SlideShare a Scribd company logo
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
05.3
Issues in Computing:
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
2
Information
Systems Security
Ethical and Legal
Implications of
Information Systems
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
3
Computer Malware
Computer viruses
Windows Security
Internet of Things
Vulnerabilities
and attacks
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
4
Computer
Viruses
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
5
A computer virus, much like a flu virus, is
designed to spread from host to host and can
replicate itself.
In more technical terms, a computer virus is a type
of malicious code or program written to alter the
way a computer operates and is designed to spread
from one computer to another.
A virus operates by inserting or attaching itself to
a legitimate program or document that supports
macros in order to execute its code.
In the process, a virus has the potential to cause
unexpected or damaging effects, such as harming
the system software by corrupting or destroying
data
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
6
The Iliad is an epic poem in 24
books traditionally attributed to
the ancient Greek poet Homer,
about the Trojan War. Some of
the characters are:
Paris, Helen of Troy, Hector.
Agamemnon, Menelaus, Achilles.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
7
How does a computer virus attack?
Once a virus has successfully attached to a
program, file, or document, the virus will lie
dormant until circumstances cause the
computer or device to execute its code.
For a virus to infect your computer, you must
run the infected program, which in turn
causes the virus code to be executed.
This means that a virus can remain dormant
on your computer, without showing major
signs or symptoms.
However, once the virus infects your
computer, the virus can infect other
computers on the same network.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
8
Stealing passwords or data, logging
keystrokes, corrupting files, spamming
your email contacts, and even taking
over your machine are just some of the
devastating and irritating things a virus
can do.
While some viruses can be playful in
intent and effect, others can have
profound and damaging effects.
This includes erasing data or causing
permanent damage to your hard disk.
Worse yet, some viruses are designed
with financial gains in mind.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
9
What is a keylogger?
Keyloggers are a particularly insidious
type of spyware that can record and
steal consecutive keystrokes (and much
more) that the user enters on a device.
The term keylogger, or "keystroke
logger," is self-explanatory: Software
that logs what you type on your
keyboard. However, keyloggers can
also enable cybercriminals to
eavesdrop on you, watch you on your
system camera, or listen over your
smartphone's microphone
https://www.malwarebytes.com/keylogger
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
10
How do computer viruses spread?
In a constantly connected world, you can
contract a computer virus in many ways,
some more obvious than others.
Viruses can be spread through email and
text message attachments, Internet file
downloads, and social media scam links.
Your mobile devices and smartphones
can become infected with mobile viruses
through shady App downloads.
Viruses can hide disguised as
attachments of socially shareable
content such as funny images, greeting
cards, or audio and video files.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
11
To avoid contact with a virus, it’s
important to exercise caution when
surfing the web, downloading files, and
opening links or attachments.
To help stay safe, never download text
or email attachments that you’re not
expecting, or files from websites you
don’t trust.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
12
What are the signs of a computer
virus?
A computer virus attack can produce a
variety of symptoms. Here are some of
them:
• Frequent pop-up windows. Pop-ups
might encourage you to visit unusual sites. Or
they might prod you to download antivirus or
other software programs.
• Changes to your homepage. Your usual
homepage may change to another website, for
instance. Plus, you may be unable to reset it.
• Mass emails being sent from your
email account. A criminal may take control
of your account or send emails in your name
from another infected computer.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
13
• Frequent crashes. A virus can inflict major
damage on your hard drive. This may cause
your device to freeze or crash. It may also
prevent your device from coming back on.
• Unusually slow computer
performance. A sudden change in
processing speed could signal that your
computer has a virus.
• Unknown programs that startup when
you turn on your computer. You may
become aware of the unfamiliar program
when you start your computer. Or you might
notice it by checking your computer’s list of
active applications.
• Unusual activities like password
changes. This could prevent you from
logging into your computer.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
14
https://www.matellio.com/blog/which-are-the-best-antivirus-software-for-2022/
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
15
https://www.pcmag.com/picks/the-best-antivirus-protection
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
16
Computer Malware
Computer viruses
Windows Security
Internet of Things
Vulnerabilities
and attacks
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
17
Computer
Malware
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
18
Malware is an abbreviated form of
“MALicious softWARE.”
This is software that is specifically designed
to gain access to or damage a computer,
usually without the knowledge of the owner.
There are various types of malware, including
spyware, ransomware, viruses, worms,
Trojan horses, adware, or any type of
malicious code that infiltrates a computer.
Generally, the software is considered
malware based on the intent of the creator
rather than its actual features.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
19
Malware creation is on the rise due to money
that can be made through organized Internet
crime.
Originally malware was created for
experiments and pranks, but eventually, it
was used for vandalism and destruction of
targeted machines.
Today, much of malware is created to make a
profit from forced advertising (adware),
stealing sensitive information (spyware),
spreading email spam or child pornography
(zombie computers), or extorting money
(ransomware).
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
20
Various factors can make computers more
vulnerable to malware attacks, including defects in
the operating system (OS) design, all the computers
