Computer And Internet Security


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer And Internet Security

  2. 2. Topic <ul><li>Inform audience on issues in computer security. </li></ul><ul><li>Explain how to keep their information safe. </li></ul><ul><li>Stress importance of computer and internet security. </li></ul>
  3. 3. Elements <ul><li>Hackers and what they look for. </li></ul><ul><li>Business security. </li></ul><ul><li>Malware. </li></ul><ul><li>Key loggers. </li></ul><ul><li>Viruses. </li></ul><ul><li>Anti-virus and Spyware programs. </li></ul><ul><li>Social Networking and security. </li></ul>
  4. 4. The Internet <ul><li>The Internet is connecting 820 million computers in 260 countries. </li></ul><ul><li>Made up of loosely connected networks. </li></ul><ul><li>Uses gateways, routers, dial-up connections and ISP’s. </li></ul>
  5. 5. Hackers <ul><li>Malicious hackers, “Crackers,” –someone who breaks into computers without authorization. </li></ul><ul><li>Can include both “insiders” and “outsiders.” </li></ul><ul><li>One 2002 study found that hackers attempted to break in at least once every other day. </li></ul><ul><li>Some browse, steal and some damage. </li></ul>
  6. 6. What Hackers Look For <ul><li>Which hardware and software are being used </li></ul><ul><li>System configuration. </li></ul><ul><li>Type of network connections. </li></ul><ul><li>Phone numbers. </li></ul><ul><li>Access and authentication procedures. </li></ul>
  7. 7. Important Info <ul><li>Passwords. </li></ul><ul><li>Access control files. </li></ul><ul><li>Personal information. </li></ul><ul><li>Encryption algorithms. </li></ul>
  8. 8. Business Security <ul><li>Can reduce frequency and severity of computer security-related losses. </li></ul><ul><li>Can thwart hackers. </li></ul><ul><li>Reduce frequency of viruses. </li></ul>
  9. 9. What is Malware? <ul><li>Malware is an abbreviated term for malicious programming. </li></ul><ul><li>Malware includes things like key loggers, Trojan horses, worms and other harmful viruses. </li></ul>
  10. 10. Key Loggers <ul><li>A key logger has the ability to monitor every keystroke that you make. </li></ul><ul><li>It can help hackers access important information such as passwords and credit card numbers. </li></ul>
  11. 11. Trojan Horse and Other Viruses <ul><li>Trojan horses can damage your system and even allow the hacker to gain access to personal information and sometimes resulting in identity theft. </li></ul><ul><li>Viruses can hijack your system and send out spam without your knowledge. Viruses also commonly eat up your computer system causing it to crash or freeze. </li></ul><ul><li> </li></ul>
  12. 12. Passwords <ul><li>Passwords should contain a combination of both letters and numbers. </li></ul><ul><li>Avoid using common passwords such as names of children, spouses or pets. These passwords are easily guessable. </li></ul>
  13. 13. How to Choose a Spyware Program <ul><li>Look at the credibility of the seller. </li></ul><ul><li>Does it provide a free trial before purchase? </li></ul><ul><li>Is it affordable or comparable with other products of this kind? </li></ul><ul><li>Does it give you everything you need to protect your PC? </li></ul><ul><li>How do they handle customer feedback? </li></ul>
  14. 14. How to Choose an Anti-Virus Program <ul><li>Determine if your ISP offers a free download of security or anti-virus software. </li></ul><ul><li>Shop Around. </li></ul><ul><li>Decide which features you need and how you will use your computer. </li></ul><ul><li>If one anti-virus program slows down your computer, uninstall and try another one. </li></ul><ul><li>If money is an issue, try AVG. </li></ul>
  15. 15. Signs Your Computer May be Infected <ul><li>Running slowly, especially upon start-up. </li></ul><ul><li>Locks up or crashes frequently. </li></ul><ul><li>You can’t access your disks. </li></ul><ul><li>You can’t print items correctly. </li></ul><ul><li>Your anti-virus software is disabled for no reason. </li></ul>
