1 / 19

Network Security

Network Security. By: Daniel Jordan. What is a Virus?. A virus is a program that is designed to infect a host computer and spread to any computer it is executed on. Types of Viruses.

avery
Télécharger la présentation

Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security By: Daniel Jordan

  2. What is a Virus? • A virus is a program that is designed to infect a host computer and spread to any computer it is executed on.

  3. Types of Viruses • Macro Virus- These types of viruses load themselves into the templates used in common Microsoft office products. These include: Word, Excel, and PowerPoint. They are loaded onto the computer anytime the saved document or file is opened. • Program Virus- These viruses attach themselves to executable files and load themselves onto the computer when the setups are launched. • Boot Virus- These viruses load into the boot sector of the hard disk drive when the system is being booted from a boot disk.

  4. How do they begin infecting? • A virus is loaded onto a computer through opening downloaded and transferred files. • Anytime a file containing a virus is opened on a computer, the virus begin to infect the computer it was loaded on.

  5. Virus Myths • The majority of computer users believe that a virus can infect a computer by opening an email. This is not true. It can only begin infecting a computer when a file attached to the email is opened. • It is also believed that a user can put the computer at risk by viewing a website. This is also not true. A file must be run or opened in order for the virus to begin its infecting. • Computer users also often believe that by downloading a file a virus has infected their computer. This is also not true. A file must be opened or run before the virus can begin infecting.

  6. Windows Anti-Virus Solutions • Norton AntiVirus • McAfee • Kaspersky • Panda • Security Shield • CA • BitDefender • Trend Micro • Webroot • BullGuard

  7. Mac Anti-Virus Solutions • Avast! • ClanXav • MacScan • Norton AntiVirus • Sophos • Intego VirusBarrier • VirusScan • McAfee

  8. Linux Anti-Virus Solutions • AVG • Avira Antivir • BitDefender • Clam AV • FProt • Command AntiVirus • Kasperky

  9. What is Spyware, Adware, and Malware? • Spyware is a piece of software that is used to change the way a computer is setup, to track web surfing habits for advertising purposes, and is also used to collect personal information. • Adware is a piece of software designed to hoard your computer with advertisements. Can often slow web surfing down to a crawl. It can also use RAM space and CPU cycles. • Malware is almost synonymous with spyware and adware. However, it tends to have a more malicious intent to it.

  10. How Are They Contracted? • Adware is often loaded through shareware. Shareware software developers are often paid to include adware. It is also often contracted through advertisements. • Spyware is loaded through opening downloaded applications, through browser plug-in installations, and through clicking on advertisements. • Malware is contracted through the same methods as spyware and adware.

  11. Spyware, Adware, and Malware solutions • Spy Sweeper • Spy Bot- Search and Destroy • Ad-Aware • Windows Defender • CounterSpy • Trend Micro Anti-Spyware • AntiSpy • Spyware Doctor • Pest Patrol • Spyware Be Gone • McAfee Anti-Spyware • Maxion Spy Killer

  12. Phishing • A new form of security threat. • Most commonly defined as any online deception used to acquire credit card numbers, usernames, passwords, and even account information.

  13. How to protect against phishing • The best way to start protecting yourself is to use the keyboard to type in URL’s instead of clicking on links. • Try to use websites that have a logo of a lock on the bottom of your browser window. It is not placed on the website. • The last way to protect yourself is to use security software that blocks against phishing.

  14. Other Risks • Computer users also have to protect themselves from hackers. • To achieve this protection, computer use a piece of software or hardware called a firewall.

  15. Firewalls were created to prevent the intrusion of another person on a personal computer. They were also created to stop computer hackers from taking control of a person’s computer.

  16. Firewalls • Firewalls can be found in software such as Internet Security software. • Firewalls can also be found in many routers from companies such as: D-link, Linksys, and Netgear.

  17. Common Firewall Software • Windows: ZoneAlarm, McAfee, Norton, Webroot, AVG, and Kaspersky • Mac: Apple, Intego, Flying Buttress, Doorstop X, and Firewalk X • Linux: Fwbuilder, Firestarter, Guarddog, Guidedog, and Knetfilter

  18. Works Cited • In order of appearance… • http://www.extension.iastate.edu/Publications/PM1789J.pdf • http://www.learnthenet.com/english/gifs/virus.gif • http://askbobrankin.com/computer-virus.jpg • http://static.howstuffworks.com/gif/virus-ch.jpg • http://www.microsoft.com/protect/computer/basics/virus.mspx • http://6starreview.com/Internet-Security.aspx?Refer=Gols+keyboard=Internet%20Security&gclid=CBPKZPF175ECFQ80SwodrEYdwQ • http://img.planetonline.com/Original/norton_av2007.jpg • http://www.devnetsoftware.com/wp-content/uploads/2007/05/mcafee-virusscan-plus-2007.jpg • http://yasir03.online.fr/imgs/KasperskyAnti-Virus.jpg • http://www.pure-mac.com/virus/html • http://i122.photobucket.com/albums/o272/softarchive/img13/26909_s__avast_pro_v_1.jpg • http://store.solutions-inc.co.uk/image/intego_vb_nig.jpg • http://www.freebyte.com/anivirus/ • http://resnet.uidaho.edu/Images/AVG_Antivirus_System_logo.jpg • http://www.m2tek.com/images/bitdefender10antivir.jpg • http://www.4pcfix.co.nz/Images/spyware.jpg

  19. Works Cited Con’t… • http://www.tech-faq.com/adware.shtml • Http://www.adwarereport.com/mt/archives/000032.html • http://www.microsoft.com/protect/computer/basics/spyware.mspx • http://computer.howstuffworks.com/spyware1.htm • http://www.softwaretipsandtricks.com/windowsxp/articles/590/1/Different-types-of-spyware • http://www.riblio.com/riblio/box_front_spysweeper%5B1%5D.jpeg2.jpg • http://www.fxhstore.com/images/AdAware3DproBox.gif • http://magaria.com/blo/image/counterspy-lores.jpg • http://www.microsoft.com/protect/yourself/phishing/identify.mspx • http://www.networksecurityjournal.com/features/44-ways-protect-phishing/ • http://static.howstuffworks.com/gif/phishing-1.jpg • http://www.dmccormick.org/pictures/firewall.jpg • http://www.codinghorror.com/blog/images/dlink-dgl4500.jpg • http://www.codinghorror.com/blog/images/dlink-dgl4500.jpg • http://www.serif.com/serifextra/products/pcsystemtools/DesktopFirewall/DesktopFirewall.jpg • http://cdn.overstock.com/images/products/3/L10320704.jpg

More Related