SlideShare a Scribd company logo
1 of 16
Protection Against
Cyber Crime
Summer Pair
SOCIAL ENGINEERS
AND
MALWARE
WHAT ARE SOCIAL
ENGINEERS?
• Con artists who employ tactics to trick
computer users into giving up
valuable information.
WHAT IS SPOOFING?
• A technique used by malicious
hackers to make it appear that they
are someone else and convince a user
to give up valuable information.
WHAT IS MALWARE?
• Collectively, damaging computer
programs that install themselves on
your computer without your
knowledge and consent.
TYPES OF MALWARE
• Viruses- a computer program that can reproduce itself by
attaching itself to another file.
• Worm- a computer program that can reproduce itself, but it
does not have to be attached to another file to do its work.
• Trojans- a computer program masquerading as a useful
program that lets hackers into your computer with out you
knowing it.
• Macro Viruses- is usually found in documents that can corrupt
the computer when you open the document and executes the
macro.
• Logic Bomb- can be places in a software system to set off a
series of damaging events.
• Rootkit- a set of programs or utilities designed to gain access
to the “root” of a computer system software that controls the
hardware and software.
TYPES OF MALWARE
• Botnet- a collection of “zombie” computers, which are
machines that have been taken over by malware software for
the purpose of generating spam.
• Spyware- it spies on the activity that you do on your
computer.
• Adware- a piece of software designed to deliver ads, in pop-up
form, to users desktops.
• Scareware- a scam where an online warning or pop-up
convinces a user that his or her computer is infected with
malware or has another problem that can be fixed by
purchasing and downloading software.
HOW IS MALWARE SPREAD?
• You can infect your computer by clicking on an
email attachment that contains an executable
file.
• Pictures you download can carry viruses stored
in a single pixel of the image.
• Visiting an infected website.
• Viruses can spread from a computer storage
device such as a DVD or flash drive that you
inserted into an infected computer then inserted
into another computer drive.
HOW IS MALWARE SPREAD?
• Worms can spread by simply connecting your
computer to an infected network.
• Mobile devices can be infected by downloading
an app, ringtone, game, or theme that carries
malware.
• A mobile device with Bluetooth enabled in
“discoverable mode” could be infected simply by
coming within 30 feet of another Bluetooth
device that has been infected and is running the
same operating system
PROTECTING YOUR
COMPUTER
WHAT IS COMPUTER
SECURITY?
• Computer security, also referred to as
information security, involves
protecting the boundaries of your
home or business network and
individual computing devices from
intruders.
BASIC TOOLS OF COMPUTER
SECURITY
• Authentication involves the use of passwords
and in some cases other identifiers such as
fingerprints to make sure that people accessing
information are who they say they are.
• Teaching your kids not to click on a link online
that might download a virus
• A company-wide policy identifying who can
access data and establishing procedures for
backing up files to avoid data loss.
PROTECTING YOUR HOME
NETWORK
• Changing the password on your router when
your first set it up.
• Use encryption- a part of cryptography, which is
the study of creating algorithms and codes to
protect data.
• Two popular forms of encryption are Wifi-
Protected Access (WPA) and Wired Equivalent
Privacy (WEP).
OTHER FORMS OF
PROTECTION
• Locks- laptops have a comparable device, like that of a bike
lock, that you can use to tie them down to an airport chair or
desk in a field office to deter potential thieves from snatching
them.
• Remote Tracking/Wiping- for stronger protection, consider
services such as LoJack for laptops, which allows you to
remotely delete data if your computer is stolen and use GPS to
track it.
• Fingerprint Readers- many of your newer laptops include this
feature and since fingerprints are unique to every individual,
being able to authenticate yourself with your own set of prints
to gain access to your computer is a popular security feature.
OTHER FORMS OF
PROTECTION
• Password Protection- it is a very good idea
to activate the password feature on the
computer when you travel in case
someone steals your computer you and
can’t get past the password feature.
• Mobile Computing Policies for Employees-
keeping backups of data on a separate
hard drive, or storage media such as a
flash drive.
References
Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to
Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.