  16. 16. Articles <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  17. 17. Social Networking Today <ul><li>Social Networking is an online community of people, some coming together on certain topics, beliefs, or simply for friendships. </li></ul><ul><li>The first social networking site arose in 1997. served as a place for users to create profiles and surf other user profiles as well. </li></ul><ul><li>Social networking became popular through means of online dating sites, personal sites and business sites. </li></ul><ul><li>Social networking popularity rose with the creation of the site </li></ul>
  18. 18. Problems in Privacy and Security of Social Networking <ul><li>A security issue occurs when a hacker gains unauthorized access to a site’s protected coding or written language. </li></ul><ul><li>A privacy issue occurs when there is unwarranted access of private information. Privacy issues do not necessarily mean a breach of security. </li></ul><ul><li>Potential harm to users comes down to how much information is shared on the networking site. The more you share, the more friends and applications you have, the more at risk you are. </li></ul><ul><li>Lapses in security and privacy happen simply because of the astronomical amount of information the site processes everyday – making it easier for hackers to exploit a single flaw in the system. </li></ul><ul><li>On sites such as, the framework of the site has flaws built in that can be exposed and leave the site indefensible. </li></ul>
  19. 19. Solutions to Social Networking Issues <ul><li>The only solution to privacy and security issues is the user must limit the amount of information they share and careful about what is shared. Limit your presence in social networking all together. </li></ul><ul><li>Tips </li></ul><ul><li>Don’t post anything you wouldn’t mind telling a complete stranger. If you wouldn’t invite strangers over to see your cat, you certainly shouldn’t show them all the pictures of your holiday and your family. </li></ul><ul><li>Be careful who you friend – there’s no way to check the identity of an online user. </li></ul><ul><li>Don’t share your passwords with anyone. It is common for hackers to pretend to be IT workers and such in order to gain access. </li></ul>
  20. 20. Key Points <ul><li>There are people out there who want your information. </li></ul><ul><li>Take care of your computer to avoid viruses and other problems. </li></ul><ul><li>Buy software to keep your information safe. </li></ul><ul><li>Be careful online, especially with social networking sites. </li></ul>
  21. 21. References <ul><li>Collins, Brendan. &quot;Privacy and Security Issues in Social Networking.&quot; Fast Company . Fast Company, 8 Oct. 2008. Web. 29 Mar. 2010. <>. </li></ul><ul><li>Pappalardo, Joe. &quot;Risks of Clicks.&quot; Popular Mechanics 187.3 (2010): 13. Academic Search Premier . EBSCO. Web. 4 Apr. 2010. </li></ul><ul><li>  </li></ul><ul><li>&quot;SANS: Popular Resources On Computer Security.&quot; SANS: Computer Security Training, Network Security Research, InfoSec Resources . N.p., n.d. Web. 1 Apr. 2010. . </li></ul><ul><li>  </li></ul><ul><li>Holzer, Amy. &quot; New Computer Virus Steals Facebook Passwords - Baltimore News, Weather, Breaking News | WMAR-TV.&quot; | - Baltimore News, Weather, Breaking News | WMAR-TV . N.p., n.d. Web. 1 Apr. 2010. . </li></ul><ul><li>  </li></ul><ul><li>National Institue of Standards and Technology. &quot;An Introduction to Internet Security.&quot; The NIST Handbook 1 (1995): n. pag. . Web. 1 Apr. 2010. </li></ul><ul><li>  </li></ul><ul><li>Quarantiello, Laura. &quot;Computer Virus Warning Signs - Internet Coaching.&quot; Internet Usage World Stats - Internet and PopulationStatistics . N.p., n.d. Web. 4 Apr. 2010. . </li></ul><ul><li>  </li></ul><ul><li>Vermes, Krystle. &quot;How to Choose the Best Spyware Detector |; eHow | How To Do Just About Everything! | How To Videos & Articles . N.p., n.d. Web. 1 Apr. 2010. <>. </li></ul>