on a network running the same OS, giving users too
many permissions, or just because a computer runs
on a particular operating system, such as Windows,
for example.
The best protection from malware — whether
ransomware, bots, browser hijackers, or other
malicious software — continues to be the usual,
preventive advice: be careful about what email
attachments you open, be cautious when surfing by
staying away from suspicious websites, and install
and maintain an updated, quality antivirus program.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
21
Computer Malware
Computer viruses
Windows Security
Internet of Things
Vulnerabilities
and attacks
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
22
Vulnerabilities
and attacks
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
23
A vulnerability is a system
susceptibility or flaw.
Many vulnerabilities are documented
in the Common Vulnerabilities and
Exposures (CVE) database.
An exploitable vulnerability is one for
which at least one working attack or
“exploit” exists.
To secure a computer system, it is
important to understand the attacks
that can be made against it, and these
threats can typically be classified into
one of the following categories.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
24
Backdoors
A backdoor in a computer system, a
cryptosystem, or an algorithm, is any
secret method of bypassing normal
authentication or security controls.
They may exist for a number of
reasons, including by original design
or poor configuration.
They may have been added by an
authorized party to allow some
legitimate access, or by an attacker for
malicious reasons; but regardless of
the motives for their existence, they
create a vulnerability.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
25
Denial-of-service attack
Denial of service attacks are designed
to make a machine or network
resource unavailable to its intended
users.
Attackers can deny service to
individual victims, such as by
deliberately entering a wrong
password enough consecutive times to
cause the victim account to be locked,
or they may overload the capabilities of
a machine or network and block all
users at once.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
26
While a network attack from a single
IP address can be blocked by adding a
new firewall rule, many forms of
Distributed denial of service (DDoS)
attacks are possible, where the attack
comes from a large number of points –
and defending is much more difficult.
Such attacks can originate from the
zombie computers of a botnet, but a
range of other techniques are possible
including reflection and amplification
attacks, where innocent systems are
fooled into sending traffic to the
victim.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
27
Direct-access attacks
An unauthorized user gaining physical access to
a computer is most likely able to directly copy
data from it.
They may also compromise security by making
operating system modifications, installing
software worms, keyloggers, covert listening
devices, or using wireless mice.
Even when the system is protected by standard
security measures, these may be able to be
bypassed by booting another operating system
or tool from a CD-ROM or other bootable media.
Disk encryption and Trusted Platform Module
are designed to prevent these attacks.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
28
Eavesdropping
It is the act of surreptitiously listening
to a private conversation, typically
between hosts on a network.
For instance, programs such as
Carnivore and Narus Insight have
been used by the FBI and NSA to
eavesdrop on the systems of internet
service providers.
Even machines that operate as a closed
system can be eavesdropped upon via
monitoring the faint electro-magnetic
transmissions generated by the
hardware.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
29
Tampering
Tampering describes a malicious modification of
products.
So-called “Evil Maid” attacks and security services
planting surveillance capability into routers are examples.
An evil maid attack is an attack on an unattended device,
in which an attacker with physical access alters it in some
undetectable way so that they can later access the device,
or the data on it.
The name refers to the scenario where a maid could
subvert a device left unattended in a hotel room – but the
concept itself also applies to situations such as a device
being intercepted while in transit, or taken away
temporarily by airport or law enforcement personnel.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
30
Spoofing
Spoofing, in general, is a fraudulent or
malicious practice in which communication is
sent from an unknown source disguised as a
source known to the receiver.
Spoofing is most prevalent in communication
mechanisms that lack a high level of security.
Spam
One of the most annoying emails to receive is
junk email.
This is also referred to as spam, unsolicited
bulk email from cyber criminals or unethical
companies.
It comes in the form of images and videos.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
31
Spam
• Brand of canned cooked pork made
by Hormel Foods Corporation,
introduced in 1937
https://en.wikipedia.org/wiki/Spam_(food)
• Unsolicited messages sent in bulk by
email (Also referred to as junk
email)
• The name comes from a Monty
Python sketch in which the name of
the Spam product is ubiquitous,
unavoidable, and repetitive.
https://en.wikipedia.org/wiki/Email_spam
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
The attacker is basically “hijacking” the clicks meant for the top-level page and
routing them to some other irrelevant page, most likely owned by someone else.
A similar technique can be used to hijack keystrokes.
Carefully drafting a combination of stylesheets, iframes, buttons, and text
boxes, a user can be led into believing that they are typing the password or
other information on some authentic webpage while it is being channeled into
an invisible frame controlled by the attacker. 32
Clickjacking
Also known as “UI redress attack” or “User Interface
redress attack”, is a malicious technique in which an
attacker tricks a user into clicking on a button or link
on another webpage while the user intended to click on
the top-level page.
This is done using multiple transparent or opaque
layers.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
33
Phishing
Phishing is a cyber-attack that uses disguised email as a weapon.
The goal is to trick the email recipient into believing that the message is
something they want or need — a request from their bank, for instance, or a note
from someone in their company — and to click a link or download an
attachment.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
34
What really distinguishes phishing is the form the
message takes: the attackers masquerade as a trusted
entity of some kind, often a real or plausibly real
