SlideShare a Scribd company logo
1 of 31
COMPUTER
SAFETY
INDEX
• DEFINITION
• VULNERABILITIES AND ATTACKS
• ANTIVIRUS
• FIREWALL
• PEER-TO-PEER NET
• SOCIAL ENGINEERING
• ADVICES
INDEX
• 5 INTERNET DANGERS FOR KIDS
• ATTACKS EVOLUTION
• THE MOST DANGEROUS VIRUS OF THE WORLD
• TOP 8 MALICIOUS OBJECTS DETECTED ONLINE
• SECURITY VIDEO
• BIBLIOGRAPHY
DEFINITION
FIREWALL PASSWORD
ANTIVIRUS EMAIL SCAN
COMPUTING
SAFETY
VULNERABILITIES AND ATTACKS
• 1.1 BACKDOORS
• 1.2 DENIAL-OF-SERVICE ATTACK
• 1.3 DIRECT-ACCESS ATTACKS
• 1.4 EAVESDROPPING
• 1.5 SPOOFING
• 1.6 TAMPERING
• 1.7 PRIVILEGE ESCALATION
• 1.8 PHISHING
• 1.9 CLICKJACKING
• 1.10SOCIAL ENGINEERING
ATTACK
SPOOFING
• SPOOFING, is a fraudulent or malicious practice in which communication is sent
from an unknown source disguised as a source known to the receiver. It is the
most prevalent in communication mechanisms that lack a high level of security.
BACKDOORS
• BACKDOORS is an algorithm, is any secret method of bypassing
normal authentication or security controls. they may exist for a
number of reasons, including by original design or from poor
configuration. they may have been added by an authorized party
to allow some legitimate access, or by an attacker for malicious
reasons; but regardless of the motives for their existence, they
create a vulnerability
TAMPERING
• TAMPERING the act or an instance of interfering with something,
so it no longer works or it works differently. It describes a
malicious modification of products. so-called "evil maid" attacks
and security services planting of surveillance capability into
routers.
SOCIAL ENGINEERING
• SOCIAL ENGINEERING aims to convince a user to disclose secrets
such as passwords, card numbers, etc. by, for example,
impersonating a bank, a contractor, or a customer.
PHISHING
• PHISHING is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details directly from users.
It is typically carried out by email spoofing or instant messaging.
ANTIVIRUS
• The label "antivirus" was originally given to programs that
identified and removed a particular type of malware called a virus.
today, however, antivirus programs are useful for preventing
infections caused by many types of malware.
ANTIVIRUS
• When a virus is detected, the computer displays a warning asking
what action should be done, often giving the options to remove,
ignore, or move the file to the vault.
• If your computer is infected with a virus without an antivirus any
number of malicious actions could occur like delete files, prevent
access to files, send spam, spy on you, etc.
FIREWALL
• A firewall is a network security system, that uses rules to control incoming and
outgoing network traffic.
• A firewall acts as a barrier between a trusted network and an untrusted network.
A firewall controls access to the resources of a network through a positive
control model.
PEER-TO-PEER NET
• PEER-TO-PEER computing or networking is a distributed application
architecture that partitions tasks or workloads between peers. Peers are equally
privileged, equipotent participants in the application.
SOCIAL ENGINEERING
• SOCIAL ENGINEERING in the context of information security, refers to
psychological manipulation of people into performing actions or divulging
confidential information. For the purpose of information gathering, fraud, or
system access.
• The attacks used in social engineering can be used to steal employees'
confidential information. The most common type of social engineering happens
over the phone.
SOCIAL ENGINEERING TYPES
PRETEXTING
It is the act of creating and using an
invented scenario to engage a targeted
victim in a manner that increases the
