SlideShare a Scribd company logo
1 of 31
Introduction to Computers

          CLASS 7
Input and output


Name these peripherals:




 a       b           c       d   e




f        g           h       i   j
Input and output


 Name these peripherals:




joystick   printer earphones keyboard    scanner




mouse microphone   speakers   monitor barcode reader
Input and output


Now put the peripherals into “input” and “output” devices:




  a         b            c             d            e




 f          g            h             i            j
Input and output

input devices                  output devices
QR questions

 What does “QR” mean?


 When were QR codes invented? By what company?


 Which holds more information, barcodes or QR codes?


 Which direction are QR codes “read” ?


 Which of these is the “correct” direction for a QR code?
  a)            b)            c)           d)
QR questions

 What does “QR” mean?
       Quick Response
   When were QR codes invented? By what company?
       QR codes were invented in 1994 by Toyota.
   Which holds more information, barcodes or QR codes?
       QR codes kick barcode butt.
   Which direction are QR codes “read” ?
       Up and down (barcodes are read side to side).
   Which of these is the “correct” direction for a QR code?
    a)            b)             c)           d)
Internet security

There are threats to anyone who uses a computer.
 Some of these include:

Viruses / malware
Online Scams
Phishing
Social Network Hacking
Credit Card Fraud

Let’s take a look at each type…
Being careful online

THREATS AND ISSUES WHEN YOU USE THE INTERNET
 Malware
Internet
Security                               Phishing
The internet is such a
big part of your lives                 Social Network Hacking
that we can forget that
it even though it is
convenient, it can also
be dangerous.

You need to be careful.

Today I will introduce
some of the most
common threats ( 威
脅 ).

Sources:
http://www.slideshare.net/TechSoupGlobal/security-basics-webinar

http://en.wikipedia.org/
 Virus - a program that can spread
                                from computer to computer by
  Malware                       itself.
Most of you have heard of a
computer “virus” before…
                               Trojan - a hidden program (for
Viruses are actually a kind     example in free / illegal software)
of Malware ( 惡意軟體 )
                               Bot - a robot network
                                which can be controlled
                                 outside the computer.
                               Keystroke logger
                                           (keylogger): a program
                                           that records what you
                                           type into the computer.
 A computer virus is a computer
                            program that can spread from one
Virus                       computer to another.
Some viruses can be
harmless, but others
                           A virus can spread from one
can slow down or even
ruin a computer. Many
                            computer to another using code,
people don’t even know      for instance because a user sent it
that their computer has
a virus at all.             over the Internet, or carried it on
                            a memory device such as
                            a CD, DVD, or USB drive.
                           Viruses that spread them-
                            selves online or across a
                            network are called worms.
 A Trojan horse, or Trojan, is
                                  software that hides inside
  Trojans                         software and then steals
The term “Trojan” comes
from the Greek story about
                                  information or hurts the user’s
the Trojan Horse from a           computer.
very old story (The Iliad).
                                 Some things trojans can do to
In the story, Greeks left a
big wooden horse to the           your computer:
Trojans, people they were at
war against. After the
                                    Make your computer a “zombie”
Trojans brought the horse           Download or upload files
into the city, the Greeks who
were hidden inside snuck            Steal your information
out and opened the city
gates to let the Greek army
                                    Watch your screen
come in and destroy the city        Crash your computer
of Troy.
                                    Record your keystrokes
 One kind of malware, usually
  Bots, botnets                  brought into a computer through
  and zombies!                   a trojan, is a bot. Here’s one of the
Bots, or internet robots,
didn’t start out as bad - and
                                 way hackers can use bots:
not all of them are. For
example, Google uses bots
to get for their search
results.