person, or a company the victim might do business
with.
It's one of the oldest types of cyberattacks, dating
back to the 1990s, and it's still one of the most
widespread and pernicious, with phishing messages
and techniques becoming increasingly sophisticated.
While there are several paid-for and free applications
that protect against viruses and malware, Windows
has built-in applications to monitor the health of
your PC and protect it against hostile threats.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
35
eMail phishing:
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
36
Other types of Phishing
Spear phishing: Spear phishing
targets a specific group or type of
individual such as a company’s system
administrator.
https://www.trendmicro.com/en_us/wha
t-is/phishing/types-of-phishing.html
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
37
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
38
Other types of Phishing
Whaling: is an even more targeted
type of phishing that goes after the
whales. Typically target a CEO, CFO,
or any CXX within a specific business.
https://www.trendmicro.com/en_us/wha
t-is/phishing/types-of-phishing.html
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
39
Other types of Phishing
Smishing: is an attack that uses text
messaging or short message service
(SMS) to execute the attack.
https://www.trendmicro.com/en_us/wha
t-is/phishing/types-of-phishing.html
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
40
Other types of Phishing
Vishing: This attack is accomplished
through a voice call. Hence the “v”
rather than the “ph” in the name.
https://www.trendmicro.com/en_us/wha
t-is/phishing/types-of-phishing.html
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
41
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
42
Computer Malware
Computer viruses
Windows Security
Internet of Things
Vulnerabilities
and attacks
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
43
IoT and
physical
vulnerabilities
Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
44
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
45
The Internet of Things (IoT) is the
network of physical objects such as
devices, vehicles, and buildings that
are embedded with electronics,
software, sensors, and network
connectivity that enables them to
collect and exchange data – and
concerns have been raised that this is
being developed without appropriate
consideration of the security
challenges involved.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
46
While the IoT creates opportunities for
more direct integration of the physical
world into computer-based systems, it
also provides opportunities for misuse.
In particular, as the IoT spreads
widely, cyber-attacks are likely to
become an increasingly physical
(rather than simply virtual) threat.
If a front door’s lock is connected to
the Internet and can be
locked/unlocked from a phone, then a
criminal could enter the home at the
press of a button from a stolen or
hacked phone.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
47
People could stand to lose much more
than their credit card numbers in a
world controlled by IoT-enabled
devices.
Thieves have also used electronic
means to circumvent non-Internet-
connected hotel door locks.
Medical devices have either been
successfully attacked or had
potentially deadly vulnerabilities
demonstrated, including both in-
hospital diagnostic equipment and
implanted devices including
pacemakers and insulin pumps.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
48
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
The expression computer virus was coined
by Fred Cohen (1986), because…
49
… he said that a program that could
infect other programs acted as a
“virus”.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
50
What are the signs of a computer
virus?
• Frequent pop-up windows.
• Changes to your homepage.
• Mass emails being sent from your email
account.
• Frequent crashes in computer system.
• Unusually slow computer performance
• Unknown programs that startup when you
turn on your computer
• Unusual activities like password changes
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
51
Malware is an abbreviated form of
“MALicious softWARE.”
This is software that is specifically
designed to gain access to or
damage a computer, usually
without the knowledge of the
owner.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
52
A backdoor in a computer
system, a cryptosystem, or an
algorithm, is any secret method
of bypassing normal
authentication or security
controls.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
53
Denial of service attacks are
designed to make a machine or
network resource unavailable to its
intended users.
Attackers can deny service to
individual victims, or may overload the
capabilities of a machine or network
and block all users at once.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
54
Phishing
Phishing is a cyber-attack that uses disguised email as a weapon.
The goal is to trick the email recipient into believing that the message is
something they want or need and to click a link or download an attachment.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
55
Other types of Phishing
Spear phishing: Spear phishing
targets a specific group or type of
individual such as a company’s system
administrator.
Whaling: is an even more targeted
type of phishing that goes after the
whales. Typically target a CEO, CFO,
or any CXX within a specific business.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
56
Other types of Phishing
Smishing: is an attack that uses text
messaging or short message service
(SMS) to execute the attack.
Vishing: This attack is accomplished
through a voice call. Hence the “v”
rather than the “ph” in the name.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
57
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
58
• Ch5 Topic presentation
(PowerPoint). 20 pts.
• Ch5 Topic summary. (Word
document). 30 pts.
• Chapter Quiz. 20 points.
70 pts 335 pts
5
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
59
• Midterm exam. 100 pts.
(50 questions, in 75 minutes)
100 pts 435 pts
5
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
60
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
6. Networks and
Communication
61
Next Chapter:
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
Textbook
63
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
Professor C
64
castellr@pgcc.edu
eLearning Expert
BS in Systems Engineering
MS in Systems Engineering
HC Dr in Education
IT Professor | Spanish & GED Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022
Slides last updated on 08/2023
Introduction to Information Technology
5.3. Issues in Computing: Windows Security
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
65
05.3
Issues in Computing:
Windows Security

