SlideShare a Scribd company logo
Protection Against
Cyber Crime
Summer Pair
SOCIAL ENGINEERS
AND
MALWARE
WHAT ARE SOCIAL
ENGINEERS?
• Con artists who employ tactics to trick
computer users into giving up
valuable information.
WHAT IS SPOOFING?
• A technique used by malicious
hackers to make it appear that they
are someone else and convince a user
to give up valuable information.
WHAT IS MALWARE?
• Collectively, damaging computer
programs that install themselves on
your computer without your
knowledge and consent.
TYPES OF MALWARE
• Viruses- a computer program that can reproduce itself by
attaching itself to another file.
• Worm- a computer program that can reproduce itself, but it
does not have to be attached to another file to do its work.
• Trojans- a computer program masquerading as a useful
program that lets hackers into your computer with out you
knowing it.
• Macro Viruses- is usually found in documents that can corrupt
the computer when you open the document and executes the
macro.
• Logic Bomb- can be places in a software system to set off a
series of damaging events.
• Rootkit- a set of programs or utilities designed to gain access
to the “root” of a computer system software that controls the
hardware and software.
TYPES OF MALWARE
• Botnet- a collection of “zombie” computers, which are
machines that have been taken over by malware software for
the purpose of generating spam.
• Spyware- it spies on the activity that you do on your
computer.
• Adware- a piece of software designed to deliver ads, in pop-up
form, to users desktops.
• Scareware- a scam where an online warning or pop-up
convinces a user that his or her computer is infected with
malware or has another problem that can be fixed by
purchasing and downloading software.
HOW IS MALWARE SPREAD?
• You can infect your computer by clicking on an
email attachment that contains an executable
file.
• Pictures you download can carry viruses stored
in a single pixel of the image.
• Visiting an infected website.
• Viruses can spread from a computer storage
device such as a DVD or flash drive that you
inserted into an infected computer then inserted
into another computer drive.
HOW IS MALWARE SPREAD?
• Worms can spread by simply connecting your
computer to an infected network.
• Mobile devices can be infected by downloading
an app, ringtone, game, or theme that carries
malware.
• A mobile device with Bluetooth enabled in
“discoverable mode” could be infected simply by
coming within 30 feet of another Bluetooth
device that has been infected and is running the
same operating system
PROTECTING YOUR
COMPUTER
WHAT IS COMPUTER
SECURITY?
• Computer security, also referred to as
information security, involves
protecting the boundaries of your
home or business network and
individual computing devices from
intruders.
BASIC TOOLS OF COMPUTER
SECURITY
• Authentication involves the use of passwords
and in some cases other identifiers such as
fingerprints to make sure that people accessing
information are who they say they are.
• Teaching your kids not to click on a link online
that might download a virus
• A company-wide policy identifying who can
access data and establishing procedures for
backing up files to avoid data loss.
PROTECTING YOUR HOME
NETWORK
• Changing the password on your router when
your first set it up.
• Use encryption- a part of cryptography, which is
the study of creating algorithms and codes to
protect data.
• Two popular forms of encryption are Wifi-
Protected Access (WPA) and Wired Equivalent
Privacy (WEP).
OTHER FORMS OF
PROTECTION
• Locks- laptops have a comparable device, like that of a bike
lock, that you can use to tie them down to an airport chair or
desk in a field office to deter potential thieves from snatching
them.
• Remote Tracking/Wiping- for stronger protection, consider
services such as LoJack for laptops, which allows you to
remotely delete data if your computer is stolen and use GPS to
track it.
• Fingerprint Readers- many of your newer laptops include this
feature and since fingerprints are unique to every individual,
being able to authenticate yourself with your own set of prints
to gain access to your computer is a popular security feature.
OTHER FORMS OF
PROTECTION
• Password Protection- it is a very good idea
to activate the password feature on the
computer when you travel in case
someone steals your computer you and
can’t get past the password feature.
• Mobile Computing Policies for Employees-
keeping backups of data on a separate
hard drive, or storage media such as a
flash drive.
References
Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to
Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.

