Transcript

11ICT General ApplicationsICT General Applications

Malicious Software ,Good Internet Habits and ICT General Application

Usage

ByBy

Adedayo O.SAdedayo O.S

A Paper Delivered During the New Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008.

22ICT General ApplicationsICT General Applications

Virus SourcesVirus Sources

1.1.Simply visiting a compromised Web site Simply visiting a compromised Web site can cause infection if certain browsercan cause infection if certain browser vulnerabilities are not patched.vulnerabilities are not patched.

2.2.Indiscriminate downloading of software Indiscriminate downloading of software from Internetfrom Internet..

3.3.Over liberality with visitors. That is in Over liberality with visitors. That is in the the use of your Internet facility and in use of use of your Internet facility and in use of foreignforeign storage mediastorage media..

4.4.Through e-mail both from friends and Through e-mail both from friends and strangers (as attachments).strangers (as attachments).

5.5. Software piracy can sometimes lead to virus Software piracy can sometimes lead to virus infection.infection.

33ICT General ApplicationsICT General Applications

CHARACTERISTICSCHARACTERISTICSMALWARE AND SPYWARESMALWARE AND SPYWARES

1. 1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).2.2. They use up memory and often bring the system to a They use up memory and often bring the system to a

halt. This can be noticed initiallyhalt. This can be noticed initially by the considerable by the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc)..

3.3. Viruses are capable of transmitting themselves across Viruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems.

44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.5.5. They usually fulfil whatever their designer(s) had in They usually fulfil whatever their designer(s) had in

mind when mind when produced. E.gproduced. E.g deletion, theft, truncation, deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc. etc.

44ICT General ApplicationsICT General Applications

Updating AntivirusUpdating Antivirus

55ICT General ApplicationsICT General Applications

Storage DevicesStorage DevicesRemovable Hard Drive Removable Hard Drive

Internal Hard Drive Internal Hard Drive

Flash Flash

PC Cards PC Cards

Storage Tapes Storage Tapes

Memory Sticks Memory Sticks

Floppy Disks Floppy Disks

Zip Disks Zip Disks

CD /DVDCD /DVD

66ICT General ApplicationsICT General Applications

Internet Best PracticesInternet Best PracticesReduce the risk of viruses. Use of anti-virus software Reduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current.Never open suspicious e-mail messages or file Never open suspicious e-mail messages or file attachmentsattachmentsUse Windows Security Centre to manage your settings. Use Windows Security Centre to manage your settings. Adjust to the level of protection you are comfortable Adjust to the level of protection you are comfortable with. with. Download internet files from trusted sources only and Download internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner.Use a firewall, Install a Microsoft Internet Connection Use a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outside firewall as a basic line of defence against outside intruders. intruders. Use strong passwords that are at least eight characters Use strong passwords that are at least eight characters long and a combination of lower and upper case letters, long and a combination of lower and upper case letters, numbers and symbols. numbers and symbols.

77ICT General ApplicationsICT General Applications

Block Pop-upsBlock Pop-ups

88ICT General ApplicationsICT General Applications

How to download CorrectlyHow to download Correctly

99ICT General ApplicationsICT General Applications

THANK YOU.THANK YOU.


Recommended