More Related Content

What's hot

Slideshare Technology's Negative Impact on Students and Teachers
Slideshare Technology's Negative Impact on Students and TeachersSlideshare Technology's Negative Impact on Students and Teachers
Slideshare Technology's Negative Impact on Students and Teachers
Heather
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
Ian Lee
 
Laudon Ch10
Laudon Ch10Laudon Ch10
Laudon Ch10
Riju Nair
 
Why I Love Python V2
Why I Love Python V2Why I Love Python V2
Why I Love Python V2
gsroma
 
облачные вычисления и виртуализация презентация
облачные вычисления и виртуализация презентацияоблачные вычисления и виртуализация презентация
облачные вычисления и виртуализация презентацияFunnyXaoc
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
AG RD
 
Google’s project loon
Google’s project loonGoogle’s project loon
Google’s project loon
ABHISHEK GAURAV
 

What's hot (7)

Slideshare Technology's Negative Impact on Students and Teachers
Slideshare Technology's Negative Impact on Students and TeachersSlideshare Technology's Negative Impact on Students and Teachers
Slideshare Technology's Negative Impact on Students and Teachers
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
 
Laudon Ch10
Laudon Ch10Laudon Ch10
Laudon Ch10
 
Why I Love Python V2
Why I Love Python V2Why I Love Python V2
Why I Love Python V2
 
облачные вычисления и виртуализация презентация
облачные вычисления и виртуализация презентацияоблачные вычисления и виртуализация презентация
облачные вычисления и виртуализация презентация
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
 
Google’s project loon
Google’s project loonGoogle’s project loon
Google’s project loon
 

Similar to INT 1010 05-3.pdf

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
HabeebUllah10
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
Yo Maruf
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Computer security
Computer securityComputer security
Computer security
INGAMULE SIRAJI
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 