More Related Content

What's hot

Firewall
FirewallFirewall
FirewallGarmian
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

MegaNatural® Grape Seed Extracts And Their Role In Sports Nutrition
MegaNatural® Grape Seed Extracts And Their Role In Sports NutritionMegaNatural® Grape Seed Extracts And Their Role In Sports Nutrition
MegaNatural® Grape Seed Extracts And Their Role In Sports NutritionGregory T. Arabatzis
 
Workers Compensation, WorkCover WA 2b Claim Form
Workers Compensation, WorkCover WA 2b Claim FormWorkers Compensation, WorkCover WA 2b Claim Form
Workers Compensation, WorkCover WA 2b Claim FormStatewide Insurance Brokers
 
Updated Resume December to Hays
Updated Resume December to HaysUpdated Resume December to Hays
Updated Resume December to HaysKim Nichols
 
Theresa Bean MAR Thesis FINAL
Theresa Bean MAR Thesis FINALTheresa Bean MAR Thesis FINAL
Theresa Bean MAR Thesis FINALTheresa Bean
 
Statewide Insurance Brokers - Anziif 2015 course guide & qualifications
Statewide Insurance Brokers - Anziif 2015 course guide & qualificationsStatewide Insurance Brokers - Anziif 2015 course guide & qualifications
Statewide Insurance Brokers - Anziif 2015 course guide & qualificationsStatewide Insurance Brokers
 
thank u for coming
thank u for comingthank u for coming
thank u for comingEL NA
 

Viewers also liked (17)

Limousine Insurance Proposal Form, Lumley
Limousine Insurance Proposal Form, LumleyLimousine Insurance Proposal Form, Lumley
Limousine Insurance Proposal Form, Lumley
 
What is your Underwriter Looking For ?
What is your Underwriter Looking For ?What is your Underwriter Looking For ?
What is your Underwriter Looking For ?
 
MegaNatural® Grape Seed Extracts And Their Role In Sports Nutrition
MegaNatural® Grape Seed Extracts And Their Role In Sports NutritionMegaNatural® Grape Seed Extracts And Their Role In Sports Nutrition
MegaNatural® Grape Seed Extracts And Their Role In Sports Nutrition
 
Workers Compensation, WorkCover WA 2b Claim Form
Workers Compensation, WorkCover WA 2b Claim FormWorkers Compensation, WorkCover WA 2b Claim Form
Workers Compensation, WorkCover WA 2b Claim Form
 
Updated Resume December to Hays
Updated Resume December to HaysUpdated Resume December to Hays
Updated Resume December to Hays
 
3455 BK LAYOUT_3
3455 BK LAYOUT_33455 BK LAYOUT_3
3455 BK LAYOUT_3
 
Theresa Bean MAR Thesis FINAL
Theresa Bean MAR Thesis FINALTheresa Bean MAR Thesis FINAL
Theresa Bean MAR Thesis FINAL
 
NIBS August 2015
NIBS August 2015NIBS August 2015
NIBS August 2015
 
Statewide Insurance - Lifecycle
Statewide Insurance - LifecycleStatewide Insurance - Lifecycle
Statewide Insurance - Lifecycle
 
Federal Budget 2015 - A Snapshot for Business
Federal Budget 2015 - A Snapshot for BusinessFederal Budget 2015 - A Snapshot for Business
Federal Budget 2015 - A Snapshot for Business
 
Summer Magazine 2016
Summer Magazine 2016Summer Magazine 2016
Summer Magazine 2016
 
Ansvar Faith Insurance Proposal Form
Ansvar Faith Insurance Proposal FormAnsvar Faith Insurance Proposal Form
Ansvar Faith Insurance Proposal Form
 
Statewide Insurance Brokers - Anziif 2015 course guide & qualifications
Statewide Insurance Brokers - Anziif 2015 course guide & qualificationsStatewide Insurance Brokers - Anziif 2015 course guide & qualifications
Statewide Insurance Brokers - Anziif 2015 course guide & qualifications
 
thank u for coming
thank u for comingthank u for coming
thank u for coming
 
QBE Steadfast Wording PDS
QBE Steadfast Wording PDSQBE Steadfast Wording PDS
QBE Steadfast Wording PDS
 
Abdul Khaliq CV
Abdul Khaliq CVAbdul Khaliq CV
Abdul Khaliq CV
 
Statewide Insurance - Niba Insurance Code 2014
Statewide Insurance - Niba Insurance Code 2014Statewide Insurance - Niba Insurance Code 2014
Statewide Insurance - Niba Insurance Code 2014
 