chance the victim will divulge information
or perform actions that would be unlikely
in ordinary circumstances. It most often
involves some prior research or setup and
the use of this information for
impersonation to establish legitimacy in
the mind of the target.
DIVERSION THEFT
It is a "con" exercised by
professional thieves, normally
against a transport or courier
company. The objective is to
persuade the persons
responsible for a legitimate
delivery that the consignment is
requested elsewhere.
ADVICES
• USE VIRUS PROTECTION SOFTWARE ON YOUR
COMPUTER.
• USE FIREWALL SOFTWARE ON YOUR COMPUTER.
• CONFIGURE YOUR COMPUTER TO DOWNLOAD
CRITICAL UPDATES AUTOMATICALLY.
• SCAN YOUR COMPUTER REGULARLY FOR
SPYWARE.
• RUN MICROSOFT UPDATE PERIODICALLY TO GET
NON-CRITICAL UPDATES.
ADVICES
• USE SOCIAL NETWORKING SITES SAFELY
• USE STRONG PASSWORDS.
• NEVER SHARE YOUR PASSWORD
• ACCESS ADMINISTRATIVE DATA ONLY
THROUGH THE ADMINISTRATIVE SYSTEM
INTERFACE.
• CHECK THE CUA CAMPUS RESOURCE
STATUS BOARD FOR PROBLEMS
ADVICE
S
• KEEP YOUR WEB BROWSER UP-TO-
DATE AND USE ITS SECURITY
FEATURES.
• EXERCISE EXTREME CAUTION WHEN
OPENING E-MAIL ATTACHMENTS
• USE INSTANT MESSAGING WISELY
• BE CAREFUL WHEN DOWNLOADING
PROGRAMS AND VIEWING WEB
PAGES
5 INTERNET DANGERS FOR
KIDS
1. Pornography
79% of youth’s unwanted exposures to Internet porn take place in the home
2. Sexting
20% of teens have sent or posted a nude or semi-nude image of themselves
3. Cyberbullying
20% of teens say their peers are “mostly unkind” to each other on social
networks.
5 INTERNET DANGERS FOR KIDS
4. Social networks (redefining privacy)
More than 11% of teens are “hyper-networkers,” spending more than
three hours per school day on social network sites.
5. Gaming
One-third of teen gamers (ages 15-17) report playing games with
people they first met online.
ATTACKS EVOLUTION
Viru
s
1977
Breaki
ng
web
sites
1995
Maliciou
s code
(Melissa)
2000
I LOVE
YOU
(trojan)
2003/
2004
Phishin
g
2005
/2006
Organized
crime data
theft
2007/
2008
THE MOST DANGEROUS VIRUS OF THE
WORLD
FRIDAY THE 13TH OR
JERUSALEM
CREATED IN ISRAEL IN 1988, FOR THE
ANNIVERSARY OF THE STATE JEW IN THE
CITY OF JERUSALEM. EVERY FRIDAY THE
13TH, ALL PROGRAMS THAT TRIED TO RUN
ON YOUR COMPUTER IS ERASED
CASCADE OR FALLING
LETTERS
WAS BORN IN GERMANY IN 1997.
WHEN A PC IS INFECTED WITH THIS
VIRUS, DID FALL THE LYRICS OF THE
SCREEN AS IF IS WERE OF A
WATERFALL.
THE MOST DANGEROUS VIRUS OF THE
WORLD
LOVELETTER
IT IS A THE VIRUS LOVING APPEARED IN THE
YEAR 2000, FROM PHILIPPINES. IT ARRIVED
WITH THE SUBJECT ILOVEYOU AND WAS
CAPABLE OF INFECTING MILLIONS OF
COMPUTERS AND IMPORTANT INSTITUTIONS
LIKE THE PENTAGON.
NIMDA
(CHINA , 2001) THE NAME COMES
FROM ADMIN, IT WAS ABLE TO CREATE
ADMINISTRATOR PRIVILEGES ON THE
AFFECTED COMPUTER.
THE MOST DANGEROUS VIRUS OF THE
WORLDCIH OR
CHERNOBYL
HE WAS BORN IN 1998 IN TAIWAN,
AND ONLY TOOK A WEEK TO SPREAD
AND INFECT THOUSANDS OF
COMPUTERS.
BLASTER
(USA, 2003) THIS VIRUS, CONTAINING THE
MESSAGE CODE: "I JUST WANT TO SAY
LOVE YOU SAN!" AND HE ADDED "BILLY
GATES WHY DO POSSIBLE THIS? "FOR OF
MAKE MONEY AND FIX YOUR SOFTWARE".
TOP 8 MALICIOUS OBJECTS DETECTED
ONLINE
80%
9%
8%
1%
1%
1%
0%
0%
% of all attacks
Malicious URL
Trojan.Script.Generic
Trojan.Script.Iframer
Trojan.Win32.Generic
Expoit.Script.Blocker
Trojan-Downloader.Win32.Generic
Trojan-Downloader.Script.Generic
Trojan.JS.Redirector.ads
SECURITY VIDEO
THE END
BIBLIOGRAPHY
• HTTP://COMPUTING.CUA.EDU/SECURITY/SECURITY-HINTS.CFM
• HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ANTIVIRUS-
SOFTWARE
• HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/FIREWALL

