SlideShare a Scribd company logo
UNIVERSITY OF RAPARIN
FACULTY OF PRIMARY EDUCATION
COMPUTER SCIENCE DEPARTMENT
Computer & Internet
Security
HOSHMAND KAREEM SALIH
• What is the origin of the name “malware” ?
• Malicious software
Malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is the definition of malware ?
• Software that is intended to damage or disable
computers and computer systems
• Any kind of unwanted software that is installed
without your adequate consent viruses, worms
and Trojan horses are examples of malicious
software that are often grouped of malicious
software that are often grouped together and
referred to as malware.
There are many types of malware such as
• Worms
• Virus
• Spyware
• Trojan horse
• Scare ware
• Ransom ware
Types of malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Make copies of themselves again and again on
• Local drive
• Network shares
• USB drives
• Purpose
• Reproduce
• Worms does not need to attach itself to
an exiting program
Types of malware (worms)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• When executed – usually by a human, replicates by inserting copies
of itself (possibly modified) into other computer programs, data files,
or the boot sector of the hard drive; when this replication succeeds,
the affected areas are then said to be "infected.“
• Purpose
• Harm computers
Types of malware (virus)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is it?
• It is any software which takes information from your computer
without your knowledge or consent.
• Types of Spyware (just three of them)
• Trojans
• Web Bugs
• Advertiser software
Types of malware (Spyware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Appears to perform a desirable function but
instead drops a malicious payload, often
including a backdoor allowing unauthorized
access
• Purpose
• Gains privileged access to the operating system
• Trojans Does not need to attach itself to an
existing program.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• It gets the idea and the name from the story of the Trojan
horse in troy.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Appears to be beneficial from a
security perspective but provides
limited or no security, generates
erroneous or misleading alerts, or
attempts to lure users into
participating in fraudulent
transactions.
Types of malware (Scare ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Restricts access to the computer
system that it infects
• Encrypt files lock system
• Displays messages intended to coax the
user into paying
• Demands a ransom in order for the
restriction to be removed
Types of malware (ransom ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• The reasons
• Economical
• Personal
• Political
• Others
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Economical
• Stealing sensitive information which is then sold on the black market.
• Take down networks
• Personal
• Revenge , Vandalism , Experimental / research , Hobby and art
• Political
• Gaining information about different political parts
• Spying on political parts or persons
• Political messages
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• A system or group of systems
that enforces an access
control policy between two
networks.
Firewall Visible
IP
Address
Internal
Network
PC Servers
Host
• Hackers
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
Hackers and Crackers
Computer & Internet Security
• Crackers
• A person who accesses a
computer or network illegally but
has the intent of destroying data,
stealing information, or other
malicious action.
HOSHMAND KAREEM SALIH
Some systems for hacking
Computer & Internet Security
HOSHMAND KAREEM SALIH
A system for cracking (OllyICE)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use an Antimalware app
• Installing an antimalware app and keeping it up to date
can help defend your PC against viruses and other
malware (malicious software). Antimalware apps scan for