More Related Content

What's hot

Firewall
FirewallFirewall
Firewall
Garmian
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
GeekTek IT Services
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
kdore
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
KashifKhan417
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
sayyed azam
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
Quick Heal Technologies Ltd.
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

Benefits Of Constant Customer Contact
Benefits Of Constant Customer ContactBenefits Of Constant Customer Contact
Benefits Of Constant Customer Contact
Statewide Insurance Brokers
 
SalonCover Insurance Business claim form
SalonCover Insurance Business claim formSalonCover Insurance Business claim form
SalonCover Insurance Business claim form
Statewide Insurance Brokers
 
Fb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bFb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bpps1111
 
DevOps Online Training
DevOps Online TrainingDevOps Online Training
DevOps Online Training
Glory IT Technologies
 
Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance Brokers
 
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival ManualStatewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance Brokers
 
Statewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the KeyStatewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the Key
Statewide Insurance Brokers
 
Cara Membuat Wordpress
Cara Membuat WordpressCara Membuat Wordpress
Cara Membuat Wordpress
DeltaForce666
 
Internet
InternetInternet
Amazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online TrainingAmazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online Training
Glory IT Technologies
 
Ansvar Care Facilities PDS
Ansvar Care Facilities PDSAnsvar Care Facilities PDS
Ansvar Care Facilities PDS
Statewide Insurance Brokers
 
CGU Business Pack Insurance Policy
CGU Business Pack Insurance PolicyCGU Business Pack Insurance Policy
CGU Business Pack Insurance Policy
Statewide Insurance Brokers
 
Statewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insuranceStatewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers
 
Blog corporativo final
Blog corporativo finalBlog corporativo final
Blog corporativo final
tilzayined
 
Statewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance UpgradesStatewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance Brokers
 
What is your Underwriter Looking For ?
What is your Underwriter Looking For ?What is your Underwriter Looking For ?
What is your Underwriter Looking For ?
Statewide Insurance Brokers
 

Viewers also liked (19)

Experience Certificates
Experience CertificatesExperience Certificates
Experience Certificates
 
Benefits Of Constant Customer Contact
Benefits Of Constant Customer ContactBenefits Of Constant Customer Contact
Benefits Of Constant Customer Contact
 
SalonCover Insurance Business claim form
SalonCover Insurance Business claim formSalonCover Insurance Business claim form
SalonCover Insurance Business claim form
 
Fb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-bFb glaxo-file photo-101115-a.pdf-b
Fb glaxo-file photo-101115-a.pdf-b
 
DevOps Online Training
DevOps Online TrainingDevOps Online Training
DevOps Online Training
 
Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated Statewide Insurance - How are my home insurance rates calculated
Statewide Insurance - How are my home insurance rates calculated
 
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival ManualStatewide Insurance - DFES Bushfire Homeowners Survival Manual
Statewide Insurance - DFES Bushfire Homeowners Survival Manual
 
RECEL TRAINER CV
RECEL TRAINER CVRECEL TRAINER CV
RECEL TRAINER CV
 
Statewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the KeyStatewide Insurance - Youth Hold the Key
Statewide Insurance - Youth Hold the Key
 
Cara Membuat Wordpress
Cara Membuat WordpressCara Membuat Wordpress
Cara Membuat Wordpress
 
Internet
InternetInternet
Internet
 
Amazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online TrainingAmazon Web Services (AWS) Online Training
Amazon Web Services (AWS) Online Training
 
Outlook ppt
Outlook pptOutlook ppt
Outlook ppt
 
Ansvar Care Facilities PDS
Ansvar Care Facilities PDSAnsvar Care Facilities PDS
Ansvar Care Facilities PDS
 
CGU Business Pack Insurance Policy
CGU Business Pack Insurance PolicyCGU Business Pack Insurance Policy
CGU Business Pack Insurance Policy
 
Statewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insuranceStatewide Insurance Brokers - Top 20 influencers in insurance
Statewide Insurance Brokers - Top 20 influencers in insurance
 
Blog corporativo final
Blog corporativo finalBlog corporativo final
Blog corporativo final
 
Statewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance UpgradesStatewide Insurance - Cgu Country Pack Insurance Upgrades
Statewide Insurance - Cgu Country Pack Insurance Upgrades
 
What is your Underwriter Looking For ?
What is your Underwriter Looking For ?What is your Underwriter Looking For ?
What is your Underwriter Looking For ?
 

