SlideShare a Scribd company logo
Viruses, Trojans & Worms. Oh My! Malware can be a computer virus, trojan horse, worm,  spyware, or adware. Malware is often installed by downloading programs such as screensavers, games, “free” software or by visiting malicious Web sites.
Malware Protection Section: Virus, Trojans & Worms Keep your antivirus software updated to protect your computer from the latest malware.  Set up the free Symantec Antivirus available to all UNC-Chapel Hill affiliates with a valid Onyen.  Use firewall software to prevent unwanted communications with your computer.
Malware Protection Section: Virus, Trojans & Worms Obtain and install computer firewall to protect against any unauthorized or unwanted computing activity.  Call the ITS Help Desk at (919.962.HELP) with your questions on how to protect a computer against malware.
	Social Engineering & Phishing – What Is It? Section: Virus, Trojans & Worms Social engineeringused by criminals to try to manipulate you into disclosing Sensitive Information  Phishinga form of social engineering that uses fake email messages to trick you into disclosing confidential information
	Social Engineering & Phishing Protection Section: Virus, Trojans & Worms Be suspicious of email attachments and unexpected email messages. Think twice before clicking on any link, including those in an email, pop-ups or ads.  Be wary of emails asking for personal or financial information. Call (919.962.HELP) to determine whether a suspect email is legitimate.
Learning Point # 9 Section: Virus, Trojans & Worms There is so much malware on theInternet, it makes little difference whether  you have antivirus softwareinstalled and updated on your computer Right? Wrong! Antivirus software may not detect all malware, but it is free for University staff and faculty and provides, if regularly updated, an effective tool against many viruses and other types of malware.
Learning Point # 10 Section: Virus, Trojans & Worms It’s your birthday and you get a lot of messages from your MySpace friends. Some of the names do not sound familiar, but since it’s your birthday, you may as well enjoy the greeting cards. Right? Wrong! If your profile on your favorite social networking is public, it may contain your actual birthdate. Social engineering scammers will use personal information on public sites to target individuals with phishing messages. Never open attachments or download files in messages from unknown senders.

More Related Content

What's hot

Internet security issues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Buffalo Seminary
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Adware
AdwareAdware
Adware
Avani Patel
 
C 7
C 7C 7
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
davidmmc
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
The eCore Group
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
WhiteHats
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
ritz482
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 

What's hot (18)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Adware
AdwareAdware
Adware
 
C 7
C 7C 7
C 7
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 

Similar to Security Awareness 9 10 09 V4 Viruses

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
M
MM
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
يوسف الجرعي
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
Computer Explorers
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
MarkemmanLopez
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 

Similar to Security Awareness 9 10 09 V4 Viruses (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
M
MM
M
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 

More from Catherine MacAllister

Security Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 OverviewSecurity Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 Overview
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
Catherine MacAllister
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web Browser
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
Catherine MacAllister
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
Catherine MacAllister
 

More from Catherine MacAllister (10)

Security Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 OverviewSecurity Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 Overview
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web Browser
 
Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 

Security Awareness 9 10 09 V4 Viruses

  • 1. Viruses, Trojans & Worms. Oh My! Malware can be a computer virus, trojan horse, worm, spyware, or adware. Malware is often installed by downloading programs such as screensavers, games, “free” software or by visiting malicious Web sites.
  • 2. Malware Protection Section: Virus, Trojans & Worms Keep your antivirus software updated to protect your computer from the latest malware. Set up the free Symantec Antivirus available to all UNC-Chapel Hill affiliates with a valid Onyen. Use firewall software to prevent unwanted communications with your computer.
  • 3. Malware Protection Section: Virus, Trojans & Worms Obtain and install computer firewall to protect against any unauthorized or unwanted computing activity. Call the ITS Help Desk at (919.962.HELP) with your questions on how to protect a computer against malware.
  • 4. Social Engineering & Phishing – What Is It? Section: Virus, Trojans & Worms Social engineeringused by criminals to try to manipulate you into disclosing Sensitive Information Phishinga form of social engineering that uses fake email messages to trick you into disclosing confidential information
  • 5. Social Engineering & Phishing Protection Section: Virus, Trojans & Worms Be suspicious of email attachments and unexpected email messages. Think twice before clicking on any link, including those in an email, pop-ups or ads. Be wary of emails asking for personal or financial information. Call (919.962.HELP) to determine whether a suspect email is legitimate.
  • 6. Learning Point # 9 Section: Virus, Trojans & Worms There is so much malware on theInternet, it makes little difference whether you have antivirus softwareinstalled and updated on your computer Right? Wrong! Antivirus software may not detect all malware, but it is free for University staff and faculty and provides, if regularly updated, an effective tool against many viruses and other types of malware.
  • 7. Learning Point # 10 Section: Virus, Trojans & Worms It’s your birthday and you get a lot of messages from your MySpace friends. Some of the names do not sound familiar, but since it’s your birthday, you may as well enjoy the greeting cards. Right? Wrong! If your profile on your favorite social networking is public, it may contain your actual birthdate. Social engineering scammers will use personal information on public sites to target individuals with phishing messages. Never open attachments or download files in messages from unknown senders.