Similar to INT 1010 05-3.pdf (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
computer security
computer securitycomputer security
computer security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Internet security
Internet securityInternet security
Internet security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Luis R Castellanos

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
Luis R Castellanos
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
Luis R Castellanos
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
Luis R Castellanos
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
Luis R Castellanos
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
Luis R Castellanos
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
Luis R Castellanos
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
Luis R Castellanos
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
Luis R Castellanos
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
Luis R Castellanos
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
Luis R Castellanos
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
Luis R Castellanos
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
Luis R Castellanos
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
Luis R Castellanos
 
INT 1010 09-1.pdf
INT 1010 09-1.pdfINT 1010 09-1.pdf
INT 1010 09-1.pdf
Luis R Castellanos
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
Luis R Castellanos
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
Luis R Castellanos
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
Luis R Castellanos
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
Luis R Castellanos
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
Luis R Castellanos
 

More from Luis R Castellanos (20)

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
 
INT 1010 09-1.pdf
INT 1010 09-1.pdfINT 1010 09-1.pdf
INT 1010 09-1.pdf
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
 

Recently uploaded

MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 

Recently uploaded (20)

MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 

INT 1010 05-3.pdf

  • 1. Introduction to Information Technology 5.3. Issues in Computing: Windows Security Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 1 05.3 Issues in Computing: Windows Security
  • 2. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 2 Information Systems Security Ethical and Legal Implications of Information Systems Windows Security
  • 3. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 3 Computer Malware Computer viruses Windows Security Internet of Things Vulnerabilities and attacks
  • 4. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 4 Computer Viruses Windows Security
  • 5. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 5 A computer virus, much like a flu virus, is designed to spread from host to host and can replicate itself. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data
  • 6. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 6 The Iliad is an epic poem in 24 books traditionally attributed to the ancient Greek poet Homer, about the Trojan War. Some of the characters are: Paris, Helen of Troy, Hector. Agamemnon, Menelaus, Achilles.
  • 7. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 7 How does a computer virus attack? Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. For a virus to infect your computer, you must run the infected program, which in turn causes the virus code to be executed. This means that a virus can remain dormant on your computer, without showing major signs or symptoms. However, once the virus infects your computer, the virus can infect other computers on the same network.
  • 8. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 8 Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do. While some viruses can be playful in intent and effect, others can have profound and damaging effects. This includes erasing data or causing permanent damage to your hard disk. Worse yet, some viruses are designed with financial gains in mind.
  • 9. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 9 What is a keylogger? Keyloggers are a particularly insidious type of spyware that can record and steal consecutive keystrokes (and much more) that the user enters on a device. The term keylogger, or "keystroke logger," is self-explanatory: Software that logs what you type on your keyboard. However, keyloggers can also enable cybercriminals to eavesdrop on you, watch you on your system camera, or listen over your smartphone's microphone https://www.malwarebytes.com/keylogger
  • 10. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 10 How do computer viruses spread? In a constantly connected world, you can contract a computer virus in many ways, some more obvious than others. Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. Your mobile devices and smartphones can become infected with mobile viruses through shady App downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files.
  • 11. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 11 To avoid contact with a virus, it’s important to exercise caution when surfing the web, downloading files, and opening links or attachments. To help stay safe, never download text or email attachments that you’re not expecting, or files from websites you don’t trust.
  • 12. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 12 What are the signs of a computer virus? A computer virus attack can produce a variety of symptoms. Here are some of them: • Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you to download antivirus or other software programs. • Changes to your homepage. Your usual homepage may change to another website, for instance. Plus, you may be unable to reset it. • Mass emails being sent from your email account. A criminal may take control of your account or send emails in your name from another infected computer.
  • 13. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 13 • Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to freeze or crash. It may also prevent your device from coming back on. • Unusually slow computer performance. A sudden change in processing speed could signal that your computer has a virus. • Unknown programs that startup when you turn on your computer. You may become aware of the unfamiliar program when you start your computer. Or you might notice it by checking your computer’s list of active applications. • Unusual activities like password changes. This could prevent you from logging into your computer.
