Potential online threats & security measures
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Potential online threats & security measures

on

  • 1,050 views

 

Statistics

Views

Total Views
1,050
Views on SlideShare
1,050
Embed Views
0

Actions

Likes
0
Downloads
20
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Potential online threats & security measures Presentation Transcript

  • 1. Potential Online threats & Security measures
  • 2. Threats Malware Viruses Trojans Spyware Adware Phishing Farming
  • 3. Malware Malware Malware can be installed without the user ever knowing. Just by visiting a compromised website, opening an email or installing a program, it is possible for the Malware author to exploit vulnerabilities in your PCs operating system to enable remote access or software installation.
  • 4. Viruses With computer viruses, the virus is designed to spread from your computer to other computers One way a virus can spread is by accessing your emails and sending a copy of itself to your contacts so it spreads, this is called a (worm)
  • 5. Trojans A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk.
  • 6. Spyware Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.
  • 7. Adware Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. They include features like advanced searching of the Web or your hard drive and better organization of your bookmarks and shortcuts.
  • 8. Phishing Phishing is an attempt to steal your personal information. They send out e- mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password
  • 9. Pharming Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.
  • 10. Legislation Legislation can refer or laws or the process by which they are enacted in certain countries. Many countries have some form of legislation, which is a body dedicated primarily to passing and amending laws
  • 11.  http://bcove.me/mqt3fvw1