1 / 25

Internet Security

Internet Security. How to be “Reasonably Safe” on the Internet. The following slides are an explanation of the terminology used in the antivirus and antimalware definitions. Virus. A computer virus is a computer program that can replicate itself and spread from one computer to another.

fern
Télécharger la présentation

Internet Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security How to be “Reasonably Safe” on the Internet

  2. The following slides are an explanation of the terminology used in the antivirus and antimalware definitions

  3. Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another.

  4. Worms • A computer worm is a self-replicating malwarecomputer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.

  5. Trojan • A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.

  6. Keylogger • Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  7. Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication

  8. Adware • Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.

  9. Spam • Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.

  10. Root Kit A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications.

  11. What can you do about all of these • 1. Have a good anti-virus with currently updated virus signatures and scan regularly. • 2. Have several spyware removal programs and scan frequently. • 3. Have a good firewall (either hardware or software preferably both).

  12. Online Virus Scanners • House Call(housecall.trendmicro.com) • Bitdefender(www.bitdefender.com/scanner/online) • Kaspersky (www.kaspersky.com/virusscanner) • Symantec (security.symantec.com) • Eset (eset.com/us/online-scanner) • McAfee (home.mcafee.com/Downloads/FreeScan.aspx) • Also there are others

  13. Antivirus Programs • Avg • Avast • Microsoft Security Essentials • Symantec Antivirus • McAfee Antivirus • Kaspersky Antivirus • And many others

  14. Free versus Paid Programs • All free programs offer fairly good protection • Paid versions offer more protection

  15. Free Antivirus Programs • Protection is very basic • Do not have the in-depth scanning as the paid ones • Do not have as many active scanning modules • Malware protection very basic

  16. Paid Antivirus • More robust antivirus scanning • More active scanning modules • More antimalware scanning prevention • In general are more protective than the free versions

  17. Antimalware Programs • Malwarebytes Antimalware • Super antispyware • Spyware blaster • BoClean • Emsisoft Antimalware • And some others

  18. Antimalware Programs Free vs Paid • Free versions usually have to be updated and scanned manually. • Paid versions have automatic updating, scanning on schedule, and finally have active scanning modules running.

  19. Internet Searching • Programs are available to keep you reasonably safe doing a search on the internet. • Remember that nothing is ever really safe on the Internet.

  20. Internet Site Scanners • Safe Search (Google) • Site Advisor (McAfee) • WOT (MyWot) • Link Scanner (AVG) • And Others

  21. Firewalls • Symantec • McAfee • Zone alarm • Kaspersky • Trend Micro • Windows

  22. Firewall Recommendation • You can use the built-in Windows firewall • You can use free or paid firewalls • You can use only one firewall at a time • You can use a hardware firewall such as a router.

  23. Summing Up • You can have all of the best Internet Security that is available but all of that is useless if the following is in place

  24. PEBKAC

  25. ProblemExistsBetweenKeyboardAndChair

More Related