Introduction to Computers          CLASS 7
Input and outputName these peripherals: a       b           c       d   ef        g           h       i   j
Input and output Name these peripherals:joystick   printer earphones keyboard    scannermouse microphone   speakers   moni...
Input and outputNow put the peripherals into “input” and “output” devices:  a         b            c             d        ...
Input and outputinput devices                  output devices
QR questions What does “QR” mean? When were QR codes invented? By what company? Which holds more information, barcodes ...
QR questions What does “QR” mean?       Quick Response   When were QR codes invented? By what company?       QR codes we...
Internet securityThere are threats to anyone who uses a computer. Some of these include:Viruses / malwareOnline ScamsPhish...
Being careful onlineTHREATS AND ISSUES WHEN YOU USE THE INTERNET
 MalwareInternetSecurity                               PhishingThe internet is such abig part of your lives             ...
 Virus - a program that can spread                                from computer to computer by  Malware                  ...
 A computer virus is a computer                            program that can spread from oneVirus                       co...
 A Trojan horse, or Trojan, is                                  software that hides inside  Trojans                      ...
 One kind of malware, usually  Bots, botnets                  brought into a computer through  and zombies!              ...
Botnets are bad. Really bad. They can  Bots, botnets                  be used to send spam, send or  and zombies!         ...
Keyloggers simply record whatever the                                user is typing on their keyboard.  Keyloggers        ...
 Keyloggers are some of the worst               kinds of malware. Spies loveKeyloggers     keyloggers, and countries ofte...
 Phishing is a way of tricking people                           into giving their information to whatPhishing            ...
 Here’s another example of an                           email that takes you to a phishingMore Phishing              site...
Here’s another phishing example:
And a “friend phishing” example:
Who is Sophie Ng?Let’s see if Google knows her:Take one of her profile pictures and put it into Google images.Hey, that’s ...
After Google searching…                             After uploading a couple of                             “Sophie” pictu...
 Dangerous links in email, IM,How does this               Twitter messages, Facebook andhappen?                     YouTu...
 Underground cybercrime economy                           Bigger business than internationalWhy?                        ...
 Zeus is a trojan that steals bankingJust one case:     informationZeus               using keylogging and form          ...
 Zeus botnets are thought to include         millions of computers (around 3.6Zeus     million in the United States).    ...
 It is still active today. In 2010, an         internet security company, wrote thatZeus     the credit cards of more tha...
 Don’t open mail attachments fromSo what can                  people you don’t know.you do?                     Try not ...
 Don’t expect something forSo what can                  nothing.you do?                             Don’t download pirate...
 Go to Facebook. If there are people in your friends                           list that you don’t really know, put the l...
Upcoming SlideShare
Loading in …5
×

C 7

593 views
529 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
593
On SlideShare
0
From Embeds
0
Number of Embeds
309
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