Similar to Senior Technology Education

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
AJAY VISHKARMA
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
SangishettyDikshitha
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 

Similar to Senior Technology Education (20)

Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious
MaliciousMalicious
Malicious
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Cyber security
Cyber securityCyber security
Cyber security
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Firewall
FirewallFirewall
Firewall
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Malware and different types of malwares.
Malware and different types of malwares.Malware and different types of malwares.
Malware and different types of malwares.
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

Senior Technology Education

  • 3. WHAT ARE SOCIAL ENGINEERS? • Con artists who employ tactics to trick computer users into giving up valuable information.
  • 4. WHAT IS SPOOFING? • A technique used by malicious hackers to make it appear that they are someone else and convince a user to give up valuable information.
  • 5. WHAT IS MALWARE? • Collectively, damaging computer programs that install themselves on your computer without your knowledge and consent.
  • 6. TYPES OF MALWARE • Viruses- a computer program that can reproduce itself by attaching itself to another file. • Worm- a computer program that can reproduce itself, but it does not have to be attached to another file to do its work. • Trojans- a computer program masquerading as a useful program that lets hackers into your computer with out you knowing it. • Macro Viruses- is usually found in documents that can corrupt the computer when you open the document and executes the macro. • Logic Bomb- can be places in a software system to set off a series of damaging events. • Rootkit- a set of programs or utilities designed to gain access to the “root” of a computer system software that controls the hardware and software.
  • 7. TYPES OF MALWARE • Botnet- a collection of “zombie” computers, which are machines that have been taken over by malware software for the purpose of generating spam. • Spyware- it spies on the activity that you do on your computer. • Adware- a piece of software designed to deliver ads, in pop-up form, to users desktops. • Scareware- a scam where an online warning or pop-up convinces a user that his or her computer is infected with malware or has another problem that can be fixed by purchasing and downloading software.
  • 8. HOW IS MALWARE SPREAD? • You can infect your computer by clicking on an email attachment that contains an executable file. • Pictures you download can carry viruses stored in a single pixel of the image. • Visiting an infected website. • Viruses can spread from a computer storage device such as a DVD or flash drive that you inserted into an infected computer then inserted into another computer drive.
  • 9. HOW IS MALWARE SPREAD? • Worms can spread by simply connecting your computer to an infected network. • Mobile devices can be infected by downloading an app, ringtone, game, or theme that carries malware. • A mobile device with Bluetooth enabled in “discoverable mode” could be infected simply by coming within 30 feet of another Bluetooth device that has been infected and is running the same operating system
  • 11. WHAT IS COMPUTER SECURITY? • Computer security, also referred to as information security, involves protecting the boundaries of your home or business network and individual computing devices from intruders.
  • 12. BASIC TOOLS OF COMPUTER SECURITY • Authentication involves the use of passwords and in some cases other identifiers such as fingerprints to make sure that people accessing information are who they say they are. • Teaching your kids not to click on a link online that might download a virus • A company-wide policy identifying who can access data and establishing procedures for backing up files to avoid data loss.
  • 13. PROTECTING YOUR HOME NETWORK • Changing the password on your router when your first set it up. • Use encryption- a part of cryptography, which is the study of creating algorithms and codes to protect data. • Two popular forms of encryption are Wifi- Protected Access (WPA) and Wired Equivalent Privacy (WEP).
  • 14. OTHER FORMS OF PROTECTION • Locks- laptops have a comparable device, like that of a bike lock, that you can use to tie them down to an airport chair or desk in a field office to deter potential thieves from snatching them. • Remote Tracking/Wiping- for stronger protection, consider services such as LoJack for laptops, which allows you to remotely delete data if your computer is stolen and use GPS to track it. • Fingerprint Readers- many of your newer laptops include this feature and since fingerprints are unique to every individual, being able to authenticate yourself with your own set of prints to gain access to your computer is a popular security feature.
  • 15. OTHER FORMS OF PROTECTION • Password Protection- it is a very good idea to activate the password feature on the computer when you travel in case someone steals your computer you and can’t get past the password feature. • Mobile Computing Policies for Employees- keeping backups of data on a separate hard drive, or storage media such as a flash drive.
  • 16. References Jon Gordon, Karen Lankisch, Nancy Muir, Denise Seguin, Anita Verno. Our Digital World Introduction to Computing 2nd edition. St. Paul, MN: Paradigm Publishing, Inc, 2013. Pg. 236-249 Print.