Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Network Security Presentation

No description

Fajer Eisaa

on 11 May 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Network Security Presentation

Some of the things that you can do via the Internet are:

send and receive instant electronic messages, which works like writing letters. Your messages are delivered instantly to people anywhere in the world.

Access Information:
Any kind of information on any topic under the sun is available on the Internet. The ‘search engines’ on the Internet can help you to find data on any subject that you need.

Online Shopping:
There are many online stores and sites that can be used to look for products as well as buy them using your credit card. You do not need to leave your house and can do all your shopping from the convenience of your home.

Downloading Software:
download games, music, videos, movies, and a host of other entertainment software from the Internet, most of which are free. IT & Internet Prepared by:
Fajer Al.Mousawi

Computer Engineering Student
College of Engineering & Petroleum
Kuwait University Three Main Topics - Importance of the Information Technology (IT) & the Internet.
- But Be Careful (BBC): Types of Computer Threats.
- How to protect your computer.
Importance of the Internet & IT *A kind of global meeting place where people from all parts of the world can communicate with each other.

*The "internet" is a gigantic library, as well as a world-wide message board, telephone network, and publishing medium.

*It is open 24 hours a day, and you can find anything you want there; information about almost any subject is available in depth and up to date. Information Technology

is related to studying, designing and developing the information related to computers.

In business: There are many businesses which are in need of the software packages for satisfying their operational as well as functional needs.

Education: helps the students as well as the teachers in studying the course material easily because of fast access. Studying the subjects with the help of online libraries and dictionaries has made grasping and increasing the knowledge easy for the students. Computer Security Threats As Internet and e-mail become an ever-increasing part of our 21st-century lives, the myriad dangers and risks that come with them are increasing too.

What is a hacker?

The term hacker was once used to describe a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a computer system. You can think of it as electronic burglary. Hackers regularly break into both individual computers and large networks. Once they have access, they may install malicious programs, steal confidential data, or perhaps use compromised computers to distribute spam.
Types of hacking and threats Viruses
A software virus is a parasitic program written intentionally to alter the way your computer operates without your permission or knowledge.

A virus attaches copies of itself to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk.

A virus may spread through email and instant messenger attachments, through infected files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows. Macro Viruses

Macro viruses are malicious macro programs that are designed to replicate themselves from file to file and can cause damage to the files on your computer. They spread whenever you open an infected file.

Macros can be written in documents created by Microsoft Word, in spreadsheets created by Microsoft Excel and in many other kinds of documents.
Trojan Horses

Trojan horses are programs that appear to serve some useful purpose or provide entertainment, which encourages you to run them. But these programs also serve a covert purpose, which may be to damage files, to place a virus on your computer or to allow a hacker to gain access to your machine. More commonly these days, you can be enticed into running a Trojan by clicking a link on a viral web site or in an email.


Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect.

Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email. Zombies

A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a collective attack on another computer. Zombies don’t normally damage the computer on which they reside but can damage other computers.

Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated.

A Phishing attack is when you are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently. Viral Web Sites

Users can be enticed, often by email messages, to visit web sites that contain viruses or Trojans. These sites are known as viral web sites and are often made to look like well known web sites and can have similar web addresses to the sites they are imitating.

Users who visit these sites often inadvertently download and run a virus or Trojan and can then become infected or the subject of hacker attacks.
Spyware, Adware and Advertising Trojans

Spyware, Adware and Advertising Trojans are often installed with other programs, usually without your knowledge.

They record your behaviour on the Internet, display targeted ads to you and can even download other malicious software on to your computer. They are often included within programs that you can download free from the Internet or that are on CDs given away free by magazines.

Spyware can use your system resources and slow down your Internet connection with the display of ads. These programs record every step that you take on the Internet. Unsecured Wireless Access Points

If a wireless access point, e.g. an ADSL (Broadband) Router, hasn't been secured then anyone with a wireless device (laptop, PDA, etc) will be able to connect to it and thereby access the Internet and all the other computers on the wireless network.
Browser Hijackers

Browser hijackers change the default
home and search pages in yourinternet
browser. Computer Protection Turn on Automatic Updates:
your computer routinely checks the for high-priority updates that can help protect your computer from the latest viruses and other security threats. These updates can include security updates, critical updates, and service packs.
Use Current AntiVirus Software:
Antivirus software helps protect your computer
from viruses and worms. Use Current Anti-Spyware Software:
Spyware is often installed without your knowledge when you install other programs and sometimes by just surfing the web. It can be responsible for a wide range of problems including pop-ups, system slow-down, network failure and identity theft.
Turn on a the Firewall: A firewall is a piece of software or hardware that can help protect your computer against network attacks, such as computer viruses. Many operating systems have a software firewall you can activate and most routers have a firewall as well.
Do Not Open Files Sent Over Instant Messenger (IM) Programs:
Such as: MSN Messenger, Windows Messenger, AOL Instant Messenger, Yahoo Messenger or others . Make sure you're using an updated version of your IM software. Using the most up-to-date version of your IM software can better protect your computer against viruses and spyware.
Be Wary of Opening Email Attachments: Many of the most common computer viruses and other malicious software are spread through email attachments.
Don't open any attachment unless you know whom it's from and you were expecting it.

If you receive an email message with an attachment from someone you don't know, delete it immediately.

Use antivirus software and keep it updated.

If you need to send an email attachment to someone, let them know you'll be sending it so they don't think it's a virus. Use Strong Passwords

Strong passwords are important because they are the first line of defense against attacks on your computer, but more importantly they protect your identity. Once you've created a good password, keep it secret! Thanks For Listening
Full transcript