viruses, spyware, and other malware trying to get into your
email, operating system, or files. New threats can appear
daily, so check the antimalware manufacturer's website
frequently for updates
• Some Antimalware apps
• Microsoft Security Essential , Norton , Avast, Avira ,
Kaspersky, AVG
• All the companies that we mentioned has either antivirus
and internet security
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Don't open email messages from unfamiliar senders, or
email attachments that you don't recognize
• Many viruses are attached to email messages and will spread as
soon as you open the attachment. It's best not to open any
attachment unless it's something you're expecting
• Microsoft Outlook and Windows Mail help block potentially
dangerous attachments
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a pop-up blocker with your Internet browser
• Pop-up windows are small browser windows that appear on top of
the website you're viewing. Although most are created by
advertisers, they can also contain malicious or unsafe code. A pop-
up blocker can prevent some or all of these windows from
appearing
• The Pop-up Blocker feature in Internet Explorer and the other
advanced browsers
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Keep Windows Updated
• Periodically, Microsoft releases special security updates that can
help protect your PC. These updates can help prevent viruses and
other malware attacks by closing possible security holes
• Turn on Windows Update to make sure that Windows receives these
updates automatically
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a firewall
• Windows Firewall or any other firewall app can help notify you about
suspicious activity if a virus or worm attempts to connect to your PC.
It can also block viruses, worms, and hackers from attempting to
download potentially harmful apps to your PC
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Turn on User Account Control (UAC)
• When changes are going to be made to your PC that
require administrator-level permission, UAC notifies you and
gives you the chance to approve the change. UAC can
help keep viruses from making unwanted changes
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Clear your Internet cache and your browsing history
• Most browsers store info about the websites you visit, and they might
also store info that websites might ask you to provide (such as your
name and address). While it can be helpful to have these details
stored on your PC, there are times when you might want to delete
some or all of them—for example, when you're using a public PC
and don't want to leave personal info behind
• For deleting all the history , privacy and stored information in an
easy way use CCleaner app
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use another type of operating system
• Because Windows is the most operating system used in the world ,
the most malwares are made for windows , so using another type of
OS like Linux or Mac OS x is better , because malwares for these
Operating systems are not too much
• Some types of Linux
• Ubuntu
• Open SUZI
• Backtrack
• Kali
• Red hat
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
•Offensive Security Training and Services
• World Class Information Security Training and Penetration Testing
Online Training courses
HOSHMAND KAREEM SALIH
• We previously talked about these
• What is malware
• Types of malware
• Reasons for writing malware
• firewall
• Hackers and crackers
• How to protect our pc from malwares
• offensive-security.com
Wrap up!
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Book
• Security Fundamentals – an official course - Microsoft
• Windows help center
• “How to protect my pc from viruses ?”
• Internet
• https://www.slideshare.net
• Some slides about malwares , hackers , viruses and spywares
• Some pictures of malwares (searched in google.com)
• YouTube
• A part of video in “Troy” movie
References
Computer & Internet Security
HOSHMAND KAREEM SALIH