What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
Botnets are bad. Really bad. They can
  Bots, botnets                  be used to send spam, send or
  and zombies!                   download files or even more malware,
Bots, or internet robots,
didn’t start out as bad - and
                                 and they can even be used for
not all of them are. For         Distributed Denial of Service (DDoS)
example, Google uses bots
to get for their search          attacks, where so many different
results.                         computers are told to go to the same
What we are talking about
here are botnets, which take
                                 website all
over computers and become
an army of computers doing
                                 at the same
what they are told, or
zombies, by an outside
                                 time that
program.
                                 the website
                                 crashes.
Keyloggers simply record whatever the
                                user is typing on their keyboard.
  Keyloggers                    Some keyloggers also record what is
Keyloggers are actually
quite easy to write. Usually
                                on the screen at the same time. Here’s
keyloggers are put together     an example of a keylogger file that
with other types of
malware.                        also shows what form the user was
                                typing in (form grabbing):
 Keyloggers are some of the worst
               kinds of malware. Spies love
Keyloggers     keyloggers, and countries often
               try to sneak them onto
               computers. Sometimes people use
               them to spy on each other - for
               example, maybe a husband thinks
               his wife has a secret boyfriend…
              Criminals use keyloggers to try to
               get usernames and
               passwords for bank
               information.
 Phishing is a way of tricking people
                           into giving their information to what
Phishing                   they think is a site they can trust.
While phishing isn’t a
from of malware (it’s
                          Here’s an example:
more like tricking you
and stealing), it’s
becoming more and
more common, and
more dangerous.




                          The link in the email takes you to a
                           login page that asks you to type in
                           your gmail information.
                          Look at the domain name!
 Here’s another example of an
                           email that takes you to a phishing
More Phishing              site:
Phishing has become a
real problem in recent
years, and social media
sites are one of their
favorite targets.
Here’s another phishing example:
And a “friend phishing” example:
Who is Sophie Ng?

Let’s see if Google knows her:




Take one of her profile pictures and put it into Google images.


Hey, that’s a different
name! What’s going on?
After Google searching…


                             After uploading a couple of
                             “Sophie” pictures to Google and
                             getting several different Facebook
                             profiles, her pictures appeared on
a different site, where she was listed as “Cute college girl of
the day for October 22, 2010”

It turns out that people use her (and other college girl photos)
to try to get people to accept her as a Facebook friend. Once
she has been accepted, the hackers can get information on
you and your friends, or get other people to click on links that
will download malware to their computers.
 Dangerous links in email, IM,
How does this               Twitter messages, Facebook and
happen?                     YouTube comments
Now that we know what
some types of malware
                           Infected devices: USB sticks, disks,
are called, we should
ask, “How do end up
                            laptops, digital photo frames
with malware?”             Online auctions, online dating
                           Phishing attacks
                           Fake pop-up alerts
 Underground cybercrime economy
                           Bigger business than international
Why?
                            drug trade
Why are people doing
this? What’s the point?    Hackers with computer skills and
                            desire for money
                           Organized online buy/sell of stolen
                            data
                           Low risk, high reward - many
                            hackers can attack anywhere in the
                            world from their own countries, and
                            most countries don’t have strong
                            laws against hacking
 Zeus is a trojan that steals banking
Just one case:     information
Zeus               using keylogging and form
                   grabbing.
                  In June 2009, a security company
                   discovered that Zeus had hacked
                   74,000 FTP accounts on websites of
                   such companies as the Bank of
                   America, NASA, , ABC, Oracle,
                   Play.com, Cisco, Amazon,
                   and BusinessWeek.
 Zeus botnets are thought to include
         millions of computers (around 3.6
Zeus     million in the United States).
        By October 28, 2009 over 1,500,000
         phishing messages were sent
         on Facebook to spread the Zeus
         trojan.
        November 14–15, 2009 Zeus spread
         via e-mails saying it was from a
         telephone company. A total of
         9,000,000 of these phishing e-mails
         were sent.
 It is still active today. In 2010, an
         internet security company, wrote that
Zeus     the credit cards of more than 15
         unnamed US banks have been stolen
         using the Zeus malware.
        So far, over US $70,000,000 has been
         stolen from people and companies
         with Zeus.
        More than 90 criminals using Zeus
         were arrested in the US, England and
         Ukraine ( 烏克蘭 ).
        In May, 2011, the code of Zeus was put
         online for anyone to use and change.
 Don’t open mail attachments from
So what can                  people you don’t know.
you do?                     Try not to click on links inside
How can you protect
yourself from these          emails - if you get an email telling
kinds of online threats?     you to update your information, go
                             to the website yourself - don’t use
                             their link.
                            Get a good anti-virus program,
                             spyware remover, and firewall.
                             There are free programs available
                             online, such as avast!
                             antivirus, Grisoft's AVG, Microsoft
                             Anti-SpywareWebroot.
 Don’t expect something for
So what can                  nothing.
you do?
                             Don’t download pirated software, or
How can you protect
yourself from these          “keygens” - software that will give you
kinds of online threats?     a license number for software.
                            Don’t friend people on Facebook that
                             you don’t know - even if you think
                             they’re attractive!
                            Carefully check where your email is
                             coming from - always check the
                             domain name of the sender.
 Go to Facebook. If there are people in your friends
                           list that you don’t really know, put the link to their
                           picture into Google images and see if they are
OK Now:                    really who they say they are.
Log into Facebook and
check through your
                          Check your email. Are there any emails asking you
friends. Do you really
know them?                 to update your information? If so, check the
                           domain name. Is it really the website it says it is?