Similar to Protect Against Cyber Crime

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.SangishettyDikshitha
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 

Similar to Protect Against Cyber Crime (20)

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious
MaliciousMalicious
Malicious
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Cyber security
Cyber securityCyber security
Cyber security
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Firewall
FirewallFirewall
Firewall
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Protect Against Cyber Crime

  • 3. WHAT ARE SOCIAL ENGINEERS? • Con artists who employ tactics to trick computer users into giving up valuable information.
  • 4. WHAT IS SPOOFING? • A technique used by malicious hackers to make it appear that they are someone else and convince a user to give up valuable information.
  • 5. WHAT IS MALWARE? • Collectively, damaging computer programs that install themselves on your computer without your knowledge and consent.
  • 6. TYPES OF MALWARE • Viruses- a computer program that can reproduce itself by attaching itself to another file. • Worm- a computer program that can reproduce itself, but it does not have to be attached to another file to do its work. • Trojans- a computer program masquerading as a useful program that lets hackers into your computer with out you knowing it. • Macro Viruses- is usually found in documents that can corrupt the computer when you open the document and executes the macro. • Logic Bomb- can be places in a software system to set off a series of damaging events. • Rootkit- a set of programs or utilities designed to gain access to the “root” of a computer system software that controls the hardware and software.
  • 7. TYPES OF MALWARE • Botnet- a collection of “zombie” computers, which are machines that have been taken over by malware software for the purpose of generating spam. • Spyware- it spies on the activity that you do on your computer. • Adware- a piece of software designed to deliver ads, in pop-up form, to users desktops. • Scareware- a scam where an online warning or pop-up convinces a user that his or her computer is infected with malware or has another problem that can be fixed by purchasing and downloading software.
  • 8. HOW IS MALWARE SPREAD? • You can infect your computer by clicking on an email attachment that contains an executable file. • Pictures you download can carry viruses stored in a single pixel of the image. • Visiting an infected website. • Viruses can spread from a computer storage device such as a DVD or flash drive that you inserted into an infected computer then inserted into another computer drive.
  • 9. HOW IS MALWARE SPREAD? • Worms can spread by simply connecting your computer to an infected network. • Mobile devices can be infected by downloading an app, ringtone, game, or theme that carries malware. • A mobile device with Bluetooth enabled in “discoverable mode” could be infected simply by coming within 30 feet of another Bluetooth device that has been infected and is running the same operating system
  • 11. WHAT IS COMPUTER SECURITY? • Computer security, also referred to as information security, involves protecting the boundaries of your home or business network and individual computing devices from intruders.
  • 12. BASIC TOOLS OF COMPUTER SECURITY • Authentication involves the use of passwords and in some cases other identifiers such as fingerprints to make sure that people accessing information are who they say they are. • Teaching your kids not to click on a link online that might download a virus • A company-wide policy identifying who can access data and establishing procedures for backing up files to avoid data loss.
  • 13. PROTECTING YOUR HOME NETWORK • Changing the password on your router when your first set it up. • Use encryption- a part of cryptography, which is the study of creating algorithms and codes to protect data. • Two popular forms of encryption are Wifi- Protected Access (WPA) and Wired Equivalent Privacy (WEP).
  • 14. OTHER FORMS OF PROTECTION • Locks- laptops have a comparable device, like that of a bike lock, that you can use to tie them down to an airport chair or desk in a field office to deter potential thieves from snatching them. • Remote Tracking/Wiping- for stronger protection, consider services such as LoJack for laptops, which allows you to remotely delete data if your computer is stolen and use GPS to track it. • Fingerprint Readers- many of your newer laptops include this feature and since fingerprints are unique to every individual, being able to authenticate yourself with your own set of prints to gain access to your computer is a popular security feature.
  • 15. OTHER FORMS OF PROTECTION • Password Protection- it is a very good idea to activate the password feature on the computer when you travel in case someone steals your computer you and can’t get past the password feature. • Mobile Computing Policies for Employees- keeping backups of data on a separate hard drive, or storage media such as a flash drive.
  • 16. References Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.