Malicious Software ,Good Internet Habits and ICT general Application usage

  • View
    28

  • Download
    0

Embed Size (px)

Text of Malicious Software ,Good Internet Habits and ICT general Application usage

  1. 1. 11ICT General ApplicationsICT General Applications Malicious Software ,Good Internet Habits and ICT General Application Usage ByBy Adedayo O.SAdedayo O.S A Paper Delivered During the New Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008.
  2. 2. 22ICT General ApplicationsICT General Applications Virus SourcesVirus Sources 1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities are not patched.are not patched. 2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from InternetInternet.. 3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of your Internet facility and in use of foreignyour Internet facility and in use of foreign storage mediastorage media.. 4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers (as attachments).(as attachments). 5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
  3. 3. 33ICT General ApplicationsICT General Applications CHARACTERISTICCHARACTERISTIC SSMALWARE AND SPYWARESMALWARE AND SPYWARES 1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms). 2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc).. 3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems. 44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly. 5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
  4. 4. 44ICT General ApplicationsICT General Applications Updating AntivirusUpdating Antivirus
  5. 5. 55ICT General ApplicationsICT General Applications Storage DevicesStorage Devices Removable Hard DriveRemovable Hard Drive Internal Hard DriveInternal Hard Drive FlashFlash PC CardsPC Cards Storage TapesStorage Tapes Memory SticksMemory Sticks Floppy DisksFloppy Disks Zip DisksZip Disks CD /DVDCD /DVD
  6. 6. 66ICT General ApplicationsICT General Applications Internet Best PracticesInternet Best Practices Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current. Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file attachmentsattachments Use Windows Security Centre to manage yourUse Windows Security Centre to manage your settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are comfortable with.comfortable with. Download internet files from trusted sources only andDownload internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner. Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside intruders.intruders. Use strong passwords that are at least eightUse strong passwords that are at least eight characters long and a combination of lower and uppercharacters long and a combination of lower and upper case letters, numbers and symbols.case letters, numbers and symbols.
  7. 7. 77ICT General ApplicationsICT General Applications Block Pop-upsBlock Pop-ups
  8. 8. 88ICT General ApplicationsICT General Applications How to download CorrectlyHow to download Correctly
  9. 9. 99ICT General ApplicationsICT General Applications THANK YOU.THANK YOU.
  10. 10. 99ICT General ApplicationsICT General Applications THANK YOU.THANK YOU.