                          Update your anti-virus software and do a full
                           system scan of your computer at least once a
                           week. Change your passwords every 3-4 months

                          Think! Be skeptical ( 懷疑論的 ) about what
                           people are sending you, and be careful!

More Related Content

What's hot

Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Vishwan Aranha
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsAlexander Decker
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Secureview 4 - 2010
Secureview 4 - 2010Secureview 4 - 2010
Secureview 4 - 2010Felipe Prado
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Wi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber duckyWi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber duckyTELKOMNIKA JOURNAL
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 

What's hot (10)

Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
 
Botnet
BotnetBotnet
Botnet
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Hacking
HackingHacking
Hacking
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Secureview 4 - 2010
Secureview 4 - 2010Secureview 4 - 2010
Secureview 4 - 2010
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Wi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber duckyWi-Fi password stealing program using USB rubber ducky
Wi-Fi password stealing program using USB rubber ducky
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
BOTNET
BOTNETBOTNET
BOTNET
 

Viewers also liked

Viewers also liked (11)

C 3
C 3C 3
C 3
 
1 9
1 91 9
1 9
 
1 12
1 121 12
1 12
 
The 12 types of advertising 1&2
The 12 types of advertising 1&2The 12 types of advertising 1&2
The 12 types of advertising 1&2
 
1 14
1 141 14
1 14
 
C 6
C 6C 6
C 6
 
C 11
C 11C 11
C 11
 
Lifestyle1
Lifestyle1Lifestyle1
Lifestyle1
 
C 2
C 2C 2
C 2
 
Shopping items
Shopping itemsShopping items
Shopping items
 
1051 Tourism English Unit 3
1051 Tourism English Unit 31051 Tourism English Unit 3
1051 Tourism English Unit 3
 

Similar to C 7

Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 

Similar to C 7 (20)

C 7
C 7C 7
C 7
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Anti virus
Anti virusAnti virus
Anti virus
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus
virusvirus
virus
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 

More from Les Davy

1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4Les Davy
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5Les Davy
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4Les Davy
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colorsLes Davy
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15Les Davy
 
Shopping items
Shopping itemsShopping items
Shopping itemsLes Davy
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14Les Davy
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3Les Davy
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13Les Davy
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger huntLes Davy
 
Guess the foods
Guess the foodsGuess the foods
Guess the foodsLes Davy
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9Les Davy
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10Les Davy
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9Les Davy
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8Les Davy
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7Les Davy
 
Multimedia06
Multimedia06Multimedia06
Multimedia06Les Davy
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5Les Davy
 
Multimedia05
Multimedia05Multimedia05
Multimedia05Les Davy
 
Multimedia04
Multimedia04Multimedia04
Multimedia04Les Davy
 

More from Les Davy (20)

1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colors
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15
 
Shopping items
Shopping itemsShopping items
Shopping items
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger hunt
 
Guess the foods
Guess the foodsGuess the foods
Guess the foods
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7
 
Multimedia06
Multimedia06Multimedia06
Multimedia06
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5
 
Multimedia05
Multimedia05Multimedia05
Multimedia05
 
Multimedia04
Multimedia04Multimedia04
Multimedia04
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

