computer skills and applications computer security

10
Computer Skills and Applications Computer Security

Upload: coleen-flowers

Post on 18-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Skills and Applications Computer Security

Computer Skills and Applications

Computer Security

Page 2: Computer Skills and Applications Computer Security

What does it mean to be secure?

Page 3: Computer Skills and Applications Computer Security

Being secure results in:

• Rules/interaction procedures restricting accessibility

• Rules/interaction procedures restricting availability

• Monitoring

• Environmental/physical conditions will be protected

Page 4: Computer Skills and Applications Computer Security

Computer Security

Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains.

Page 5: Computer Skills and Applications Computer Security

Privacy refers to information shared with visiting sites, how that information is used, who that information is shared with, or if that information is used to track users.

Computer/Internet Privacy

Page 6: Computer Skills and Applications Computer Security

Identity Theft is the use of personal information found online that can be used by an individual or group to drain your bank account or ruin your credit rating.Phishing is the use of seemingly legitimate emails or messages to disguise spam emails that once opened can be used to steal personal information. Web sites are also commonly used by an assailant for phishing, because once an individual enters their user name and password to gain access this information is stolen. Malware is the term given to any malicious software designed to do things that are unwanted or harmful to a computer’s legitimate user

Common Internet/Security Risks

Page 7: Computer Skills and Applications Computer Security

Malware comes in several forms:• Computer viruses which spread themselves throughout an infected

computer by making copies of themselves. A virus must attach itself to executable files.• Worms is a program that duplicates itself from one directory, drive,

computer or network to another. Computer worms self-replicate and spread across networks, exploiting vulnerabilities, automatically; that is, they don’t need a cybercriminal’s guidance, nor do they need to latch onto another computer program• Spyware whose purpose is to steal and transmit personal

information to a pre-determined computer location.

Malware Types

Page 8: Computer Skills and Applications Computer Security

• A Trojan Horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves. They are spread by viruses or worms.• A rogue security software program tries to make you think that

your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate.

Malicious Software Continued

Page 9: Computer Skills and Applications Computer Security

• Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.

Removal of Malware

Page 10: Computer Skills and Applications Computer Security

Some common malware removal tools include:• Malwarebytes Anti-Malware• Bitdefender Internet Security• Panda Free Antivirus• Spybot Search & Destroy• Ad-Aware Free Antivirus+• Microsoft Security Essentials• KasperSky Internet Security 2015