SlideShare a Scribd company logo
1 of 15
Basic Software Securities for Staff Computers Presenter: Christine Greenwood cgreenwood@mcls.ms
   When it comes to  understanding the concepts of computer software,  Dennie van Tassel  says, “I’ve finally learned what ‘upward compatible’ means.  It means we get to keep all our old mistakes” (Tassel, 2009). (Google Images) 1/8/2011 2 Madison County-Canton Public Library
What is Malware?     Malware, short for malicious software, “is software designed to infiltrate a computer system without the owner's consent” (Jefric Consulting, LLC, 2010).      Malware includes things like: ,[object Object]
 Keyloggers--Trojan horses, worms, viruses and other malicious and unwanted software.1/8/2011 3 Madison County-Canton Public Library
What is Spyware?    “Spywarerefers to programs that use your Internet connection to send information from your computer to some other computer, normally without your knowledge or permission. Most often this information is a record of your ongoing browsing habits, downloads, or it could be more personal data like your name and address.  Different strains of spyware perform different functions. Some might also hijack your browser to take you to an unexpected site, replace the Homepage setting in your browser with another site, or serve you personal ads, even when you're offline. Spyware that serves personalized advertisements is called adware also known as malware”(Wisegeek.com) 1/8/2011 4 Madison County-Canton Public Library
 Examples of Rogue Security Software are: ,[object Object]
Alpha Antivirus
Malware Defender(Annthegran.com) 1/8/2011 5 Madison County-Canton Public Library
 What are Pop-ups? (Get rid of annoying pop-ups, Google Images)  A pop-up otherwise known as a pop-up ad, is a type of window that appears on top of, or over the browser window of a Web site that a user has visited. Pop-up ads are more prevalent in advertising on the Web, though advertising is not the only application for pop-up windows (wikipedia.org).  1/8/2011 6 Madison County-Canton Public Library
Fake Pop-ups   Unfortunately not all pop ups are created equal. According to Dr. S Wogalter (2008)  “ The fake ones were designed to trick users into downloading harmful software”  (n.d). 1/8/2011 7 Madison County-Canton Public Library
Fake Pop-ups ( 2008  displays fake popups, Google, Images) 1/8/2011 8 Madison County-Canton Public Library
Fake Pop-ups, Con’t 1/8/2011 9 Madison County-Canton Public Library
Fake Pop-ups, Con’t. 1/8/2011 10 Madison County-Canton Public Library
Fake Pop-ups, Con’t. 1/8/2011 11 Madison County-Canton Public Library
What are Email Disclaimers? An email disclaimer is a signature block or a block of text  automatically appended at the bottom of an e-mail message, Usenet article, or forum post (Google.com). A sample disclaimer is as follows: “The information contained in this email and/or attached document(s) is for the exclusive use of the individual(s) named above. This email may contain confidential, privileged and non-discloseable information.  Any views or opinions presented in this email are solely those of the sender and do not necessarily represent those of the Madison County Library System”  (Madison County Library System, n.d). 1/8/2011 12 Madison County-Canton Public Library

More Related Content

Viewers also liked

Douglas Wilson
Douglas WilsonDouglas Wilson
Douglas WilsonBNIM
 
"Nói về mình" - cẩm nang về coming out
"Nói về mình" - cẩm nang về coming out"Nói về mình" - cẩm nang về coming out
"Nói về mình" - cẩm nang về coming outNguyen Hai Yen
 
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tính
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tínhCẩm nang dành cho phụ huynh và người thân của người đồng tính và song tính
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tínhNguyen Hai Yen
 
Tuscaloosa Recovery Plan Proposal Presentation
Tuscaloosa Recovery Plan Proposal PresentationTuscaloosa Recovery Plan Proposal Presentation
Tuscaloosa Recovery Plan Proposal PresentationBNIM
 
140409 lpl financial final presentation
140409 lpl financial final presentation140409 lpl financial final presentation
140409 lpl financial final presentationBNIM
 
Social Media and Crowdsourcing in Planning and Design
Social Media and Crowdsourcing in Planning and DesignSocial Media and Crowdsourcing in Planning and Design
Social Media and Crowdsourcing in Planning and DesignBNIM
 
Case Study: 2012 Top Ten COTE | IUB-OCA
Case Study: 2012 Top Ten COTE | IUB-OCACase Study: 2012 Top Ten COTE | IUB-OCA
Case Study: 2012 Top Ten COTE | IUB-OCABNIM
 
This is Every Building
This is Every BuildingThis is Every Building
This is Every BuildingBNIM
 
True Sustainability: Cutting Edge Regional Design and Placemaking
True Sustainability: Cutting Edge Regional Design and PlacemakingTrue Sustainability: Cutting Edge Regional Design and Placemaking
True Sustainability: Cutting Edge Regional Design and PlacemakingBNIM
 
Cẩm nang dành cho phụ huynh và người thân của người chuyển giới
Cẩm nang dành cho phụ huynh và người thân của người chuyển giớiCẩm nang dành cho phụ huynh và người thân của người chuyển giới
Cẩm nang dành cho phụ huynh và người thân của người chuyển giớiNguyen Hai Yen
 
Greensburg | The Green Rebirth of a Kansas Community
Greensburg | The Green Rebirth of a Kansas CommunityGreensburg | The Green Rebirth of a Kansas Community
Greensburg | The Green Rebirth of a Kansas CommunityBNIM
 

Viewers also liked (12)

Summary of the Portfolio
Summary of the PortfolioSummary of the Portfolio
Summary of the Portfolio
 
Douglas Wilson
Douglas WilsonDouglas Wilson
Douglas Wilson
 
"Nói về mình" - cẩm nang về coming out
"Nói về mình" - cẩm nang về coming out"Nói về mình" - cẩm nang về coming out
"Nói về mình" - cẩm nang về coming out
 