More Related Content

What's hot

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
Ivanti
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
ROHIT GHIMIRE
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
Wasif Ali Syed
 

What's hot (20)

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Network Security
Network SecurityNetwork Security
Network Security
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 

Viewers also liked

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programming
hoshmand kareem
 
Internet security
Internet securityInternet security
Internet security
gohel
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
dkp205
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
mfaheemakhtar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 

Viewers also liked (10)

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programming
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 

Similar to Computer and internet security

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
Systweak Software
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
Putta Keyboard
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
Security Innovation
 

Similar to Computer and internet security (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security
Computer securityComputer security
Computer security
 
Malicious
MaliciousMalicious
Malicious
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malwares
MalwaresMalwares
Malwares
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Security
SecuritySecurity
Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Computer and internet security

  • 1. UNIVERSITY OF RAPARIN FACULTY OF PRIMARY EDUCATION COMPUTER SCIENCE DEPARTMENT Computer & Internet Security HOSHMAND KAREEM SALIH
  • 2. • What is the origin of the name “malware” ? • Malicious software Malware Computer & Internet Security HOSHMAND KAREEM SALIH • What is the definition of malware ? • Software that is intended to damage or disable computers and computer systems • Any kind of unwanted software that is installed without your adequate consent viruses, worms and Trojan horses are examples of malicious software that are often grouped of malicious software that are often grouped together and referred to as malware.
  • 3. There are many types of malware such as • Worms • Virus • Spyware • Trojan horse • Scare ware • Ransom ware Types of malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 4. • Activity • Make copies of themselves again and again on • Local drive • Network shares • USB drives • Purpose • Reproduce • Worms does not need to attach itself to an exiting program Types of malware (worms) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 5. • Activity • When executed – usually by a human, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected.“ • Purpose • Harm computers Types of malware (virus) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 6. • What is it? • It is any software which takes information from your computer without your knowledge or consent. • Types of Spyware (just three of them) • Trojans • Web Bugs • Advertiser software Types of malware (Spyware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 7. • Activity • Appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access • Purpose • Gains privileged access to the operating system • Trojans Does not need to attach itself to an existing program. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 8. • It gets the idea and the name from the story of the Trojan horse in troy. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 9. • Appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. Types of malware (Scare ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 10. • Restricts access to the computer system that it infects • Encrypt files lock system • Displays messages intended to coax the user into paying • Demands a ransom in order for the restriction to be removed Types of malware (ransom ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 11. • The reasons • Economical • Personal • Political • Others Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 12. • Economical • Stealing sensitive information which is then sold on the black market. • Take down networks • Personal • Revenge , Vandalism , Experimental / research , Hobby and art • Political • Gaining information about different political parts • Spying on political parts or persons • Political messages Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 13. • A system or group of systems that enforces an access control policy between two networks. Firewall Visible IP Address Internal Network PC Servers Host
  • 14. • Hackers • A person who accesses a computer or network illegally. • Various types • Black • Grey • White Hackers and Crackers Computer & Internet Security • Crackers • A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. HOSHMAND KAREEM SALIH
  • 15. Some systems for hacking Computer & Internet Security HOSHMAND KAREEM SALIH
  • 16. A system for cracking (OllyICE) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 17. • Use an Antimalware app • Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files. New threats can appear daily, so check the antimalware manufacturer's website frequently for updates • Some Antimalware apps • Microsoft Security Essential , Norton , Avast, Avira , Kaspersky, AVG • All the companies that we mentioned has either antivirus and internet security How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 18. • Don't open email messages from unfamiliar senders, or email attachments that you don't recognize • Many viruses are attached to email messages and will spread as soon as you open the attachment. It's best not to open any attachment unless it's something you're expecting • Microsoft Outlook and Windows Mail help block potentially dangerous attachments How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 19. • Use a pop-up blocker with your Internet browser • Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop- up blocker can prevent some or all of these windows from appearing • The Pop-up Blocker feature in Internet Explorer and the other advanced browsers How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 20. • Keep Windows Updated • Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible security holes • Turn on Windows Update to make sure that Windows receives these updates automatically How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 21. • Use a firewall • Windows Firewall or any other firewall app can help notify you about suspicious activity if a virus or worm attempts to connect to your PC. It can also block viruses, worms, and hackers from attempting to download potentially harmful apps to your PC How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 22. • Turn on User Account Control (UAC) • When changes are going to be made to your PC that require administrator-level permission, UAC notifies you and gives you the chance to approve the change. UAC can help keep viruses from making unwanted changes How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 23. • Clear your Internet cache and your browsing history • Most browsers store info about the websites you visit, and they might also store info that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your PC, there are times when you might want to delete some or all of them—for example, when you're using a public PC and don't want to leave personal info behind • For deleting all the history , privacy and stored information in an easy way use CCleaner app How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 24. • Use another type of operating system • Because Windows is the most operating system used in the world , the most malwares are made for windows , so using another type of OS like Linux or Mac OS x is better , because malwares for these Operating systems are not too much • Some types of Linux • Ubuntu • Open SUZI • Backtrack • Kali • Red hat How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 25. •Offensive Security Training and Services • World Class Information Security Training and Penetration Testing Online Training courses HOSHMAND KAREEM SALIH
  • 26. • We previously talked about these • What is malware • Types of malware • Reasons for writing malware • firewall • Hackers and crackers • How to protect our pc from malwares • offensive-security.com Wrap up! Computer & Internet Security HOSHMAND KAREEM SALIH
  • 27. • Book • Security Fundamentals – an official course - Microsoft • Windows help center • “How to protect my pc from viruses ?” • Internet • https://www.slideshare.net • Some slides about malwares , hackers , viruses and spywares • Some pictures of malwares (searched in google.com) • YouTube • A part of video in “Troy” movie References Computer & Internet Security HOSHMAND KAREEM SALIH