  • 14. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 14 https://www.matellio.com/blog/which-are-the-best-antivirus-software-for-2022/
  • 15. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 15 https://www.pcmag.com/picks/the-best-antivirus-protection
  • 16. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 16 Computer Malware Computer viruses Windows Security Internet of Things Vulnerabilities and attacks
  • 17. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 17 Computer Malware Windows Security
  • 18. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 18 Malware is an abbreviated form of “MALicious softWARE.” This is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. There are various types of malware, including spyware, ransomware, viruses, worms, Trojan horses, adware, or any type of malicious code that infiltrates a computer. Generally, the software is considered malware based on the intent of the creator rather than its actual features.
  • 19. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 19 Malware creation is on the rise due to money that can be made through organized Internet crime. Originally malware was created for experiments and pranks, but eventually, it was used for vandalism and destruction of targeted machines. Today, much of malware is created to make a profit from forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or extorting money (ransomware).
  • 20. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 20 Various factors can make computers more vulnerable to malware attacks, including defects in the operating system (OS) design, all the computers on a network running the same OS, giving users too many permissions, or just because a computer runs on a particular operating system, such as Windows, for example. The best protection from malware — whether ransomware, bots, browser hijackers, or other malicious software — continues to be the usual, preventive advice: be careful about what email attachments you open, be cautious when surfing by staying away from suspicious websites, and install and maintain an updated, quality antivirus program.
  • 21. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 21 Computer Malware Computer viruses Windows Security Internet of Things Vulnerabilities and attacks
  • 22. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 22 Vulnerabilities and attacks Windows Security
  • 23. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 23 A vulnerability is a system susceptibility or flaw. Many vulnerabilities are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or “exploit” exists. To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the following categories.
  • 24. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 24 Backdoors A backdoor in a computer system, a cryptosystem, or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for a number of reasons, including by original design or poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability.
  • 25. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 25 Denial-of-service attack Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once.
  • 26. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 26 While a network attack from a single IP address can be blocked by adding a new firewall rule, many forms of Distributed denial of service (DDoS) attacks are possible, where the attack comes from a large number of points – and defending is much more difficult. Such attacks can originate from the zombie computers of a botnet, but a range of other techniques are possible including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim.
  • 27. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 27 Direct-access attacks An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, covert listening devices, or using wireless mice. Even when the system is protected by standard security measures, these may be able to be bypassed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks.
  • 28. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 28 Eavesdropping It is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and Narus Insight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system can be eavesdropped upon via monitoring the faint electro-magnetic transmissions generated by the hardware.
  • 29. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 29 Tampering Tampering describes a malicious modification of products. So-called “Evil Maid” attacks and security services planting surveillance capability into routers are examples. An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it. The name refers to the scenario where a maid could subvert a device left unattended in a hotel room – but the concept itself also applies to situations such as a device being intercepted while in transit, or taken away temporarily by airport or law enforcement personnel.
  • 30. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 30 Spoofing Spoofing, in general, is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Spoofing is most prevalent in communication mechanisms that lack a high level of security. Spam One of the most annoying emails to receive is junk email. This is also referred to as spam, unsolicited bulk email from cyber criminals or unethical companies. It comes in the form of images and videos.
  • 31. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 31 Spam • Brand of canned cooked pork made by Hormel Foods Corporation, introduced in 1937 https://en.wikipedia.org/wiki/Spam_(food) • Unsolicited messages sent in bulk by email (Also referred to as junk email) • The name comes from a Monty Python sketch in which the name of the Spam product is ubiquitous, unavoidable, and repetitive. https://en.wikipedia.org/wiki/Email_spam
  • 32. Introduction to Information Technology 5.3. Issues in Computing: Windows Security The attacker is basically “hijacking” the clicks meant for the top-level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons, and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. 32 Clickjacking Also known as “UI redress attack” or “User Interface redress attack”, is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top-level page. This is done using multiple transparent or opaque layers.
  • 33. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 33 Phishing Phishing is a cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
  • 34. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 34 What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated. While there are several paid-for and free applications that protect against viruses and malware, Windows has built-in applications to monitor the health of your PC and protect it against hostile threats.