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tính
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tínhCẩm nang dành cho phụ huynh và người thân của người đồng tính và song tính
Cẩm nang dành cho phụ huynh và người thân của người đồng tính và song tính
 
Tuscaloosa Recovery Plan Proposal Presentation
Tuscaloosa Recovery Plan Proposal PresentationTuscaloosa Recovery Plan Proposal Presentation
Tuscaloosa Recovery Plan Proposal Presentation
 
140409 lpl financial final presentation
140409 lpl financial final presentation140409 lpl financial final presentation
140409 lpl financial final presentation
 
Social Media and Crowdsourcing in Planning and Design
Social Media and Crowdsourcing in Planning and DesignSocial Media and Crowdsourcing in Planning and Design
Social Media and Crowdsourcing in Planning and Design
 
Case Study: 2012 Top Ten COTE | IUB-OCA
Case Study: 2012 Top Ten COTE | IUB-OCACase Study: 2012 Top Ten COTE | IUB-OCA
Case Study: 2012 Top Ten COTE | IUB-OCA
 
This is Every Building
This is Every BuildingThis is Every Building
This is Every Building
 
True Sustainability: Cutting Edge Regional Design and Placemaking
True Sustainability: Cutting Edge Regional Design and PlacemakingTrue Sustainability: Cutting Edge Regional Design and Placemaking
True Sustainability: Cutting Edge Regional Design and Placemaking
 
Cẩm nang dành cho phụ huynh và người thân của người chuyển giới
Cẩm nang dành cho phụ huynh và người thân của người chuyển giớiCẩm nang dành cho phụ huynh và người thân của người chuyển giới
Cẩm nang dành cho phụ huynh và người thân của người chuyển giới
 
Greensburg | The Green Rebirth of a Kansas Community
Greensburg | The Green Rebirth of a Kansas CommunityGreensburg | The Green Rebirth of a Kansas Community
Greensburg | The Green Rebirth of a Kansas Community
 

Similar to Tech training

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 

Similar to Tech training (20)

C3
C3C3
C3
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Information security
Information securityInformation security
Information security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Presentation1
Presentation1Presentation1
Presentation1
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 

Tech training

  • 1. Basic Software Securities for Staff Computers Presenter: Christine Greenwood cgreenwood@mcls.ms
  • 2. When it comes to understanding the concepts of computer software, Dennie van Tassel says, “I’ve finally learned what ‘upward compatible’ means.  It means we get to keep all our old mistakes” (Tassel, 2009). (Google Images) 1/8/2011 2 Madison County-Canton Public Library
  • 3.
  • 4. Keyloggers--Trojan horses, worms, viruses and other malicious and unwanted software.1/8/2011 3 Madison County-Canton Public Library
  • 5. What is Spyware? “Spywarerefers to programs that use your Internet connection to send information from your computer to some other computer, normally without your knowledge or permission. Most often this information is a record of your ongoing browsing habits, downloads, or it could be more personal data like your name and address. Different strains of spyware perform different functions. Some might also hijack your browser to take you to an unexpected site, replace the Homepage setting in your browser with another site, or serve you personal ads, even when you're offline. Spyware that serves personalized advertisements is called adware also known as malware”(Wisegeek.com) 1/8/2011 4 Madison County-Canton Public Library
  • 6.
  • 8. Malware Defender(Annthegran.com) 1/8/2011 5 Madison County-Canton Public Library
  • 9. What are Pop-ups? (Get rid of annoying pop-ups, Google Images) A pop-up otherwise known as a pop-up ad, is a type of window that appears on top of, or over the browser window of a Web site that a user has visited. Pop-up ads are more prevalent in advertising on the Web, though advertising is not the only application for pop-up windows (wikipedia.org). 1/8/2011 6 Madison County-Canton Public Library
  • 10. Fake Pop-ups Unfortunately not all pop ups are created equal. According to Dr. S Wogalter (2008) “ The fake ones were designed to trick users into downloading harmful software” (n.d). 1/8/2011 7 Madison County-Canton Public Library
  • 11. Fake Pop-ups ( 2008 displays fake popups, Google, Images) 1/8/2011 8 Madison County-Canton Public Library
  • 12. Fake Pop-ups, Con’t 1/8/2011 9 Madison County-Canton Public Library
  • 13. Fake Pop-ups, Con’t. 1/8/2011 10 Madison County-Canton Public Library
  • 14. Fake Pop-ups, Con’t. 1/8/2011 11 Madison County-Canton Public Library
  • 15. What are Email Disclaimers? An email disclaimer is a signature block or a block of text automatically appended at the bottom of an e-mail message, Usenet article, or forum post (Google.com). A sample disclaimer is as follows: “The information contained in this email and/or attached document(s) is for the exclusive use of the individual(s) named above. This email may contain confidential, privileged and non-discloseable information. Any views or opinions presented in this email are solely those of the sender and do not necessarily represent those of the Madison County Library System” (Madison County Library System, n.d). 1/8/2011 12 Madison County-Canton Public Library
  • 16. How to Clear Internet History, Cache, Cookies, Temp Files Start Internet Explorer Click Tools, Internet Options Click delete Click delete all to delete everything 1/8/2011 13 Madison County-Canton Public Library
  • 17. Backing up Data Why is computer backup important? Imagine yourself working on a document and before you hit the save button your computer goes haywire . (Ruidoso Computer Services, Google Images) A flash drive should be used to back up data on personal computers. 1/8/2011 14 Madison County-Canton Public Library
  • 18. Thank you for your attention. (Your Attention, Google Image) Are there any questions? 1/8/2011 15 Madison County-Canton Public Library