Computer Security
Privacy & Safety in the Digital World
Threats to your computer
• Computer Threat: Anything that can damage your computer or the
information on it.
• Computer Security: The measures you can take to
avoid damage or data loss.
Computer Privacy
•Ensuring your data, such as personal files and email, is
not accessible to anyone without your permission
•Includes measures you can take to restrict access to your
data and personal information both on your computer and
the internet
Computer Security
Digital Threats
Categories
Viruses, RootKits, Malware
Spyware
Online Scams
Online Predators
Identity Theft
Computer Security
Prevention
•Virus, malware, and spyware
protection
•Password protection
•Prudence in giving out
information
Viruses, Malware, & Spyware
Difference between Viruses, Malware, and Spyware
Malware = Malicious software.
- non-specific; covers a wide variety of threats
Viruses = A program that copies itself and spreads through
computers and files, locking down the machine.
- designed to wreak havoc and cause chaos
Spyware = Software that collects your information without
your knowledge and sends it back to the creator.
- designed to make money at your expense
Computer Security
Rootkits
•Designed to hide that a PC has been compromised
- Allows malware to hide in plain sight by disguising
themselves as necessary files
•Not harmful in and of themselves – what they hide is!
•Notoriously difficult to detect so hackers can access the
targeted computer without the user noticing
•Very difficult to remove
Computer Security
How Malware Spreads
• Clicking on a corrupted email attachment
• Clicking on a downloadable file from a website that contains a
virus or spyware
• Clicking on a link in an email, on a website, or on a social
networking site. The link redirects to a website that
automatically forces the browser to download a piece of
malware
Computer Security
Beware!
•Fake antivirus programs
- Famous Examples: Security Suite, Internet Security 2010
•New toolbars or default search engines installed without
your permission
•Homepage changes
•Suspicious file names (i.e., .mp3.exe instead of .mp3)
•Pop up windows you cannot stop
•Loss of control of your PC
•Redirects or new windows to sites you did not open
Computer Security
Computer Security
Prevention Tips
•Keep all your operating system and all software updated
Most virus and spyware attacks occur through security holes
in popular software applications
•For your browser, use Firefox, Chrome or Safari rather than
Internet Explorer (IE). Because IE is so popular, malware
creators target security holes
•Don’t click on any pop ups or ads offering you anything for
free
•Know the name and display of your antivirus program
Computer Security
If something seems suspicious:
DO NOT OPEN IT!
Computer Security
Top Free Software Programs
•AVAST
- Antivirus software that checks downloaded files & monitors
websites for possible malware. Do not use more than one antivirus.
•Malwarebytes
- Manual scan that searches out rootkits and other potential
problems and threats.
•Spybot Search & Destroy
- Spyware scanner to identify and remove spyware.
Computer Security
Realities of the Digital World
•Deleting a post does not mean it disappears
•Digital content is easily forwarded and reposted
•Social networks & email providers do not make your private
information private by default
•It is up to you to look for the privacy settings
•Your online reputation has offline implications
Computer Security
Privacy in Social Networking
•Know the default privacy settings and how to change them
•You can control who sees what content, but it is easily forwarded
by the tech savvy
•Assume what you post can be seen by everyone
Computer Security
Identity Theft
When someone uses your personal information without your
knowledge, usually for monetary gain.
Do not store personal financial information on laptops or
USB/Flash drives
Delete all personal information before disposing of
computers, hard drives, or portable drives
Review privacy policies
Never give out your password or personal information,
especially if the company contacted you to request it
Computer Security
http://www.netliteracy.org/
Computer Security

More Related Content

PPTX
Computer Security 101
PPT
Computer Security and safety
PDF
Computer Security
PPT
3 Most Common Threats Of Information Security
PPTX
Information security
PPTX
Cyber Security
PDF
Computer security risks
PPTX
Cyber crime
Computer Security 101
Computer Security and safety
Computer Security
3 Most Common Threats Of Information Security
Information security
Cyber Security
Computer security risks
Cyber crime

What's hot (19)

