internet threats and how to protect your computer -brian arendt

9
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

Upload: derek-patterson

Post on 22-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER-BRIAN ARENDT

Page 2: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

WHY IS PROTECTING YOUR COMPUTER IMPORTANT?

When we use the internet, information is shared and sometimes the shared information could be personal information like bank account numbers and credit card numbers. Without the use of Internet security, the information you share is exposed to hackers to access, view, and steal your information. There are other threats that you can become susceptible of like viruses, worms, Trojan Horses and E-mail viruses.

Page 3: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

VIRUSES

• A computer virus is a program that infects your computer and multiplies.

• Once a computer or program is infected, the reproduction of the virus can continue to infect other programs and even other people’s computers if information is shared between multiple users.

• When a computer virus spreads it does so after the initial attack and continues to be spread through common use of the computer or program.

Page 4: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

• Computer viruses have their own distinctive methods of causing harm.

• Some have an attack phase, otherwise known as a “payload” . A payload is a damaging effect of the virus that causes damage by deleting files or randomly changing data.

• Other viruses may take some time to cause permanent damage to your computer.

Page 5: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

WORMS

• Worms are similar to viruses. They spread from computer to computer but unlike viruses there is no need for human assistance for the worm to travel.

• Worms have to ability to copy itself multiple times

• Once a worm replicates itself it can access your address book and send its copies to everyone in your address book. This cycle will keep repeating.

• Worms will eventually take up too much system memory and cause the computer to crash and damaging the computer as well.

Page 6: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

TROJAN HORSES

• Unlike worms and viruses, Trojan horses do not replicate.

• Trojan horses disguise themselves as a harmless document or file and trick you into thinking that theses programs will help your computer.

• Trojans are mostly used by cybercriminals to access your files or to just damage your computer.

• Trojans can even use something called a key logger which tracks what kind of text field you are using and what content you are entering. Usernames and passwords can be stolen using this method.

Page 7: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

E-MAIL WORMS

• An e-mail worm is a form of malware that appears to be harmless, but when the user opens an e-mail it activates.

• These worms can infect one’s e-mail account and automatically send e-mails with a copy of the worm to anyone in your address book.

• Once the e-mail is opened the user will need to click on a link or attachment to get the worm.

• The worm can then cause damage to your computer.

Page 8: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

HOW TO PROTECT YOURSELF

• The best way to protect yourself from these dangers is to use specially designed software to guard against malware.

• Anti-malware software is used to warn the user of potential threats and to prevent these threats from damaging your computer.

• Using a Firewall is a effective method of protecting your computer.

• A firewall monitors all incoming and outgoing communication preventing harmful programs from getting onto your system.

Page 9: INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT

• Anti-virus programs is a very useful tool to protect your computer.

• Anti-virus programs scan your computer for anything that can damage your system.

• When a threat is found the program will give you the option to either ignore the threat, remove the threat, or contain the threat.

• Norton and McAfee are very popular anti-virus software.

• ESET Smart security is not as popular but is more effective then most anti-virus software.