C 7

  • 2. Input and output Name these peripherals: a b c d e f g h i j
  • 3. Input and output Name these peripherals: joystick printer earphones keyboard scanner mouse microphone speakers monitor barcode reader
  • 4. Input and output Now put the peripherals into “input” and “output” devices: a b c d e f g h i j
  • 5. Input and output input devices output devices
  • 6. QR questions  What does “QR” mean?  When were QR codes invented? By what company?  Which holds more information, barcodes or QR codes?  Which direction are QR codes “read” ?  Which of these is the “correct” direction for a QR code? a) b) c) d)
  • 7. QR questions  What does “QR” mean? Quick Response  When were QR codes invented? By what company? QR codes were invented in 1994 by Toyota.  Which holds more information, barcodes or QR codes? QR codes kick barcode butt.  Which direction are QR codes “read” ? Up and down (barcodes are read side to side).  Which of these is the “correct” direction for a QR code? a) b) c) d)
  • 8. Internet security There are threats to anyone who uses a computer. Some of these include: Viruses / malware Online Scams Phishing Social Network Hacking Credit Card Fraud Let’s take a look at each type…
  • 9. Being careful online THREATS AND ISSUES WHEN YOU USE THE INTERNET
  • 10.  Malware Internet Security  Phishing The internet is such a big part of your lives  Social Network Hacking that we can forget that it even though it is convenient, it can also be dangerous. You need to be careful. Today I will introduce some of the most common threats ( 威 脅 ). Sources: http://www.slideshare.net/TechSoupGlobal/security-basics-webinar http://en.wikipedia.org/
  • 11.  Virus - a program that can spread from computer to computer by Malware itself. Most of you have heard of a computer “virus” before…  Trojan - a hidden program (for Viruses are actually a kind example in free / illegal software) of Malware ( 惡意軟體 )  Bot - a robot network which can be controlled outside the computer.  Keystroke logger (keylogger): a program that records what you type into the computer.
  • 12.  A computer virus is a computer program that can spread from one Virus computer to another. Some viruses can be harmless, but others  A virus can spread from one can slow down or even ruin a computer. Many computer to another using code, people don’t even know for instance because a user sent it that their computer has a virus at all. over the Internet, or carried it on a memory device such as a CD, DVD, or USB drive.  Viruses that spread them- selves online or across a network are called worms.
  • 13.  A Trojan horse, or Trojan, is software that hides inside Trojans software and then steals The term “Trojan” comes from the Greek story about information or hurts the user’s the Trojan Horse from a computer. very old story (The Iliad).  Some things trojans can do to In the story, Greeks left a big wooden horse to the your computer: Trojans, people they were at war against. After the  Make your computer a “zombie” Trojans brought the horse  Download or upload files into the city, the Greeks who were hidden inside snuck  Steal your information out and opened the city gates to let the Greek army  Watch your screen come in and destroy the city  Crash your computer of Troy.  Record your keystrokes
  • 14.  One kind of malware, usually Bots, botnets brought into a computer through and zombies! a trojan, is a bot. Here’s one of the Bots, or internet robots, didn’t start out as bad - and way hackers can use bots: not all of them are. For example, Google uses bots to get for their search results. What we are talking about here are botnets, which take over computers and become an army of computers doing what they are told, or zombies, by an outside program.
  • 15. Botnets are bad. Really bad. They can Bots, botnets be used to send spam, send or and zombies! download files or even more malware, Bots, or internet robots, didn’t start out as bad - and and they can even be used for not all of them are. For Distributed Denial of Service (DDoS) example, Google uses bots to get for their search attacks, where so many different results. computers are told to go to the same What we are talking about here are botnets, which take website all over computers and become an army of computers doing at the same what they are told, or zombies, by an outside time that program. the website crashes.
  • 16. Keyloggers simply record whatever the user is typing on their keyboard. Keyloggers Some keyloggers also record what is Keyloggers are actually quite easy to write. Usually on the screen at the same time. Here’s keyloggers are put together an example of a keylogger file that with other types of malware. also shows what form the user was typing in (form grabbing):
