23
Computer Safety & Security Detrick Robinson & Amris Treadwell Detrick Robinson & Amris Treadwell

Computer Safety & Security

  • Upload
    misae

  • View
    43

  • Download
    1

Embed Size (px)

DESCRIPTION

Computer Safety & Security. Detrick Robinson & Amris Treadwell. What are Computer Viruses?. Computer viruses- are pieces of programs that are purposely made up to infect your computer. Examples: Internet worm Virus Spyware Spam. Different Types of Viruses: Internet Worm. - PowerPoint PPT Presentation

Citation preview

Page 1: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Computer Safety & Security

Detrick Robinson&

Amris Treadwell

Page 2: Computer Safety & Security

Detrick Robinson & Amris Treadwell

What are Computer Viruses? Computer viruses- are

pieces of programs that are purposely made up to infect your computer.

Examples:› Internet worm› Virus› Spyware› Spam

Page 3: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Viruses: Internet Worm

Internet Worm-is a program that replicates itself so many times that it causes the internet server to crash.

The internet worm was the very first successful virus that was able to shutdown computers all over the world.

Page 4: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Viruses: Spyware

Spyware- is software that obtains information from a user's computer without the user's knowing. Examples:› Parasite Ware -is a way for webmaster to sell products

and help fund websites by overwriting tracking links.› Adware –is a program that can do a number of things

like sending pop-ups and annoying ads while surfing on the web.

› Malware – is a virus setup to disrupt the computer system. A Trojan horse popping up can be classified as malware.

› Page hijackers- is an application that is used to control the home page on your computer and reset it to the hijackers choice.

Page 5: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Viruses: Spam

Spam-is the abuse of sending unwanted bulk messages.› Unsolicited Bulk Email-is mail sent to many different

recipients that don’t ask for them.› Unsolicited Commercial Email-is some what the

same as UBE. Organizations have found a way to send information regarding their company to your email even though you don’t want it and have blocked it.

› Mail Bombing- is when people receive a huge amount of messages in their inbox just to overload their email.

› Flaming- is email sent with offensive content.

Page 6: Computer Safety & Security

Detrick Robinson & Amris Treadwell

What is Computer Safety? Computer safety is the

technological precautions that you practice on your computer system to ensure the availability, integrity and confidentiality of information.

Examples:› Window Defender› Firewall› Activate Window

Update› Firefox

Page 7: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Computer Safety Programs: Window Defender

Windows Defender-is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware. It detects the infects and removes them.

› The benefits of having Window Defender: Spyware detection and removal- Window Defender is able to point out different

viruses that are caused by spyware and removes them.

Improved Internet browsing safety- Window Defender works in the background by removing spam and spyware while you browse different internet sites. Once you go to a site that is full of spam, Window Defender points it out and removes it.

Protection against the latest threats- Window defender was set up by Microsoft to make it so that your computer could be protected from the latest threats by giving your computer a update automatically.

Page 8: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Computer Safety Programs: Firewall

Firewall- Forms a barrier of protection from the spread of viruses throughout your computers.› Different Types of Firewall

Packet filtering firewall- This type of firewall has security rules which can block IP protocol, IP address and/or port number.

Deep Packet Inspection firewall- examines the data in the packet, and can therefore look at application layer attacks.

Application-aware firewall- this type of firewall understands certain protocols and can parse them, so that signatures or rules can specifically address certain fields in the protocol.

Application proxy firewall- An application proxy acts as an intermediary for certain application traffic (such as HTTP, or web, traffic), intercepting all requests and validating them before passing them along.

Page 9: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Computer Safety Programs: Firefox

Firefox-is an internet browser that

eliminates viruses and enables you to surf the web at the

same time.

Page 10: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Different Types of Computer Safety Programs: Activate Window Update

Window Update- uses active control

and scripting to determine which

updates to apply to your computer

without you getting a viruses.

Page 11: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using Public Computers.

When using a public computer, shut it completely down after it’s use.› Public computers are the main way

internet hijackers can steal your information. By shutting down your computer after you use it, you will delete your information that was entered.

Page 12: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using Public Computers.

Never leave your login information up at anytime.› Always log out of the site when you re

finish using the computer. Many websites have automatic login features that will save your information.

Page 13: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using Public Computers.

Erase your tracks› Make sure you delete your history after

you use a public computer. Internet Explore has software that can keep a record of the information you enter even after you logout.

Page 14: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using Public Computers.

Make sure you watch who is around you went logon the computer.› When using the public computer always

watch for thieves standing behind, while you enter your personal information.

Page 15: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using Public Computers.

Never type personal information into a public computer.› Avoid typing your credit card number and

any other financial information into a public computer. Internet hijackers can install software on public computers that can record your information and send it back to them.

Page 16: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using your Personal Computer.

Anti-Virus Programs› Always make sure your computer has anti-

virus programs. This enables your computer to be free from different viruses that may destroy your computer and make it crash.

Page 17: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using your Personal Computer.

Data Backups› When using your personal computer, you

should have data backups. This ensures that when problems with your arises, your information will be saved.

Page 18: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using your Personal Computer.

Strong Passwords› When setting up your different accounts,

make sure you use only strong passwords. Using your birthday, child's name, or your cats name is not a good password. You should use a strong password that no one will think of, therefore no one will be able to get in to your accounts.

Page 19: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using your Personal Computer.

Email Attachments› Be very careful when accepting different

email attachments from people. Email attachments can be used by hackers to get into your computer system and steal your information. When receiving attachments, make sure you know who it is from before you open it.

Page 20: Computer Safety & Security

Detrick Robinson & Amris Treadwell

5 Tips For Computer Safety When Using your Personal Computer.

Downloading and Installation› Downloading and Installing any kind of

program to your computer is the easiest way for computer hackers to receive your information. Make sure you check the program before you download it.

Page 21: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Page 22: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Bibliography Page Active window defender: http://

www.microsoft.com/windows/products/winfamily/defender/default.mspx

Computer protection: http://www.microsoft.com/security/pypc.aspx Computer Protection at home: http://

www.oispp.ca.gov/consumer_privacy/consumer/documents/pdf/cis12protect.pdf.com

Computer Safety tips:http://antivirus.about.com/od/securitytips/a/safetytips.htm

Different types of spam: http://www.admin.easymail.rmplc.co.uk/admin_help/spam.htm

Different types of spyware: http://www.softwaretipsandtricks.com/windowsxp/articles590/1/different-types-of-spyware

Different Types of viruses: http://www.boloji.com/computing/security.htm

Page 23: Computer Safety & Security

Detrick Robinson & Amris Treadwell

Bibliography Page FireFox Protection: http://searchsoa.techtarget.com/sDefinition/0 FireWall Protection:

http://www.secureworks.com/research/articles/firewall-security.com Safety tips:

http://www.safetytips411.com/Computer_Security_Tips.html Safety Tips at Home: http://www.safetytips411.co Spyware protection:

http://www.microsoft.com/windowsxp/using/security/expert/huneycut-spyware.mspx

Tips: http://www.e-bc/medi/ebizguides/handouts/5-free-things-you-can-do-to-protect-your-computer.pdf

Windows Update: http://www.update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us