PPTX
Syafiqah slideshare of security measures
PPTX
Cyber security
PPTX
Computer security
PPTX
Online reputation
PPT
Computer security and_privacy_2010-2011
PPTX
online and offline computer security
PPT
Computer Security
PPTX
Computer , Internet and physical security.
PPTX
Adware
PPTX
4.2.1 computer security risks
PPTX
Computer Security
PPTX
Computer Security Presentation
PPTX
Basic concepts in computer security
PPTX
Security & Privacy - Lecture D
PPTX
Ethical Hacking
PPTX
Grade 7 Chap 10 Cyber Threats and Security
PPTX
Cyber security and crime
PPTX
Computer Security risks Shelly
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
Syafiqah slideshare of security measures
Cyber security
Computer security
Online reputation
Computer security and_privacy_2010-2011
online and offline computer security
Computer Security
Computer , Internet and physical security.
Adware
4.2.1 computer security risks
Computer Security
Computer Security Presentation
Basic concepts in computer security
Security & Privacy - Lecture D
Ethical Hacking
Grade 7 Chap 10 Cyber Threats and Security
Cyber security and crime
Computer Security risks Shelly
Cyber Security Awareness (Reduce Personal & Business Risk)
Ad

Similar to Computer security (20)

PDF
IT Security.pdf
PPTX
BCE L-3omputer security Basics.pptx
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Computer security threats & prevention
PPTX
Security Basics
PPTX
Information Technology - System Threats
PDF
Digital Self Defense (RRLC version)
PPTX
Cyber-savvy Cyber-safety
PPT
Computers.ppt
PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPTX
Protect Your Computer From Viruses, Hackers,.pptx
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPT
Direct infection: virus can infect files every time a user opens that specif...
PPT
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cs0123.ppt
PPTX
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
IT Security.pdf
BCE L-3omputer security Basics.pptx
TheCyberThreatAndYou2_deck.pptx
Computer security threats & prevention
Security Basics
Information Technology - System Threats
Digital Self Defense (RRLC version)
Cyber-savvy Cyber-safety
Computers.ppt
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
Week3-CyberSecurity 8th Semester important.pdf
Protect Your Computer From Viruses, Hackers,.pptx
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Direct infection: virus can infect files every time a user opens that specif...
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
cs0123.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
Ad

More from Robin E. Beavers (7)

PDF
Virtual school presentationfinale2
PPTX
Meltingpotportfolio
PPTX
Introduction to Internet for Library Patrons
PPT
Emailbasicsclass
PPTX
Information literacyproject
PPTX
What is a swot analysis
PPTX
Melting pot
Virtual school presentationfinale2
Meltingpotportfolio
Introduction to Internet for Library Patrons
Emailbasicsclass
Information literacyproject
What is a swot analysis
Melting pot

Recently uploaded (20)

PDF
Physics Project aidop awhebfoiawlhgaeirubjk hnaeoijwg
PPTX
Electrical Safety.pptx Personal Equipment
PDF
AIF-21-22.pdffxjxjf k hkbkvk bkovkvvkkvvkvlkvkkv
PPTX
Macbethv and his after battle-flashcards-1.pptx
PPTX
Lesson 1 Memory-Management-in-Operating-Systems.pptx
PPTX
photovoltic cell ppt solar panel installation
PPT
Networks presentation of all models of networks
PPTX
TM 7_BREATHING MANAGEMENsafafadfafsasdaT.pptx
PDF
FINANCIAL DERIVATIVES - DANIEL PHILLIPE GONÇALVES MENEZES
PDF
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
PDF
Mobile with GPS Fleet Management - Business Tracking Solutions.pdf
PDF
FINANCIAL PROGRAMMING DANIEL PHILLIPE GONÇALVES MENEZES
PPTX
PPT Sedminar Proposal Lilis Mutiara.pptx
PPTX
一比一原版(UC3M毕业证书)马德里卡洛斯三世大学毕业证如何办理学历认证
PPTX
centralnervoussystempharmacologypptkiu-231026164645-0be347ba.pptx
PPTX
Electric-Current of chemical engineering (1).pptx
PPTX
safety while using ict tools.ludan awad.pptx
PPT
Intro_Net_91407 for education alright.ppt
PDF
Resistance to change (2).pdf It explains what is Nokia Nokia knowledge job co...
DOCX
Why do conventional electronic devices fail in hazardous areas.docx
Physics Project aidop awhebfoiawlhgaeirubjk hnaeoijwg
Electrical Safety.pptx Personal Equipment
AIF-21-22.pdffxjxjf k hkbkvk bkovkvvkkvvkvlkvkkv
Macbethv and his after battle-flashcards-1.pptx
Lesson 1 Memory-Management-in-Operating-Systems.pptx
photovoltic cell ppt solar panel installation
Networks presentation of all models of networks
TM 7_BREATHING MANAGEMENsafafadfafsasdaT.pptx
FINANCIAL DERIVATIVES - DANIEL PHILLIPE GONÇALVES MENEZES
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
Mobile with GPS Fleet Management - Business Tracking Solutions.pdf
FINANCIAL PROGRAMMING DANIEL PHILLIPE GONÇALVES MENEZES
PPT Sedminar Proposal Lilis Mutiara.pptx
一比一原版(UC3M毕业证书)马德里卡洛斯三世大学毕业证如何办理学历认证
centralnervoussystempharmacologypptkiu-231026164645-0be347ba.pptx
Electric-Current of chemical engineering (1).pptx
safety while using ict tools.ludan awad.pptx
Intro_Net_91407 for education alright.ppt
Resistance to change (2).pdf It explains what is Nokia Nokia knowledge job co...
Why do conventional electronic devices fail in hazardous areas.docx

