This document provides information on computer safety, including definitions of common computer threats like viruses, firewalls, and social engineering. It discusses various types of attacks such as backdoors, denial of service, spoofing, and tampering. Specific social engineering techniques like pretexting and diversion theft are defined. The document also lists advice for safe computing practices and discusses internet dangers for kids. Top viruses and malicious objects detected online are briefly outlined as well.
3. INDEX
• 5 INTERNET DANGERS FOR KIDS
• ATTACKS EVOLUTION
• THE MOST DANGEROUS VIRUS OF THE WORLD
• TOP 8 MALICIOUS OBJECTS DETECTED ONLINE
• SECURITY VIDEO
• BIBLIOGRAPHY
8. SPOOFING
• SPOOFING, is a fraudulent or malicious practice in which communication is sent
from an unknown source disguised as a source known to the receiver. It is the
most prevalent in communication mechanisms that lack a high level of security.
9. BACKDOORS
• BACKDOORS is an algorithm, is any secret method of bypassing
normal authentication or security controls. they may exist for a
number of reasons, including by original design or from poor
configuration. they may have been added by an authorized party
to allow some legitimate access, or by an attacker for malicious
reasons; but regardless of the motives for their existence, they
create a vulnerability
10. TAMPERING
• TAMPERING the act or an instance of interfering with something,
so it no longer works or it works differently. It describes a
malicious modification of products. so-called "evil maid" attacks
and security services planting of surveillance capability into
routers.
11. SOCIAL ENGINEERING
• SOCIAL ENGINEERING aims to convince a user to disclose secrets
such as passwords, card numbers, etc. by, for example,
impersonating a bank, a contractor, or a customer.
12. PHISHING
• PHISHING is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details directly from users.
It is typically carried out by email spoofing or instant messaging.
13. ANTIVIRUS
• The label "antivirus" was originally given to programs that
identified and removed a particular type of malware called a virus.
today, however, antivirus programs are useful for preventing
infections caused by many types of malware.
14. ANTIVIRUS
• When a virus is detected, the computer displays a warning asking
what action should be done, often giving the options to remove,
ignore, or move the file to the vault.
• If your computer is infected with a virus without an antivirus any
number of malicious actions could occur like delete files, prevent
access to files, send spam, spy on you, etc.
15. FIREWALL
• A firewall is a network security system, that uses rules to control incoming and
outgoing network traffic.
• A firewall acts as a barrier between a trusted network and an untrusted network.
A firewall controls access to the resources of a network through a positive
control model.
16. PEER-TO-PEER NET
• PEER-TO-PEER computing or networking is a distributed application
architecture that partitions tasks or workloads between peers. Peers are equally
privileged, equipotent participants in the application.
17. SOCIAL ENGINEERING
• SOCIAL ENGINEERING in the context of information security, refers to
psychological manipulation of people into performing actions or divulging
confidential information. For the purpose of information gathering, fraud, or
system access.
• The attacks used in social engineering can be used to steal employees'
confidential information. The most common type of social engineering happens
over the phone.
18. SOCIAL ENGINEERING TYPES
PRETEXTING
It is the act of creating and using an
invented scenario to engage a targeted
victim in a manner that increases the
chance the victim will divulge information
or perform actions that would be unlikely
in ordinary circumstances. It most often
involves some prior research or setup and
the use of this information for
impersonation to establish legitimacy in
the mind of the target.
DIVERSION THEFT
It is a "con" exercised by
professional thieves, normally
against a transport or courier
company. The objective is to
persuade the persons
responsible for a legitimate
delivery that the consignment is
requested elsewhere.
19. ADVICES
• USE VIRUS PROTECTION SOFTWARE ON YOUR
COMPUTER.
• USE FIREWALL SOFTWARE ON YOUR COMPUTER.
• CONFIGURE YOUR COMPUTER TO DOWNLOAD
CRITICAL UPDATES AUTOMATICALLY.
• SCAN YOUR COMPUTER REGULARLY FOR
SPYWARE.
