0
An ITS Security Training Module<br />Version Oct 2009 v3<br />CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.<br />
Virus, Trojans & Worms. Oh My!<br />Malware can be a computer virus, trojan horse, worm,  spyware, or adware.<br />Malware...
Malware Protection<br />Section: Virus, Trojans & Worms<br />Keep your antivirus software updated to protect your computer...
Malware Protection<br />Section: Virus, Trojans & Worms<br />Obtain and install computer firewall to protect against any u...
	Social Engineering & Phishing – What Is It?<br />Section: Virus, Trojans & Worms<br />Social engineeringused by criminals...
	Social Engineering & Phishing Protection<br />Section: Virus, Trojans & Worms<br />Be suspicious of email attachments and...
Learning Point # 9<br />Section: Virus, Trojans & Worms<br />There is so much malware on theInternet, it makes little diff...
Learning Point # 10<br />Section: Virus, Trojans & Worms<br />It’s your birthday and you get a lot of messages from your M...
Upcoming SlideShare
Loading in...5
×

Security Awareness 9-10-09 v5 Viruses and Trojans

319

Published on

Viruses and Trojans

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
319
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Security Awareness 9-10-09 v5 Viruses and Trojans"

  1. 1. An ITS Security Training Module<br />Version Oct 2009 v3<br />CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.<br />
  2. 2. Virus, Trojans & Worms. Oh My!<br />Malware can be a computer virus, trojan horse, worm, spyware, or adware.<br />Malware is often installed by downloading programs such as screensavers, games, “free” software or by visiting malicious Web sites.<br />
  3. 3. Malware Protection<br />Section: Virus, Trojans & Worms<br />Keep your antivirus software updated to protect your computer from the latest malware. <br />Set up the free Symantec Antivirus available to all UNC-Chapel Hill affiliates with a valid Onyen. <br />Use firewall software to prevent unwanted communications with your computer. <br />
  4. 4. Malware Protection<br />Section: Virus, Trojans & Worms<br />Obtain and install computer firewall to protect against any unauthorized or unwanted computing activity. <br />Call the ITS Help Desk at (919.962.HELP) with your questions on how to protect a computer against malware. <br />
  5. 5. Social Engineering & Phishing – What Is It?<br />Section: Virus, Trojans & Worms<br />Social engineeringused by criminals to try to manipulate you into disclosing Sensitive Information <br />Phishinga form of social engineering that uses fake email messages to trick you into disclosing confidential information<br />
  6. 6. Social Engineering & Phishing Protection<br />Section: Virus, Trojans & Worms<br />Be suspicious of email attachments and unexpected email messages.<br />Think twice before clicking on any link, including those in an email, pop-ups or ads. <br />Be wary of emails asking for personal or financial information.<br />Call (919.962.HELP) to determine whether a suspect email is legitimate. <br />
  7. 7. Learning Point # 9<br />Section: Virus, Trojans & Worms<br />There is so much malware on theInternet, it makes little difference whether you have antivirus softwareinstalled and updated on your computer Right?<br />Wrong! Antivirus software may not detect all malware, but it is free for University staff and faculty and provides, if regularly updated, an effective tool against many viruses and other types of malware.<br />
  8. 8. Learning Point # 10<br />Section: Virus, Trojans & Worms<br />It’s your birthday and you get a lot of messages from your MySpace friends. Some of the names do not sound familiar, but since it’s your birthday, you may as well enjoy the greeting cards. Right?<br />Wrong! If your profile on your favorite social networking is public, it may contain your actual birthdate. Social engineering scammers will use personal information on public sites to target individuals with phishing messages. Never open attachments or download files in messages from unknown senders.<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×