Stay Safe Online: Internet Security Tips and Tools
Learn about viruses, worms, Trojans, keyloggers, phishing, adware, spam, and rootkits, and how to protect yourself with antivirus programs, antimalware tools, and firewalls.
Stay Safe Online: Internet Security Tips and Tools
E N D
Presentation Transcript
Internet Security How to be “Reasonably Safe” on the Internet
The following slides are an explanation of the terminology used in the antivirus and antimalware definitions
Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another.
Worms • A computer worm is a self-replicating malwarecomputer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
Trojan • A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.
Keylogger • Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
Adware • Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.
Spam • Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
Root Kit A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications.
What can you do about all of these • 1. Have a good anti-virus with currently updated virus signatures and scan regularly. • 2. Have several spyware removal programs and scan frequently. • 3. Have a good firewall (either hardware or software preferably both).
Online Virus Scanners • House Call(housecall.trendmicro.com) • Bitdefender(www.bitdefender.com/scanner/online) • Kaspersky (www.kaspersky.com/virusscanner) • Symantec (security.symantec.com) • Eset (eset.com/us/online-scanner) • McAfee (home.mcafee.com/Downloads/FreeScan.aspx) • Also there are others
Antivirus Programs • Avg • Avast • Microsoft Security Essentials • Symantec Antivirus • McAfee Antivirus • Kaspersky Antivirus • And many others
Free versus Paid Programs • All free programs offer fairly good protection • Paid versions offer more protection
Free Antivirus Programs • Protection is very basic • Do not have the in-depth scanning as the paid ones • Do not have as many active scanning modules • Malware protection very basic
Paid Antivirus • More robust antivirus scanning • More active scanning modules • More antimalware scanning prevention • In general are more protective than the free versions
Antimalware Programs • Malwarebytes Antimalware • Super antispyware • Spyware blaster • BoClean • Emsisoft Antimalware • And some others
Antimalware Programs Free vs Paid • Free versions usually have to be updated and scanned manually. • Paid versions have automatic updating, scanning on schedule, and finally have active scanning modules running.
Internet Searching • Programs are available to keep you reasonably safe doing a search on the internet. • Remember that nothing is ever really safe on the Internet.
Internet Site Scanners • Safe Search (Google) • Site Advisor (McAfee) • WOT (MyWot) • Link Scanner (AVG) • And Others
Firewalls • Symantec • McAfee • Zone alarm • Kaspersky • Trend Micro • Windows
Firewall Recommendation • You can use the built-in Windows firewall • You can use free or paid firewalls • You can use only one firewall at a time • You can use a hardware firewall such as a router.
Summing Up • You can have all of the best Internet Security that is available but all of that is useless if the following is in place