SlideShare uma empresa Scribd logo
1 de 27
UNIVERSITY OF RAPARIN
FACULTY OF PRIMARY EDUCATION
COMPUTER SCIENCE DEPARTMENT
Computer & Internet
Security
HOSHMAND KAREEM SALIH
• What is the origin of the name “malware” ?
• Malicious software
Malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is the definition of malware ?
• Software that is intended to damage or disable
computers and computer systems
• Any kind of unwanted software that is installed
without your adequate consent viruses, worms
and Trojan horses are examples of malicious
software that are often grouped of malicious
software that are often grouped together and
referred to as malware.
There are many types of malware such as
• Worms
• Virus
• Spyware
• Trojan horse
• Scare ware
• Ransom ware
Types of malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Make copies of themselves again and again on
• Local drive
• Network shares
• USB drives
• Purpose
• Reproduce
• Worms does not need to attach itself to
an exiting program
Types of malware (worms)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• When executed – usually by a human, replicates by inserting copies
of itself (possibly modified) into other computer programs, data files,
or the boot sector of the hard drive; when this replication succeeds,
the affected areas are then said to be "infected.“
• Purpose
• Harm computers
Types of malware (virus)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is it?
• It is any software which takes information from your computer
without your knowledge or consent.
• Types of Spyware (just three of them)
• Trojans
• Web Bugs
• Advertiser software
Types of malware (Spyware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Appears to perform a desirable function but
instead drops a malicious payload, often
including a backdoor allowing unauthorized
access
• Purpose
• Gains privileged access to the operating system
• Trojans Does not need to attach itself to an
existing program.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• It gets the idea and the name from the story of the Trojan
horse in troy.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Appears to be beneficial from a
security perspective but provides
limited or no security, generates
erroneous or misleading alerts, or
attempts to lure users into
participating in fraudulent
transactions.
Types of malware (Scare ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Restricts access to the computer
system that it infects
• Encrypt files lock system
• Displays messages intended to coax the
user into paying
• Demands a ransom in order for the
restriction to be removed
Types of malware (ransom ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• The reasons
• Economical
• Personal
• Political
• Others
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Economical
• Stealing sensitive information which is then sold on the black market.
• Take down networks
• Personal
• Revenge , Vandalism , Experimental / research , Hobby and art
• Political
• Gaining information about different political parts
• Spying on political parts or persons
• Political messages
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• A system or group of systems
that enforces an access
control policy between two
networks.
Firewall Visible
IP
Address
Internal
Network
PC Servers
Host
• Hackers
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
Hackers and Crackers
Computer & Internet Security
• Crackers
• A person who accesses a
computer or network illegally but
has the intent of destroying data,
stealing information, or other
malicious action.
HOSHMAND KAREEM SALIH
Some systems for hacking
Computer & Internet Security
HOSHMAND KAREEM SALIH
A system for cracking (OllyICE)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use an Antimalware app
• Installing an antimalware app and keeping it up to date
can help defend your PC against viruses and other
malware (malicious software). Antimalware apps scan for