Computer security

  • 1. Computer Security Privacy & Safety in the Digital World
  • 2. Threats to your computer • Computer Threat: Anything that can damage your computer or the information on it.
  • 3. • Computer Security: The measures you can take to avoid damage or data loss.
  • 4. Computer Privacy •Ensuring your data, such as personal files and email, is not accessible to anyone without your permission •Includes measures you can take to restrict access to your data and personal information both on your computer and the internet Computer Security
  • 5. Digital Threats Categories Viruses, RootKits, Malware Spyware Online Scams Online Predators Identity Theft Computer Security Prevention •Virus, malware, and spyware protection •Password protection •Prudence in giving out information
  • 6. Viruses, Malware, & Spyware Difference between Viruses, Malware, and Spyware Malware = Malicious software. - non-specific; covers a wide variety of threats Viruses = A program that copies itself and spreads through computers and files, locking down the machine. - designed to wreak havoc and cause chaos Spyware = Software that collects your information without your knowledge and sends it back to the creator. - designed to make money at your expense Computer Security
  • 7. Rootkits •Designed to hide that a PC has been compromised - Allows malware to hide in plain sight by disguising themselves as necessary files •Not harmful in and of themselves – what they hide is! •Notoriously difficult to detect so hackers can access the targeted computer without the user noticing •Very difficult to remove Computer Security
  • 8. How Malware Spreads • Clicking on a corrupted email attachment • Clicking on a downloadable file from a website that contains a virus or spyware • Clicking on a link in an email, on a website, or on a social networking site. The link redirects to a website that automatically forces the browser to download a piece of malware Computer Security
  • 9. Beware! •Fake antivirus programs - Famous Examples: Security Suite, Internet Security 2010 •New toolbars or default search engines installed without your permission •Homepage changes •Suspicious file names (i.e., .mp3.exe instead of .mp3) •Pop up windows you cannot stop •Loss of control of your PC •Redirects or new windows to sites you did not open Computer Security
  • 11. Prevention Tips •Keep all your operating system and all software updated Most virus and spyware attacks occur through security holes in popular software applications •For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, malware creators target security holes •Don’t click on any pop ups or ads offering you anything for free •Know the name and display of your antivirus program Computer Security
  • 12. If something seems suspicious: DO NOT OPEN IT! Computer Security
  • 13. Top Free Software Programs •AVAST - Antivirus software that checks downloaded files & monitors websites for possible malware. Do not use more than one antivirus. •Malwarebytes - Manual scan that searches out rootkits and other potential problems and threats. •Spybot Search & Destroy - Spyware scanner to identify and remove spyware. Computer Security
  • 14. Realities of the Digital World •Deleting a post does not mean it disappears •Digital content is easily forwarded and reposted •Social networks & email providers do not make your private information private by default •It is up to you to look for the privacy settings •Your online reputation has offline implications Computer Security
  • 15. Privacy in Social Networking •Know the default privacy settings and how to change them •You can control who sees what content, but it is easily forwarded by the tech savvy •Assume what you post can be seen by everyone Computer Security
  • 16. Identity Theft When someone uses your personal information without your knowledge, usually for monetary gain. Do not store personal financial information on laptops or USB/Flash drives Delete all personal information before disposing of computers, hard drives, or portable drives Review privacy policies Never give out your password or personal information, especially if the company contacted you to request it Computer Security