SlideShare a Scribd company logo
1 of 16
Protection Against
Cyber Crime
Summer Pair
SOCIAL ENGINEERS
AND
MALWARE
WHAT ARE SOCIAL
ENGINEERS?
• Con artists who employ tactics to trick
computer users into giving up
valuable information.
WHAT IS SPOOFING?
• A technique used by malicious
hackers to make it appear that they
are someone else and convince a user
to give up valuable information.
WHAT IS MALWARE?
• Collectively, damaging computer
programs that install themselves on
your computer without your
knowledge and consent.
TYPES OF MALWARE
• Viruses- a computer program that can reproduce itself by
attaching itself to another file.
• Worm- a computer program that can reproduce itself, but it
does not have to be attached to another file to do its work.
• Trojans- a computer program masquerading as a useful
program that lets hackers into your computer with out you
knowing it.
• Macro Viruses- is usually found in documents that can corrupt
the computer when you open the document and executes the
macro.
• Logic Bomb- can be places in a software system to set off a
series of damaging events.
• Rootkit- a set of programs or utilities designed to gain access
to the “root” of a computer system software that controls the
hardware and software.
TYPES OF MALWARE
• Botnet- a collection of “zombie” computers, which are
machines that have been taken over by malware software for
the purpose of generating spam.
• Spyware- it spies on the activity that you do on your
computer.
• Adware- a piece of software designed to deliver ads, in pop-up
form, to users desktops.
• Scareware- a scam where an online warning or pop-up
convinces a user that his or her computer is infected with
malware or has another problem that can be fixed by
purchasing and downloading software.
HOW IS MALWARE SPREAD?
• You can infect your computer by clicking on an
email attachment that contains an executable
file.
• Pictures you download can carry viruses stored
in a single pixel of the image.
• Visiting an infected website.
• Viruses can spread from a computer storage
device such as a DVD or flash drive that you
inserted into an infected computer then inserted
into another computer drive.
HOW IS MALWARE SPREAD?
• Worms can spread by simply connecting your
computer to an infected network.
• Mobile devices can be infected by downloading
an app, ringtone, game, or theme that carries
malware.
• A mobile device with Bluetooth enabled in
“discoverable mode” could be infected simply by
coming within 30 feet of another Bluetooth
device that has been infected and is running the
same operating system
PROTECTING YOUR
COMPUTER
WHAT IS COMPUTER
SECURITY?
• Computer security, also referred to as
information security, involves
protecting the boundaries of your
home or business network and
individual computing devices from
intruders.
BASIC TOOLS OF COMPUTER
SECURITY
• Authentication involves the use of passwords
and in some cases other identifiers such as
fingerprints to make sure that people accessing
information are who they say they are.
• Teaching your kids not to click on a link online
that might download a virus
• A company-wide policy identifying who can
access data and establishing procedures for
backing up files to avoid data loss.
PROTECTING YOUR HOME
NETWORK
• Changing the password on your router when
your first set it up.
• Use encryption- a part of cryptography, which is
the study of creating algorithms and codes to
protect data.
• Two popular forms of encryption are Wifi-
Protected Access (WPA) and Wired Equivalent
Privacy (WEP).
OTHER FORMS OF
PROTECTION
• Locks- laptops have a comparable device, like that of a bike
lock, that you can use to tie them down to an airport chair or
desk in a field office to deter potential thieves from snatching
them.
• Remote Tracking/Wiping- for stronger protection, consider
services such as LoJack for laptops, which allows you to
remotely delete data if your computer is stolen and use GPS to
track it.
• Fingerprint Readers- many of your newer laptops include this
feature and since fingerprints are unique to every individual,
being able to authenticate yourself with your own set of prints
to gain access to your computer is a popular security feature.
OTHER FORMS OF
PROTECTION
• Password Protection- it is a very good idea
to activate the password feature on the
computer when you travel in case
someone steals your computer you and
can’t get past the password feature.
• Mobile Computing Policies for Employees-
keeping backups of data on a separate
hard drive, or storage media such as a
flash drive.
References
Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to
Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.

More Related Content

What's hot

Firewall
FirewallFirewall
FirewallGarmian
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Security Basics
Security BasicsSecurity Basics
Security BasicsRishi Prasath
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware KashifKhan417
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horsesEILLEN IVY PORTUGUEZ
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

Fb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bFb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bpps1111
 
Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated Statewide Insurance Brokers
 
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival ManualStatewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival ManualStatewide Insurance Brokers
 
RECEL TRAINER CV
RECEL TRAINER CVRECEL TRAINER CV
RECEL TRAINER CVRecel Callado
 
Cara Membuat Wordpress
Cara Membuat WordpressCara Membuat Wordpress
Cara Membuat WordpressDeltaForce666
 
Amazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online TrainingAmazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online TrainingGlory IT Technologies
 
Outlook ppt
Outlook pptOutlook ppt
Outlook pptmarry jeams
 
Statewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insuranceStatewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insuranceStatewide Insurance Brokers
 
Blog corporativo final
Blog corporativo finalBlog corporativo final
Blog corporativo finaltilzayined
 
Statewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance UpgradesStatewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance UpgradesStatewide Insurance Brokers
 

Viewers also liked (19)

Experience Certificates
Experience CertificatesExperience Certificates
Experience Certificates
 
Benefits Of Constant Customer Contact
Benefits Of Constant Customer ContactBenefits Of Constant Customer Contact
Benefits Of Constant Customer Contact
 