• RUN MICROSOFT UPDATE PERIODICALLY TO GET
NON-CRITICAL UPDATES.
20. ADVICES
• USE SOCIAL NETWORKING SITES SAFELY
• USE STRONG PASSWORDS.
• NEVER SHARE YOUR PASSWORD
• ACCESS ADMINISTRATIVE DATA ONLY
THROUGH THE ADMINISTRATIVE SYSTEM
INTERFACE.
• CHECK THE CUA CAMPUS RESOURCE
STATUS BOARD FOR PROBLEMS
21. ADVICE
S
• KEEP YOUR WEB BROWSER UP-TO-
DATE AND USE ITS SECURITY
FEATURES.
• EXERCISE EXTREME CAUTION WHEN
OPENING E-MAIL ATTACHMENTS
• USE INSTANT MESSAGING WISELY
• BE CAREFUL WHEN DOWNLOADING
PROGRAMS AND VIEWING WEB
PAGES
22. 5 INTERNET DANGERS FOR
KIDS
1. Pornography
79% of youth’s unwanted exposures to Internet porn take place in the home
2. Sexting
20% of teens have sent or posted a nude or semi-nude image of themselves
3. Cyberbullying
20% of teens say their peers are “mostly unkind” to each other on social
networks.
23. 5 INTERNET DANGERS FOR KIDS
4. Social networks (redefining privacy)
More than 11% of teens are “hyper-networkers,” spending more than
three hours per school day on social network sites.
5. Gaming
One-third of teen gamers (ages 15-17) report playing games with
people they first met online.
25. THE MOST DANGEROUS VIRUS OF THE
WORLD
FRIDAY THE 13TH OR
JERUSALEM
CREATED IN ISRAEL IN 1988, FOR THE
ANNIVERSARY OF THE STATE JEW IN THE
CITY OF JERUSALEM. EVERY FRIDAY THE
13TH, ALL PROGRAMS THAT TRIED TO RUN
ON YOUR COMPUTER IS ERASED
CASCADE OR FALLING
LETTERS
WAS BORN IN GERMANY IN 1997.
WHEN A PC IS INFECTED WITH THIS
VIRUS, DID FALL THE LYRICS OF THE
SCREEN AS IF IS WERE OF A
WATERFALL.
26. THE MOST DANGEROUS VIRUS OF THE
WORLD
LOVELETTER
IT IS A THE VIRUS LOVING APPEARED IN THE
YEAR 2000, FROM PHILIPPINES. IT ARRIVED
WITH THE SUBJECT ILOVEYOU AND WAS
CAPABLE OF INFECTING MILLIONS OF
COMPUTERS AND IMPORTANT INSTITUTIONS
LIKE THE PENTAGON.
NIMDA
(CHINA , 2001) THE NAME COMES
FROM ADMIN, IT WAS ABLE TO CREATE
ADMINISTRATOR PRIVILEGES ON THE
AFFECTED COMPUTER.
27. THE MOST DANGEROUS VIRUS OF THE
WORLDCIH OR
CHERNOBYL
HE WAS BORN IN 1998 IN TAIWAN,
AND ONLY TOOK A WEEK TO SPREAD
AND INFECT THOUSANDS OF
COMPUTERS.
BLASTER
(USA, 2003) THIS VIRUS, CONTAINING THE
MESSAGE CODE: "I JUST WANT TO SAY
LOVE YOU SAN!" AND HE ADDED "BILLY
GATES WHY DO POSSIBLE THIS? "FOR OF
MAKE MONEY AND FIX YOUR SOFTWARE".
28. TOP 8 MALICIOUS OBJECTS DETECTED
ONLINE
80%
9%
8%
1%
1%
1%
0%
0%
% of all attacks
Malicious URL
Trojan.Script.Generic
Trojan.Script.Iframer
Trojan.Win32.Generic
Expoit.Script.Blocker
Trojan-Downloader.Win32.Generic
Trojan-Downloader.Script.Generic
Trojan.JS.Redirector.ads