3. WHAT ARE SOCIAL
ENGINEERS?
• Con artists who employ tactics to trick
computer users into giving up
valuable information.
4. WHAT IS SPOOFING?
• A technique used by malicious
hackers to make it appear that they
are someone else and convince a user
to give up valuable information.
5. WHAT IS MALWARE?
• Collectively, damaging computer
programs that install themselves on
your computer without your
knowledge and consent.
6. TYPES OF MALWARE
• Viruses- a computer program that can reproduce itself by
attaching itself to another file.
• Worm- a computer program that can reproduce itself, but it
does not have to be attached to another file to do its work.
• Trojans- a computer program masquerading as a useful
program that lets hackers into your computer with out you
knowing it.
• Macro Viruses- is usually found in documents that can corrupt
the computer when you open the document and executes the
macro.
• Logic Bomb- can be places in a software system to set off a
series of damaging events.
• Rootkit- a set of programs or utilities designed to gain access
to the “root” of a computer system software that controls the
hardware and software.
7. TYPES OF MALWARE
• Botnet- a collection of “zombie” computers, which are
machines that have been taken over by malware software for
the purpose of generating spam.
• Spyware- it spies on the activity that you do on your
computer.
• Adware- a piece of software designed to deliver ads, in pop-up
form, to users desktops.
• Scareware- a scam where an online warning or pop-up
convinces a user that his or her computer is infected with
malware or has another problem that can be fixed by
purchasing and downloading software.
8. HOW IS MALWARE SPREAD?
• You can infect your computer by clicking on an
email attachment that contains an executable
file.
• Pictures you download can carry viruses stored
in a single pixel of the image.
• Visiting an infected website.
• Viruses can spread from a computer storage
device such as a DVD or flash drive that you
inserted into an infected computer then inserted
into another computer drive.
9. HOW IS MALWARE SPREAD?
• Worms can spread by simply connecting your
computer to an infected network.
• Mobile devices can be infected by downloading
an app, ringtone, game, or theme that carries
malware.
• A mobile device with Bluetooth enabled in
“discoverable mode” could be infected simply by
coming within 30 feet of another Bluetooth
device that has been infected and is running the
same operating system
11. WHAT IS COMPUTER
SECURITY?
• Computer security, also referred to as
information security, involves
protecting the boundaries of your
home or business network and
individual computing devices from
intruders.
12. BASIC TOOLS OF COMPUTER
SECURITY
• Authentication involves the use of passwords
and in some cases other identifiers such as
fingerprints to make sure that people accessing
information are who they say they are.
• Teaching your kids not to click on a link online
that might download a virus
• A company-wide policy identifying who can
access data and establishing procedures for
backing up files to avoid data loss.
13. PROTECTING YOUR HOME
NETWORK
• Changing the password on your router when
your first set it up.
• Use encryption- a part of cryptography, which is
the study of creating algorithms and codes to
protect data.
• Two popular forms of encryption are Wifi-
Protected Access (WPA) and Wired Equivalent
Privacy (WEP).
14. OTHER FORMS OF
PROTECTION
• Locks- laptops have a comparable device, like that of a bike
lock, that you can use to tie them down to an airport chair or
desk in a field office to deter potential thieves from snatching
them.
• Remote Tracking/Wiping- for stronger protection, consider
services such as LoJack for laptops, which allows you to
remotely delete data if your computer is stolen and use GPS to
track it.
• Fingerprint Readers- many of your newer laptops include this
feature and since fingerprints are unique to every individual,
being able to authenticate yourself with your own set of prints
to gain access to your computer is a popular security feature.
15. OTHER FORMS OF
PROTECTION
• Password Protection- it is a very good idea
to activate the password feature on the
computer when you travel in case
someone steals your computer you and
can’t get past the password feature.
• Mobile Computing Policies for Employees-
keeping backups of data on a separate
hard drive, or storage media such as a
flash drive.
16. References
Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to
Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.