SalonCover Insurance Business claim form
SalonCover Insurance Business claim formSalonCover Insurance Business claim form
SalonCover Insurance Business claim form
 
Fb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bFb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-b
 
DevOps Online Training
DevOps Online TrainingDevOps Online Training
DevOps Online Training
 
Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated
 
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival ManualStatewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
 
RECEL TRAINER CV
RECEL TRAINER CVRECEL TRAINER CV
RECEL TRAINER CV
 
Statewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the KeyStatewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the Key
 
Cara Membuat Wordpress
Cara Membuat WordpressCara Membuat Wordpress
Cara Membuat Wordpress
 
Internet
InternetInternet
Internet
 
Amazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online TrainingAmazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online Training
 
Outlook ppt
Outlook pptOutlook ppt
Outlook ppt
 
Ansvar Care Facilities PDS
Ansvar Care Facilities PDSAnsvar Care Facilities PDS
Ansvar Care Facilities PDS
 
CGU Business Pack Insurance Policy
CGU Business Pack Insurance PolicyCGU Business Pack Insurance Policy
CGU Business Pack Insurance Policy
 
Statewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insuranceStatewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insurance
 
Blog corporativo final
Blog corporativo finalBlog corporativo final
Blog corporativo final
 
Statewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance UpgradesStatewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance Upgrades
 
What is your Underwriter Looking For ?
What is your Underwriter Looking For ?What is your Underwriter Looking For ?
What is your Underwriter Looking For ?
 

Similar to Protect Against Cyber Crime

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Firewall
FirewallFirewall
Firewallsajeena81
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.SangishettyDikshitha
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 

Similar to Protect Against Cyber Crime (20)

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious
MaliciousMalicious
Malicious
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Cyber security
Cyber securityCyber security
Cyber security
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Firewall
FirewallFirewall
Firewall
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Protect Against Cyber Crime

  • 3. WHAT ARE SOCIAL ENGINEERS? • Con artists who employ tactics to trick computer users into giving up valuable information.
  • 4. WHAT IS SPOOFING? • A technique used by malicious hackers to make it appear that they are someone else and convince a user to give up valuable information.
  • 5. WHAT IS MALWARE? • Collectively, damaging computer programs that install themselves on your computer without your knowledge and consent.
  • 6. TYPES OF MALWARE • Viruses- a computer program that can reproduce itself by attaching itself to another file. • Worm- a computer program that can reproduce itself, but it does not have to be attached to another file to do its work. • Trojans- a computer program masquerading as a useful program that lets hackers into your computer with out you knowing it. • Macro Viruses- is usually found in documents that can corrupt the computer when you open the document and executes the macro. • Logic Bomb- can be places in a software system to set off a series of damaging events. • Rootkit- a set of programs or utilities designed to gain access to the “root” of a computer system software that controls the hardware and software.
  • 7. TYPES OF MALWARE • Botnet- a collection of “zombie” computers, which are machines that have been taken over by malware software for the purpose of generating spam. • Spyware- it spies on the activity that you do on your computer. • Adware- a piece of software designed to deliver ads, in pop-up form, to users desktops. • Scareware- a scam where an online warning or pop-up convinces a user that his or her computer is infected with malware or has another problem that can be fixed by purchasing and downloading software.
  • 8. HOW IS MALWARE SPREAD? • You can infect your computer by clicking on an email attachment that contains an executable file. • Pictures you download can carry viruses stored in a single pixel of the image. • Visiting an infected website. • Viruses can spread from a computer storage device such as a DVD or flash drive that you inserted into an infected computer then inserted into another computer drive.
  • 9. HOW IS MALWARE SPREAD? • Worms can spread by simply connecting your computer to an infected network. • Mobile devices can be infected by downloading an app, ringtone, game, or theme that carries malware. • A mobile device with Bluetooth enabled in “discoverable mode” could be infected simply by coming within 30 feet of another Bluetooth device that has been infected and is running the same operating system
  • 11. WHAT IS COMPUTER SECURITY? • Computer security, also referred to as information security, involves protecting the boundaries of your home or business network and individual computing devices from intruders.
  • 12. BASIC TOOLS OF COMPUTER SECURITY • Authentication involves the use of passwords and in some cases other identifiers such as fingerprints to make sure that people accessing information are who they say they are. • Teaching your kids not to click on a link online that might download a virus • A company-wide policy identifying who can access data and establishing procedures for backing up files to avoid data loss.
  • 13. PROTECTING YOUR HOME NETWORK • Changing the password on your router when your first set it up. • Use encryption- a part of cryptography, which is the study of creating algorithms and codes to protect data. • Two popular forms of encryption are Wifi- Protected Access (WPA) and Wired Equivalent Privacy (WEP).
  • 14. OTHER FORMS OF PROTECTION • Locks- laptops have a comparable device, like that of a bike lock, that you can use to tie them down to an airport chair or desk in a field office to deter potential thieves from snatching them. • Remote Tracking/Wiping- for stronger protection, consider services such as LoJack for laptops, which allows you to remotely delete data if your computer is stolen and use GPS to track it. • Fingerprint Readers- many of your newer laptops include this feature and since fingerprints are unique to every individual, being able to authenticate yourself with your own set of prints to gain access to your computer is a popular security feature.
  • 15. OTHER FORMS OF PROTECTION • Password Protection- it is a very good idea to activate the password feature on the computer when you travel in case someone steals your computer you and can’t get past the password feature. • Mobile Computing Policies for Employees- keeping backups of data on a separate hard drive, or storage media such as a flash drive.
  • 16. References Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.