More Related Content

What's hot

The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of TechnologyJacquireEllis
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
The Effects Of Ict
The Effects Of IctThe Effects Of Ict
The Effects Of Ictroyjulian
 
The Effects of ICT
The Effects of ICTThe Effects of ICT
The Effects of ICTroyjulian
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying Saskia1234
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computersEric Fickes
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 

What's hot (20)

The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of Technology
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
COmPuter
COmPuterCOmPuter
COmPuter
 
The Effects Of Ict
The Effects Of IctThe Effects Of Ict
The Effects Of Ict
 
The Effects of ICT
The Effects of ICTThe Effects of ICT
The Effects of ICT
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Sumang singhal wifi
Sumang singhal wifiSumang singhal wifi
Sumang singhal wifi
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computers
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 

Similar to Computer Safety: A Guide to Defending Against Cyber Threats

Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 

Similar to Computer Safety: A Guide to Defending Against Cyber Threats (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
cyber crime
cyber crime cyber crime
cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 

Computer Safety: A Guide to Defending Against Cyber Threats

  • 2. INDEX • DEFINITION • VULNERABILITIES AND ATTACKS • ANTIVIRUS • FIREWALL • PEER-TO-PEER NET • SOCIAL ENGINEERING • ADVICES
  • 3. INDEX • 5 INTERNET DANGERS FOR KIDS • ATTACKS EVOLUTION • THE MOST DANGEROUS VIRUS OF THE WORLD • TOP 8 MALICIOUS OBJECTS DETECTED ONLINE • SECURITY VIDEO • BIBLIOGRAPHY
  • 5. FIREWALL PASSWORD ANTIVIRUS EMAIL SCAN COMPUTING SAFETY
  • 6. VULNERABILITIES AND ATTACKS • 1.1 BACKDOORS • 1.2 DENIAL-OF-SERVICE ATTACK • 1.3 DIRECT-ACCESS ATTACKS • 1.4 EAVESDROPPING • 1.5 SPOOFING • 1.6 TAMPERING • 1.7 PRIVILEGE ESCALATION • 1.8 PHISHING • 1.9 CLICKJACKING • 1.10SOCIAL ENGINEERING
  • 8. SPOOFING • SPOOFING, is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. It is the most prevalent in communication mechanisms that lack a high level of security.
  • 9. BACKDOORS • BACKDOORS is an algorithm, is any secret method of bypassing normal authentication or security controls. they may exist for a number of reasons, including by original design or from poor configuration. they may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability
  • 10. TAMPERING • TAMPERING the act or an instance of interfering with something, so it no longer works or it works differently. It describes a malicious modification of products. so-called "evil maid" attacks and security services planting of surveillance capability into routers.
  • 11. SOCIAL ENGINEERING • SOCIAL ENGINEERING aims to convince a user to disclose secrets such as passwords, card numbers, etc. by, for example, impersonating a bank, a contractor, or a customer.
  • 12. PHISHING • PHISHING is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users. It is typically carried out by email spoofing or instant messaging.
  • 13. ANTIVIRUS • The label "antivirus" was originally given to programs that identified and removed a particular type of malware called a virus. today, however, antivirus programs are useful for preventing infections caused by many types of malware.
  • 14. ANTIVIRUS • When a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault. • If your computer is infected with a virus without an antivirus any number of malicious actions could occur like delete files, prevent access to files, send spam, spy on you, etc.
  • 15. FIREWALL • A firewall is a network security system, that uses rules to control incoming and outgoing network traffic. • A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model.