  • 35. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 35 eMail phishing:
  • 36. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 36 Other types of Phishing Spear phishing: Spear phishing targets a specific group or type of individual such as a company’s system administrator. https://www.trendmicro.com/en_us/wha t-is/phishing/types-of-phishing.html
  • 37. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 37
  • 38. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 38 Other types of Phishing Whaling: is an even more targeted type of phishing that goes after the whales. Typically target a CEO, CFO, or any CXX within a specific business. https://www.trendmicro.com/en_us/wha t-is/phishing/types-of-phishing.html
  • 39. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 39 Other types of Phishing Smishing: is an attack that uses text messaging or short message service (SMS) to execute the attack. https://www.trendmicro.com/en_us/wha t-is/phishing/types-of-phishing.html
  • 40. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 40 Other types of Phishing Vishing: This attack is accomplished through a voice call. Hence the “v” rather than the “ph” in the name. https://www.trendmicro.com/en_us/wha t-is/phishing/types-of-phishing.html
  • 41. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 41
  • 42. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 42 Computer Malware Computer viruses Windows Security Internet of Things Vulnerabilities and attacks
  • 43. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 43 IoT and physical vulnerabilities Windows Security
  • 44. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 44
  • 45. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 45 The Internet of Things (IoT) is the network of physical objects such as devices, vehicles, and buildings that are embedded with electronics, software, sensors, and network connectivity that enables them to collect and exchange data – and concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.
  • 46. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 46 While the IoT creates opportunities for more direct integration of the physical world into computer-based systems, it also provides opportunities for misuse. In particular, as the IoT spreads widely, cyber-attacks are likely to become an increasingly physical (rather than simply virtual) threat. If a front door’s lock is connected to the Internet and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone.
  • 47. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 47 People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet- connected hotel door locks. Medical devices have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in- hospital diagnostic equipment and implanted devices including pacemakers and insulin pumps.
  • 48. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 48
  • 49. Introduction to Information Technology 5.3. Issues in Computing: Windows Security The expression computer virus was coined by Fred Cohen (1986), because… 49 … he said that a program that could infect other programs acted as a “virus”.
  • 50. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 50 What are the signs of a computer virus? • Frequent pop-up windows. • Changes to your homepage. • Mass emails being sent from your email account. • Frequent crashes in computer system. • Unusually slow computer performance • Unknown programs that startup when you turn on your computer • Unusual activities like password changes
  • 51. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 51 Malware is an abbreviated form of “MALicious softWARE.” This is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner.
  • 52. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 52 A backdoor in a computer system, a cryptosystem, or an algorithm, is any secret method of bypassing normal authentication or security controls.
  • 53. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 53 Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, or may overload the capabilities of a machine or network and block all users at once.
  • 54. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 54 Phishing Phishing is a cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need and to click a link or download an attachment.
  • 55. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 55 Other types of Phishing Spear phishing: Spear phishing targets a specific group or type of individual such as a company’s system administrator. Whaling: is an even more targeted type of phishing that goes after the whales. Typically target a CEO, CFO, or any CXX within a specific business.
  • 56. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 56 Other types of Phishing Smishing: is an attack that uses text messaging or short message service (SMS) to execute the attack. Vishing: This attack is accomplished through a voice call. Hence the “v” rather than the “ph” in the name.
  • 57. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 57
  • 58. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 58 • Ch5 Topic presentation (PowerPoint). 20 pts. • Ch5 Topic summary. (Word document). 30 pts. • Chapter Quiz. 20 points. 70 pts 335 pts 5
  • 59. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 59 • Midterm exam. 100 pts. (50 questions, in 75 minutes) 100 pts 435 pts 5
  • 60. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 60
  • 61. Introduction to Information Technology 5.3. Issues in Computing: Windows Security 6. Networks and Communication 61 Next Chapter:
  • 62. Introduction to Information Technology 5.3. Issues in Computing: Windows Security
  • 63. Introduction to Information Technology 5.3. Issues in Computing: Windows Security Textbook 63 https://eng.libretexts.org/Courses/Prince_ Georges_Community_College/INT_1010% 3A_Concepts_in_Computing Purchase of a book is not required.
  • 64. Introduction to Information Technology 5.3. Issues in Computing: Windows Security Professor C 64 castellr@pgcc.edu eLearning Expert BS in Systems Engineering MS in Systems Engineering HC Dr in Education IT Professor | Spanish & GED Instructor LCINT1010.wordpress.com Presentation created in 01/2022 Slides last updated on 08/2023
  • 65. Introduction to Information Technology 5.3. Issues in Computing: Windows Security Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 65 05.3 Issues in Computing: Windows Security