SlideShare uma empresa Scribd logo
1 de 8
Viruses & Security Threats
           Unit 1 – Understanding Computer Systems




JMW 2012
By the end of this session:
• All of you would be able to explain how viruses
  affect computers.
• Most of you should understand how your
  identity can be stolen through phishing and
  spyware applications.
• A few of you could explore other threats to
  data security, e.g. hacking, and actions that can
  be taken to minimise risks.
Viruses
• Some viruses (or malware) try to gain entry to your computer in a
  similar way by pretending to be something else.

• For example, that screensaver you downloaded or game you played
  may have a virus contained with it.

• These viruses are sometimes called Trojan Horses.

• Worms are viruses which attach themselves to files on your
  computer. Infected files then spread the virus as the worm attaches
  itself to other files on the system.

• File sharing websites can often be a source of
  viruses. Avoid sharing illegal file-sharing sites
  and scan any programs downloaded from the
  Internet.
How can I protect myself?
• Use a virus scanner to scan any files you
  download from the Internet or other
  computers.

• Regularly scan your computer’s hard drive for
  viruses.

• Keep your virus definitions
  up-to-date.
Identity Theft

• Phishing emails pretend to be another company in
  order to extract personal information, such as
  passwords, from users.

• The email asks you to click a link which takes you to a
  fake website and then enter your password (which is
  then stored by the phishers.)

• Spyware hides on your computer and records
  everything you do and passes it on to criminals.

• They can then steal your identity and pretend to be
  you – this is called “Identity Theft”
How can I protect myself?
• Check the link shown in the email matches the website
  you go to when clicked.

• Legitimate emails often use personal data, e.g. first
  name, which Phishers don’t have access to.

• Never give out your password details on any website
  unless you are 100% sure it is the official website. If in
  doubt check the email received with the company before
  divulging any information.

• Scan your computer regularly for spyware. Use firewalls
  to prevent unauthorised communication from your
  computer.
Your Task
• Create a poster to raise aware of data security
  threats.
• Your poster should:
  – Explain the risk
  – Give advice on how to minimise the risk

         Extra Challenge:

         • Explain why every computer should have a firewall installed.
         • When you buy something online, how is the debit/credit card data
           kept secure?
Peer Review of Posters
• Look at the poster of the person sitting next to
  you.
• Is it fit for purpose?
  – Does it explain at least one of the data security
    threats?
  – Does it provide advice to minimise the risks?
  – Does it stand out? Clear writing?

  Identify 2 good things about the poster (2 stars *)
       and one area for improvement (1 wish)

Mais conteúdo relacionado

Mais procurados

Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 

Mais procurados (20)

Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Anti virus
Anti virusAnti virus
Anti virus
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Destaque (7)

Ip security
Ip security Ip security
Ip security
 
IP Security
IP SecurityIP Security
IP Security
 
ip security
ip securityip security
ip security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
IP Security
IP SecurityIP Security
IP Security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Semelhante a Viruses & security threats

The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 

Semelhante a Viruses & security threats (20)

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Malware
MalwareMalware
Malware
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Computer security
Computer securityComputer security
Computer security
 

Mais de wardjo

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
wardjo
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
wardjo
 
Storage
StorageStorage
Storage
wardjo
 
Software
SoftwareSoftware
Software
wardjo
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
wardjo
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
wardjo
 
Representing text
Representing textRepresenting text
Representing text
wardjo
 
Representing sound
Representing soundRepresenting sound
Representing sound
wardjo
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimal
wardjo
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
wardjo
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
wardjo
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
wardjo
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
wardjo
 
Binary logic
Binary logicBinary logic
Binary logic
wardjo
 

Mais de wardjo (15)

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
 
Storage
StorageStorage
Storage
 
Software
SoftwareSoftware
Software
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
 
Representing text
Representing textRepresenting text
Representing text
 
Representing sound
Representing soundRepresenting sound
Representing sound
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimal
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
 
Binary logic
Binary logicBinary logic
Binary logic
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Viruses & security threats

  • 1. Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012
  • 2. By the end of this session: • All of you would be able to explain how viruses affect computers. • Most of you should understand how your identity can be stolen through phishing and spyware applications. • A few of you could explore other threats to data security, e.g. hacking, and actions that can be taken to minimise risks.
  • 3. Viruses • Some viruses (or malware) try to gain entry to your computer in a similar way by pretending to be something else. • For example, that screensaver you downloaded or game you played may have a virus contained with it. • These viruses are sometimes called Trojan Horses. • Worms are viruses which attach themselves to files on your computer. Infected files then spread the virus as the worm attaches itself to other files on the system. • File sharing websites can often be a source of viruses. Avoid sharing illegal file-sharing sites and scan any programs downloaded from the Internet.
  • 4. How can I protect myself? • Use a virus scanner to scan any files you download from the Internet or other computers. • Regularly scan your computer’s hard drive for viruses. • Keep your virus definitions up-to-date.
  • 5. Identity Theft • Phishing emails pretend to be another company in order to extract personal information, such as passwords, from users. • The email asks you to click a link which takes you to a fake website and then enter your password (which is then stored by the phishers.) • Spyware hides on your computer and records everything you do and passes it on to criminals. • They can then steal your identity and pretend to be you – this is called “Identity Theft”
  • 6. How can I protect myself? • Check the link shown in the email matches the website you go to when clicked. • Legitimate emails often use personal data, e.g. first name, which Phishers don’t have access to. • Never give out your password details on any website unless you are 100% sure it is the official website. If in doubt check the email received with the company before divulging any information. • Scan your computer regularly for spyware. Use firewalls to prevent unauthorised communication from your computer.
  • 7. Your Task • Create a poster to raise aware of data security threats. • Your poster should: – Explain the risk – Give advice on how to minimise the risk Extra Challenge: • Explain why every computer should have a firewall installed. • When you buy something online, how is the debit/credit card data kept secure?
  • 8. Peer Review of Posters • Look at the poster of the person sitting next to you. • Is it fit for purpose? – Does it explain at least one of the data security threats? – Does it provide advice to minimise the risks? – Does it stand out? Clear writing? Identify 2 good things about the poster (2 stars *) and one area for improvement (1 wish)