  • 16. PEER-TO-PEER NET • PEER-TO-PEER computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application.
  • 17. SOCIAL ENGINEERING • SOCIAL ENGINEERING in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. For the purpose of information gathering, fraud, or system access. • The attacks used in social engineering can be used to steal employees' confidential information. The most common type of social engineering happens over the phone.
  • 18. SOCIAL ENGINEERING TYPES PRETEXTING It is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. It most often involves some prior research or setup and the use of this information for impersonation to establish legitimacy in the mind of the target. DIVERSION THEFT It is a "con" exercised by professional thieves, normally against a transport or courier company. The objective is to persuade the persons responsible for a legitimate delivery that the consignment is requested elsewhere.
  • 19. ADVICES • USE VIRUS PROTECTION SOFTWARE ON YOUR COMPUTER. • USE FIREWALL SOFTWARE ON YOUR COMPUTER. • CONFIGURE YOUR COMPUTER TO DOWNLOAD CRITICAL UPDATES AUTOMATICALLY. • SCAN YOUR COMPUTER REGULARLY FOR SPYWARE. • RUN MICROSOFT UPDATE PERIODICALLY TO GET NON-CRITICAL UPDATES.
  • 20. ADVICES • USE SOCIAL NETWORKING SITES SAFELY • USE STRONG PASSWORDS. • NEVER SHARE YOUR PASSWORD • ACCESS ADMINISTRATIVE DATA ONLY THROUGH THE ADMINISTRATIVE SYSTEM INTERFACE. • CHECK THE CUA CAMPUS RESOURCE STATUS BOARD FOR PROBLEMS
  • 21. ADVICE S • KEEP YOUR WEB BROWSER UP-TO- DATE AND USE ITS SECURITY FEATURES. • EXERCISE EXTREME CAUTION WHEN OPENING E-MAIL ATTACHMENTS • USE INSTANT MESSAGING WISELY • BE CAREFUL WHEN DOWNLOADING PROGRAMS AND VIEWING WEB PAGES
  • 22. 5 INTERNET DANGERS FOR KIDS 1. Pornography 79% of youth’s unwanted exposures to Internet porn take place in the home 2. Sexting 20% of teens have sent or posted a nude or semi-nude image of themselves 3. Cyberbullying 20% of teens say their peers are “mostly unkind” to each other on social networks.
  • 23. 5 INTERNET DANGERS FOR KIDS 4. Social networks (redefining privacy) More than 11% of teens are “hyper-networkers,” spending more than three hours per school day on social network sites. 5. Gaming One-third of teen gamers (ages 15-17) report playing games with people they first met online.
  • 24. ATTACKS EVOLUTION Viru s 1977 Breaki ng web sites 1995 Maliciou s code (Melissa) 2000 I LOVE YOU (trojan) 2003/ 2004 Phishin g 2005 /2006 Organized crime data theft 2007/ 2008
  • 25. THE MOST DANGEROUS VIRUS OF THE WORLD FRIDAY THE 13TH OR JERUSALEM CREATED IN ISRAEL IN 1988, FOR THE ANNIVERSARY OF THE STATE JEW IN THE CITY OF JERUSALEM. EVERY FRIDAY THE 13TH, ALL PROGRAMS THAT TRIED TO RUN ON YOUR COMPUTER IS ERASED CASCADE OR FALLING LETTERS WAS BORN IN GERMANY IN 1997. WHEN A PC IS INFECTED WITH THIS VIRUS, DID FALL THE LYRICS OF THE SCREEN AS IF IS WERE OF A WATERFALL.
  • 26. THE MOST DANGEROUS VIRUS OF THE WORLD LOVELETTER IT IS A THE VIRUS LOVING APPEARED IN THE YEAR 2000, FROM PHILIPPINES. IT ARRIVED WITH THE SUBJECT ILOVEYOU AND WAS CAPABLE OF INFECTING MILLIONS OF COMPUTERS AND IMPORTANT INSTITUTIONS LIKE THE PENTAGON. NIMDA (CHINA , 2001) THE NAME COMES FROM ADMIN, IT WAS ABLE TO CREATE ADMINISTRATOR PRIVILEGES ON THE AFFECTED COMPUTER.
  • 27. THE MOST DANGEROUS VIRUS OF THE WORLDCIH OR CHERNOBYL HE WAS BORN IN 1998 IN TAIWAN, AND ONLY TOOK A WEEK TO SPREAD AND INFECT THOUSANDS OF COMPUTERS. BLASTER (USA, 2003) THIS VIRUS, CONTAINING THE MESSAGE CODE: "I JUST WANT TO SAY LOVE YOU SAN!" AND HE ADDED "BILLY GATES WHY DO POSSIBLE THIS? "FOR OF MAKE MONEY AND FIX YOUR SOFTWARE".
  • 28. TOP 8 MALICIOUS OBJECTS DETECTED ONLINE 80% 9% 8% 1% 1% 1% 0% 0% % of all attacks Malicious URL Trojan.Script.Generic Trojan.Script.Iframer Trojan.Win32.Generic Expoit.Script.Blocker Trojan-Downloader.Win32.Generic Trojan-Downloader.Script.Generic Trojan.JS.Redirector.ads