Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Internet Security

No description
by

Daniel Ho

on 1 March 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Security

Internet Security Scams, Frauds, and Malware Presented by Daniel Ho How secure online are you? "Nearly three quarters, 73 percent, of all Americans have fallen victim to some type of cyber crime" http://www.cybercrimeswatch.com/cyber-crime/cyber-crime-statistics.html What is Scam or Fraud? Internet fraud is using an internet service or software to take advantage of a victim. http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Virus able to copy itself
can spread to other computers
used to steal information, harm host computers/networks, create botnets, steal money, render advertisements, etc. Trojan Horse also known as a "trojan"
disguises itself as normal file
trick users into downloading and installing
possible to steal data (logins, financial data, electronic money)
install more malware, modify files, monitor activity(keylogging) Rootkit designed to remotely access or control a computer w/o being detected
can remotely execute files, access/steal information, modify system configurations, alter software, install concealed malware
difficult to remove, detect, and prevent since it hides presence
detection by manual monitoring, scanning, analysis
patching software vulnerabilities, updating software, and avoiding suspicious files are the best ways to avoid Adware "advertising-supported software"
automatically delivers advertisements
sponsored by advertisers, a revenue generating tool

Warning: some adware is bundled with spyware that can keylog and steal information; this combination is significantly more dangerous than the adware alone Spyware functions by spying on user activity
include activity monitoring and collecting keystrokes, account information, logins, financial data, etc.
spreads by exploiting software vulnerable, bundling itself with legitimate software or in trojans Backdoor Method of bypassing normal authentication procedures
a compromised system can have a backdoor installed for easier access in the future
a trojan or worm can be used to install a backdoor Worms among the most common malware
spread by exploiting OS vulnerabilities
cause harm by consuming bandwidth and overloading web servers
distinguished from viruses since they can self-replicate and spread independently
can be spread via mass emails with the worm attached Symptoms of Malware Malware Prevention and Removal Following these recommendations will greatly increase a user's protection from a wide range of malware:

installing anti-malware and firewall software
keeping software and os up to date with the latest patches
always be careful when downloading files, programs, attachments, etc.
Common Email Scams Phishing: a email which asks a victim to click a link and visit a website in order to provide personal information.
Nigerian Scam: asks for help to access money in a foreign bank account, and promises a percentage of the cash for services. http://www.hoax-slayer.com/common-internet-scams.html Be careful of emails which:
1) Promise a reward
2) Ask for donations
3) Propose business deals

and especially:
4) Ask for sensitive personal information
5) Ask follow a link to log on to an account How to identify if an email message is a scam How to stay Secure online Keeping your computer safe What is Malware? Malware stands for Malicious Software, which are software specifically designed to attack a computer Viruses
Trojan Horses (Trojans)
Rootkits
Adware
Spyware
Backdoors
Worms Types of Malware There are many common types of Malware, which includes the following: Malware differ in the way they spread and infect computers, but always produces similar symptoms, such as

increased CPU usage
slow computer or web browsing speeds
Problems connecting to networks
Freezing or crashing
Modified or deleted files
Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)
Thank you! Stay Safe~
Full transcript