viruses, spyware, and other malware trying to get into your
email, operating system, or files. New threats can appear
daily, so check the antimalware manufacturer's website
frequently for updates
• Some Antimalware apps
• Microsoft Security Essential , Norton , Avast, Avira ,
Kaspersky, AVG
• All the companies that we mentioned has either antivirus
and internet security
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Don't open email messages from unfamiliar senders, or
email attachments that you don't recognize
• Many viruses are attached to email messages and will spread as
soon as you open the attachment. It's best not to open any
attachment unless it's something you're expecting
• Microsoft Outlook and Windows Mail help block potentially
dangerous attachments
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a pop-up blocker with your Internet browser
• Pop-up windows are small browser windows that appear on top of
the website you're viewing. Although most are created by
advertisers, they can also contain malicious or unsafe code. A pop-
up blocker can prevent some or all of these windows from
appearing
• The Pop-up Blocker feature in Internet Explorer and the other
advanced browsers
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Keep Windows Updated
• Periodically, Microsoft releases special security updates that can
help protect your PC. These updates can help prevent viruses and
other malware attacks by closing possible security holes
• Turn on Windows Update to make sure that Windows receives these
updates automatically
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a firewall
• Windows Firewall or any other firewall app can help notify you about
suspicious activity if a virus or worm attempts to connect to your PC.
It can also block viruses, worms, and hackers from attempting to
download potentially harmful apps to your PC
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Turn on User Account Control (UAC)
• When changes are going to be made to your PC that
require administrator-level permission, UAC notifies you and
gives you the chance to approve the change. UAC can
help keep viruses from making unwanted changes
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Clear your Internet cache and your browsing history
• Most browsers store info about the websites you visit, and they might
also store info that websites might ask you to provide (such as your
name and address). While it can be helpful to have these details
stored on your PC, there are times when you might want to delete
some or all of them—for example, when you're using a public PC
and don't want to leave personal info behind
• For deleting all the history , privacy and stored information in an
easy way use CCleaner app
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use another type of operating system
• Because Windows is the most operating system used in the world ,
the most malwares are made for windows , so using another type of
OS like Linux or Mac OS x is better , because malwares for these
Operating systems are not too much
• Some types of Linux
• Ubuntu
• Open SUZI
• Backtrack
• Kali
• Red hat
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
•Offensive Security Training and Services
• World Class Information Security Training and Penetration Testing
Online Training courses
HOSHMAND KAREEM SALIH
• We previously talked about these
• What is malware
• Types of malware
• Reasons for writing malware
• firewall
• Hackers and crackers
• How to protect our pc from malwares
• offensive-security.com
Wrap up!
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Book
• Security Fundamentals – an official course - Microsoft
• Windows help center
• “How to protect my pc from viruses ?”
• Internet
• https://www.slideshare.net
• Some slides about malwares , hackers , viruses and spywares
• Some pictures of malwares (searched in google.com)
• YouTube
• A part of video in “Troy” movie
References
Computer & Internet Security
HOSHMAND KAREEM SALIH

