Protection Against
Cyber Crime
Summer Pair
SOCIAL ENGINEERS
AND
MALWARE
WHAT ARE SOCIAL
ENGINEERS?
• Con artists who employ tactics to trick
computer users into giving up
valuable information.
WHAT IS SPOOFING?
• A technique used by malicious
hackers to make it appear that they
are someone else and convince a user
to give up valuable information.
WHAT IS MALWARE?
• Collectively, damaging computer
programs that install themselves on
your computer without your
knowledge and consent.
TYPES OF MALWARE
• Viruses- a computer program that can reproduce itself by
attaching itself to another file.
• Worm- a computer program that can reproduce itself, but it
does not have to be attached to another file to do its work.
• Trojans- a computer program masquerading as a useful
program that lets hackers into your computer with out you
knowing it.
• Macro Viruses- is usually found in documents that can corrupt
the computer when you open the document and executes the
macro.
• Logic Bomb- can be places in a software system to set off a
series of damaging events.
• Rootkit- a set of programs or utilities designed to gain access
to the “root” of a computer system software that controls the
hardware and software.
TYPES OF MALWARE
• Botnet- a collection of “zombie” computers, which are
machines that have been taken over by malware software for
the purpose of generating spam.
• Spyware- it spies on the activity that you do on your
computer.
• Adware- a piece of software designed to deliver ads, in pop-up
form, to users desktops.
• Scareware- a scam where an online warning or pop-up
convinces a user that his or her computer is infected with
malware or has another problem that can be fixed by
purchasing and downloading software.
HOW IS MALWARE SPREAD?
• You can infect your computer by clicking on an
email attachment that contains an executable
file.
• Pictures you download can carry viruses stored
in a single pixel of the image.
• Visiting an infected website.
• Viruses can spread from a computer storage
device such as a DVD or flash drive that you
inserted into an infected computer then inserted
into another computer drive.
HOW IS MALWARE SPREAD?
• Worms can spread by simply connecting your
computer to an infected network.
• Mobile devices can be infected by downloading
an app, ringtone, game, or theme that carries
malware.
• A mobile device with Bluetooth enabled in
“discoverable mode” could be infected simply by
coming within 30 feet of another Bluetooth
device that has been infected and is running the
same operating system
PROTECTING YOUR
COMPUTER
WHAT IS COMPUTER
SECURITY?
• Computer security, also referred to as
information security, involves
protecting the boundaries of your
home or business network and
individual computing devices from
intruders.
BASIC TOOLS OF COMPUTER
SECURITY
• Authentication involves the use of passwords
and in some cases other identifiers such as
fingerprints to make sure that people accessing
information are who they say they are.
• Teaching your kids not to click on a link online
that might download a virus
• A company-wide policy identifying who can
access data and establishing procedures for
backing up files to avoid data loss.
PROTECTING YOUR HOME
NETWORK
• Changing the password on your router when
your first set it up.
• Use encryption- a part of cryptography, which is
the study of creating algorithms and codes to
protect data.
• Two popular forms of encryption are Wifi-
Protected Access (WPA) and Wired Equivalent
Privacy (WEP).
OTHER FORMS OF
PROTECTION
• Locks- laptops have a comparable device, like that of a bike
lock, that you can use to tie them down to an airport chair or
desk in a field office to deter potential thieves from snatching
them.
• Remote Tracking/Wiping- for stronger protection, consider
services such as LoJack for laptops, which allows you to
remotely delete data if your computer is stolen and use GPS to
track it.
• Fingerprint Readers- many of your newer laptops include this
feature and since fingerprints are unique to every individual,
being able to authenticate yourself with your own set of prints
to gain access to your computer is a popular security feature.
OTHER FORMS OF
PROTECTION
• Password Protection- it is a very good idea
to activate the password feature on the
computer when you travel in case
someone steals your computer you and
can’t get past the password feature.
• Mobile Computing Policies for Employees-
keeping backups of data on a separate
hard drive, or storage media such as a
flash drive.