  • 17.  Keyloggers are some of the worst kinds of malware. Spies love Keyloggers keyloggers, and countries often try to sneak them onto computers. Sometimes people use them to spy on each other - for example, maybe a husband thinks his wife has a secret boyfriend…  Criminals use keyloggers to try to get usernames and passwords for bank information.
  • 18.  Phishing is a way of tricking people into giving their information to what Phishing they think is a site they can trust. While phishing isn’t a from of malware (it’s  Here’s an example: more like tricking you and stealing), it’s becoming more and more common, and more dangerous.  The link in the email takes you to a login page that asks you to type in your gmail information.  Look at the domain name!
  • 19.  Here’s another example of an email that takes you to a phishing More Phishing site: Phishing has become a real problem in recent years, and social media sites are one of their favorite targets.
  • 21. And a “friend phishing” example:
  • 22. Who is Sophie Ng? Let’s see if Google knows her: Take one of her profile pictures and put it into Google images. Hey, that’s a different name! What’s going on?
  • 23. After Google searching… After uploading a couple of “Sophie” pictures to Google and getting several different Facebook profiles, her pictures appeared on a different site, where she was listed as “Cute college girl of the day for October 22, 2010” It turns out that people use her (and other college girl photos) to try to get people to accept her as a Facebook friend. Once she has been accepted, the hackers can get information on you and your friends, or get other people to click on links that will download malware to their computers.
  • 24.  Dangerous links in email, IM, How does this Twitter messages, Facebook and happen? YouTube comments Now that we know what some types of malware  Infected devices: USB sticks, disks, are called, we should ask, “How do end up laptops, digital photo frames with malware?”  Online auctions, online dating  Phishing attacks  Fake pop-up alerts
  • 25.  Underground cybercrime economy  Bigger business than international Why? drug trade Why are people doing this? What’s the point?  Hackers with computer skills and desire for money  Organized online buy/sell of stolen data  Low risk, high reward - many hackers can attack anywhere in the world from their own countries, and most countries don’t have strong laws against hacking
  • 26.  Zeus is a trojan that steals banking Just one case: information Zeus using keylogging and form grabbing.  In June 2009, a security company discovered that Zeus had hacked 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, , ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.
  • 27.  Zeus botnets are thought to include millions of computers (around 3.6 Zeus million in the United States).  By October 28, 2009 over 1,500,000 phishing messages were sent on Facebook to spread the Zeus trojan.  November 14–15, 2009 Zeus spread via e-mails saying it was from a telephone company. A total of 9,000,000 of these phishing e-mails were sent.
  • 28.  It is still active today. In 2010, an internet security company, wrote that Zeus the credit cards of more than 15 unnamed US banks have been stolen using the Zeus malware.  So far, over US $70,000,000 has been stolen from people and companies with Zeus.  More than 90 criminals using Zeus were arrested in the US, England and Ukraine ( 烏克蘭 ).  In May, 2011, the code of Zeus was put online for anyone to use and change.
  • 29.  Don’t open mail attachments from So what can people you don’t know. you do?  Try not to click on links inside How can you protect yourself from these emails - if you get an email telling kinds of online threats? you to update your information, go to the website yourself - don’t use their link.  Get a good anti-virus program, spyware remover, and firewall. There are free programs available online, such as avast! antivirus, Grisoft's AVG, Microsoft Anti-SpywareWebroot.
  • 30.  Don’t expect something for So what can nothing. you do? Don’t download pirated software, or How can you protect yourself from these “keygens” - software that will give you kinds of online threats? a license number for software.  Don’t friend people on Facebook that you don’t know - even if you think they’re attractive!  Carefully check where your email is coming from - always check the domain name of the sender.
  • 31.  Go to Facebook. If there are people in your friends list that you don’t really know, put the link to their picture into Google images and see if they are OK Now: really who they say they are. Log into Facebook and check through your  Check your email. Are there any emails asking you friends. Do you really know them? to update your information? If so, check the domain name. Is it really the website it says it is?  Update your anti-virus software and do a full system scan of your computer at least once a week. Change your passwords every 3-4 months  Think! Be skeptical ( 懷疑論的 ) about what people are sending you, and be careful!