Mais conteúdo relacionado

Mais procurados

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksRaghu Addanki
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat RansomwareIvanti
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 

Mais procurados (20)

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Network Security
Network SecurityNetwork Security
Network Security
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 

Destaque

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programminghoshmand kareem
 
Internet security
Internet securityInternet security
Internet securitygohel
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 

Destaque (10)

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programming
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 

Semelhante a Computer and internet security

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Systweak Software
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 

Semelhante a Computer and internet security (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security
Computer securityComputer security
Computer security
 
Malicious
MaliciousMalicious
Malicious
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malwares
MalwaresMalwares
Malwares
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Security
SecuritySecurity
Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 

Último

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Computer and internet security

  • 1. UNIVERSITY OF RAPARIN FACULTY OF PRIMARY EDUCATION COMPUTER SCIENCE DEPARTMENT Computer & Internet Security HOSHMAND KAREEM SALIH
  • 2. • What is the origin of the name “malware” ? • Malicious software Malware Computer & Internet Security HOSHMAND KAREEM SALIH • What is the definition of malware ? • Software that is intended to damage or disable computers and computer systems • Any kind of unwanted software that is installed without your adequate consent viruses, worms and Trojan horses are examples of malicious software that are often grouped of malicious software that are often grouped together and referred to as malware.
  • 3. There are many types of malware such as • Worms • Virus • Spyware • Trojan horse • Scare ware • Ransom ware Types of malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 4. • Activity • Make copies of themselves again and again on • Local drive • Network shares • USB drives • Purpose • Reproduce • Worms does not need to attach itself to an exiting program Types of malware (worms) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 5. • Activity • When executed – usually by a human, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected.“ • Purpose • Harm computers Types of malware (virus) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 6. • What is it? • It is any software which takes information from your computer without your knowledge or consent. • Types of Spyware (just three of them) • Trojans • Web Bugs • Advertiser software Types of malware (Spyware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 7. • Activity • Appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access • Purpose • Gains privileged access to the operating system • Trojans Does not need to attach itself to an existing program. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 8. • It gets the idea and the name from the story of the Trojan horse in troy. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 9. • Appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. Types of malware (Scare ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 10. • Restricts access to the computer system that it infects • Encrypt files lock system • Displays messages intended to coax the user into paying • Demands a ransom in order for the restriction to be removed Types of malware (ransom ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 11. • The reasons • Economical • Personal • Political • Others Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 12. • Economical • Stealing sensitive information which is then sold on the black market. • Take down networks • Personal • Revenge , Vandalism , Experimental / research , Hobby and art • Political • Gaining information about different political parts • Spying on political parts or persons • Political messages Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 13. • A system or group of systems that enforces an access control policy between two networks. Firewall Visible IP Address Internal Network PC Servers Host
  • 14. • Hackers • A person who accesses a computer or network illegally. • Various types • Black • Grey • White Hackers and Crackers Computer & Internet Security • Crackers • A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. HOSHMAND KAREEM SALIH
  • 15. Some systems for hacking Computer & Internet Security HOSHMAND KAREEM SALIH
  • 16. A system for cracking (OllyICE) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 17. • Use an Antimalware app • Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files. New threats can appear daily, so check the antimalware manufacturer's website frequently for updates • Some Antimalware apps • Microsoft Security Essential , Norton , Avast, Avira , Kaspersky, AVG • All the companies that we mentioned has either antivirus and internet security How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 18. • Don't open email messages from unfamiliar senders, or email attachments that you don't recognize • Many viruses are attached to email messages and will spread as soon as you open the attachment. It's best not to open any attachment unless it's something you're expecting • Microsoft Outlook and Windows Mail help block potentially dangerous attachments How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 19. • Use a pop-up blocker with your Internet browser • Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop- up blocker can prevent some or all of these windows from appearing • The Pop-up Blocker feature in Internet Explorer and the other advanced browsers How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 20. • Keep Windows Updated • Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible security holes • Turn on Windows Update to make sure that Windows receives these updates automatically How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 21. • Use a firewall • Windows Firewall or any other firewall app can help notify you about suspicious activity if a virus or worm attempts to connect to your PC. It can also block viruses, worms, and hackers from attempting to download potentially harmful apps to your PC How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 22. • Turn on User Account Control (UAC) • When changes are going to be made to your PC that require administrator-level permission, UAC notifies you and gives you the chance to approve the change. UAC can help keep viruses from making unwanted changes How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 23. • Clear your Internet cache and your browsing history • Most browsers store info about the websites you visit, and they might also store info that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your PC, there are times when you might want to delete some or all of them—for example, when you're using a public PC and don't want to leave personal info behind • For deleting all the history , privacy and stored information in an easy way use CCleaner app How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 24. • Use another type of operating system • Because Windows is the most operating system used in the world , the most malwares are made for windows , so using another type of OS like Linux or Mac OS x is better , because malwares for these Operating systems are not too much • Some types of Linux • Ubuntu • Open SUZI • Backtrack • Kali • Red hat How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 25. •Offensive Security Training and Services • World Class Information Security Training and Penetration Testing Online Training courses HOSHMAND KAREEM SALIH
  • 26. • We previously talked about these • What is malware • Types of malware • Reasons for writing malware • firewall • Hackers and crackers • How to protect our pc from malwares • offensive-security.com Wrap up! Computer & Internet Security HOSHMAND KAREEM SALIH
  • 27. • Book • Security Fundamentals – an official course - Microsoft • Windows help center • “How to protect my pc from viruses ?” • Internet • https://www.slideshare.net • Some slides about malwares , hackers , viruses and spywares • Some pictures of malwares (searched in google.com) • YouTube • A part of video in “Troy” movie References Computer & Internet Security HOSHMAND KAREEM SALIH