References
Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to
Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.

Senior Technology Education

  • 1.
  • 2.
  • 3.
    WHAT ARE SOCIAL ENGINEERS? •Con artists who employ tactics to trick computer users into giving up valuable information.
  • 4.
    WHAT IS SPOOFING? •A technique used by malicious hackers to make it appear that they are someone else and convince a user to give up valuable information.
  • 5.
    WHAT IS MALWARE? •Collectively, damaging computer programs that install themselves on your computer without your knowledge and consent.
  • 6.
    TYPES OF MALWARE •Viruses- a computer program that can reproduce itself by attaching itself to another file. • Worm- a computer program that can reproduce itself, but it does not have to be attached to another file to do its work. • Trojans- a computer program masquerading as a useful program that lets hackers into your computer with out you knowing it. • Macro Viruses- is usually found in documents that can corrupt the computer when you open the document and executes the macro. • Logic Bomb- can be places in a software system to set off a series of damaging events. • Rootkit- a set of programs or utilities designed to gain access to the “root” of a computer system software that controls the hardware and software.
  • 7.
    TYPES OF MALWARE •Botnet- a collection of “zombie” computers, which are machines that have been taken over by malware software for the purpose of generating spam. • Spyware- it spies on the activity that you do on your computer. • Adware- a piece of software designed to deliver ads, in pop-up form, to users desktops. • Scareware- a scam where an online warning or pop-up convinces a user that his or her computer is infected with malware or has another problem that can be fixed by purchasing and downloading software.
  • 8.
    HOW IS MALWARESPREAD? • You can infect your computer by clicking on an email attachment that contains an executable file. • Pictures you download can carry viruses stored in a single pixel of the image. • Visiting an infected website. • Viruses can spread from a computer storage device such as a DVD or flash drive that you inserted into an infected computer then inserted into another computer drive.
  • 9.
    HOW IS MALWARESPREAD? • Worms can spread by simply connecting your computer to an infected network. • Mobile devices can be infected by downloading an app, ringtone, game, or theme that carries malware. • A mobile device with Bluetooth enabled in “discoverable mode” could be infected simply by coming within 30 feet of another Bluetooth device that has been infected and is running the same operating system
  • 10.
  • 11.
    WHAT IS COMPUTER SECURITY? •Computer security, also referred to as information security, involves protecting the boundaries of your home or business network and individual computing devices from intruders.
  • 12.
    BASIC TOOLS OFCOMPUTER SECURITY • Authentication involves the use of passwords and in some cases other identifiers such as fingerprints to make sure that people accessing information are who they say they are. • Teaching your kids not to click on a link online that might download a virus • A company-wide policy identifying who can access data and establishing procedures for backing up files to avoid data loss.
  • 13.
    PROTECTING YOUR HOME NETWORK •Changing the password on your router when your first set it up. • Use encryption- a part of cryptography, which is the study of creating algorithms and codes to protect data. • Two popular forms of encryption are Wifi- Protected Access (WPA) and Wired Equivalent Privacy (WEP).
  • 14.
    OTHER FORMS OF PROTECTION •Locks- laptops have a comparable device, like that of a bike lock, that you can use to tie them down to an airport chair or desk in a field office to deter potential thieves from snatching them. • Remote Tracking/Wiping- for stronger protection, consider services such as LoJack for laptops, which allows you to remotely delete data if your computer is stolen and use GPS to track it. • Fingerprint Readers- many of your newer laptops include this feature and since fingerprints are unique to every individual, being able to authenticate yourself with your own set of prints to gain access to your computer is a popular security feature.
  • 15.
    OTHER FORMS OF PROTECTION •Password Protection- it is a very good idea to activate the password feature on the computer when you travel in case someone steals your computer you and can’t get past the password feature. • Mobile Computing Policies for Employees- keeping backups of data on a separate hard drive, or storage media such as a flash drive.
  • 16.
    References Jon Gordon, KarenLankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.