to provide personal information.
Nigerian Scam: asks for help to access money in a foreign bank account, and promises a percentage of the cash for services. http://www.hoax-slayer.com/common-internet-scams.html Be careful of emails which:
1) Promise a reward
2) Ask for donations
3) Propose business deals
4) Ask for sensitive personal information
5) Ask follow a link to log on to an account How to identify if an email message is a scam How to stay Secure online Keeping your computer safe What is Malware? Malware stands for Malicious Software, which are software specifically designed to attack a computer Viruses
Trojan Horses (Trojans)
Worms Types of Malware There are many common types of Malware, which includes the following: Malware differ in the way they spread and infect computers, but always produces similar symptoms, such as
increased CPU usage
slow computer or web browsing speeds
Problems connecting to networks
Freezing or crashing
Modified or deleted files
Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)
Thank you! Stay Safe~