C 7

  1. 1. Introduction to Computers CLASS 7
  2. 2. Input and outputName these peripherals: a b c d ef g h i j
  3. 3. Input and output Name these peripherals:joystick printer earphones keyboard scannermouse microphone speakers monitor barcode reader
  4. 4. Input and outputNow put the peripherals into “input” and “output” devices: a b c d e f g h i j
  5. 5. Input and outputinput devices output devices
  6. 6. QR questions What does “QR” mean? When were QR codes invented? By what company? Which holds more information, barcodes or QR codes? Which direction are QR codes “read” ? Which of these is the “correct” direction for a QR code? a) b) c) d)
  7. 7. QR questions What does “QR” mean? Quick Response When were QR codes invented? By what company? QR codes were invented in 1994 by Toyota. Which holds more information, barcodes or QR codes? QR codes kick barcode butt. Which direction are QR codes “read” ? Up and down (barcodes are read side to side). Which of these is the “correct” direction for a QR code? a) b) c) d)
  8. 8. Internet securityThere are threats to anyone who uses a computer. Some of these include:Viruses / malwareOnline ScamsPhishingSocial Network HackingCredit Card FraudLet’s take a look at each type…
  9. 9. Being careful onlineTHREATS AND ISSUES WHEN YOU USE THE INTERNET
  10. 10.  MalwareInternetSecurity  PhishingThe internet is such abig part of your lives  Social Network Hackingthat we can forget thatit even though it isconvenient, it can alsobe dangerous.You need to be careful.Today I will introducesome of the mostcommon threats ( 威脅 ).Sources:http://www.slideshare.net/TechSoupGlobal/security-basics-webinarhttp://en.wikipedia.org/
  11. 11.  Virus - a program that can spread from computer to computer by Malware itself.Most of you have heard of acomputer “virus” before…  Trojan - a hidden program (forViruses are actually a kind example in free / illegal software)of Malware ( 惡意軟體 )  Bot - a robot network which can be controlled outside the computer.  Keystroke logger (keylogger): a program that records what you type into the computer.
  12. 12.  A computer virus is a computer program that can spread from oneVirus computer to another.Some viruses can beharmless, but others  A virus can spread from onecan slow down or evenruin a computer. Many computer to another using code,people don’t even know for instance because a user sent itthat their computer hasa virus at all. over the Internet, or carried it on a memory device such as a CD, DVD, or USB drive.  Viruses that spread them- selves online or across a network are called worms.
  13. 13.  A Trojan horse, or Trojan, is software that hides inside Trojans software and then stealsThe term “Trojan” comesfrom the Greek story about information or hurts the user’sthe Trojan Horse from a computer.very old story (The Iliad).  Some things trojans can do toIn the story, Greeks left abig wooden horse to the your computer:Trojans, people they were atwar against. After the  Make your computer a “zombie”Trojans brought the horse  Download or upload filesinto the city, the Greeks whowere hidden inside snuck  Steal your informationout and opened the citygates to let the Greek army  Watch your screencome in and destroy the city  Crash your computerof Troy.  Record your keystrokes
  14. 14.  One kind of malware, usually Bots, botnets brought into a computer through and zombies! a trojan, is a bot. Here’s one of theBots, or internet robots,didn’t start out as bad - and way hackers can use bots:not all of them are. Forexample, Google uses botsto get for their searchresults.What we are talking abouthere are botnets, which takeover computers and becomean army of computers doingwhat they are told, orzombies, by an outsideprogram.
  15. 15. Botnets are bad. Really bad. They can Bots, botnets be used to send spam, send or and zombies! download files or even more malware,Bots, or internet robots,didn’t start out as bad - and and they can even be used fornot all of them are. For Distributed Denial of Service (DDoS)example, Google uses botsto get for their search attacks, where so many differentresults. computers are told to go to the sameWhat we are talking abouthere are botnets, which take website allover computers and becomean army of computers doing at the samewhat they are told, orzombies, by an outside time thatprogram. the website crashes.
  16. 16. Keyloggers simply record whatever the user is typing on their keyboard. Keyloggers Some keyloggers also record what isKeyloggers are actuallyquite easy to write. Usually on the screen at the same time. Here’skeyloggers are put together an example of a keylogger file thatwith other types ofmalware. also shows what form the user was typing in (form grabbing):
  17. 17.  Keyloggers are some of the worst kinds of malware. Spies loveKeyloggers keyloggers, and countries often try to sneak them onto computers. Sometimes people use them to spy on each other - for example, maybe a husband thinks his wife has a secret boyfriend…  Criminals use keyloggers to try to get usernames and passwords for bank information.
  18. 18.  Phishing is a way of tricking people into giving their information to whatPhishing they think is a site they can trust.While phishing isn’t afrom of malware (it’s  Here’s an example:more like tricking youand stealing), it’sbecoming more andmore common, andmore dangerous.  The link in the email takes you to a login page that asks you to type in your gmail information.  Look at the domain name!
  19. 19.  Here’s another example of an email that takes you to a phishingMore Phishing site:Phishing has become areal problem in recentyears, and social mediasites are one of theirfavorite targets.
  20. 20. Here’s another phishing example:
  21. 21. And a “friend phishing” example:
  22. 22. Who is Sophie Ng?Let’s see if Google knows her:Take one of her profile pictures and put it into Google images.Hey, that’s a differentname! What’s going on?
  23. 23. After Google searching… After uploading a couple of “Sophie” pictures to Google and getting several different Facebook profiles, her pictures appeared ona different site, where she was listed as “Cute college girl ofthe day for October 22, 2010”It turns out that people use her (and other college girl photos)to try to get people to accept her as a Facebook friend. Onceshe has been accepted, the hackers can get information onyou and your friends, or get other people to click on links thatwill download malware to their computers.
  24. 24.  Dangerous links in email, IM,How does this Twitter messages, Facebook andhappen? YouTube commentsNow that we know whatsome types of malware  Infected devices: USB sticks, disks,are called, we shouldask, “How do end up laptops, digital photo frameswith malware?”  Online auctions, online dating  Phishing attacks  Fake pop-up alerts
  25. 25.  Underground cybercrime economy  Bigger business than internationalWhy? drug tradeWhy are people doingthis? What’s the point?  Hackers with computer skills and desire for money  Organized online buy/sell of stolen data  Low risk, high reward - many hackers can attack anywhere in the world from their own countries, and most countries don’t have strong laws against hacking
  26. 26.  Zeus is a trojan that steals bankingJust one case: informationZeus using keylogging and form grabbing.  In June 2009, a security company discovered that Zeus had hacked 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, , ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.
  27. 27.  Zeus botnets are thought to include millions of computers (around 3.6Zeus million in the United States).  By October 28, 2009 over 1,500,000 phishing messages were sent on Facebook to spread the Zeus trojan.  November 14–15, 2009 Zeus spread via e-mails saying it was from a telephone company. A total of 9,000,000 of these phishing e-mails were sent.
  28. 28.  It is still active today. In 2010, an internet security company, wrote thatZeus the credit cards of more than 15 unnamed US banks have been stolen using the Zeus malware.  So far, over US $70,000,000 has been stolen from people and companies with Zeus.  More than 90 criminals using Zeus were arrested in the US, England and Ukraine ( 烏克蘭 ).  In May, 2011, the code of Zeus was put online for anyone to use and change.
  29. 29.  Don’t open mail attachments fromSo what can people you don’t know.you do?  Try not to click on links insideHow can you protectyourself from these emails - if you get an email tellingkinds of online threats? you to update your information, go to the website yourself - don’t use their link.  Get a good anti-virus program, spyware remover, and firewall. There are free programs available online, such as avast! antivirus, Grisofts AVG, Microsoft Anti-SpywareWebroot.
  30. 30.  Don’t expect something forSo what can nothing.you do? Don’t download pirated software, orHow can you protectyourself from these “keygens” - software that will give youkinds of online threats? a license number for software.  Don’t friend people on Facebook that you don’t know - even if you think they’re attractive!  Carefully check where your email is coming from - always check the domain name of the sender.
  31. 31.  Go to Facebook. If there are people in your friends list that you don’t really know, put the link to their picture into Google images and see if they areOK Now: really who they say they are.Log into Facebook andcheck through your  Check your email. Are there any emails asking youfriends. Do you reallyknow them? to update your information? If so, check the domain name. Is it really the website it says it is?  Update your anti-virus software and do a full system scan of your computer at least once a week. Change your passwords every 3-4 months  Think! Be skeptical ( 懷疑論的 ) about what people are sending you, and be careful!

×