1 / 10

Computer and Data Security

Computer and Data Security. Threats and ways you can protect your computer. List of Security Risks. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key loggers Viruses. What is a Trojan?.

samara
Télécharger la présentation

Computer and Data Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer and Data Security Threats and ways you can protect your computer

  2. List of Security Risks There are a number of security risks that computer users face, some include; • Trojans • Conficker worms • Key loggers • Viruses

  3. What is a Trojan? A Trojan is a program appears to be legitimate and perform a desirable function for the user. Once the Trojan is installed it facilitates unauthorized access of the users system.

  4. Different Types of Trojans There are 4 different types of Trojans, these include; • Remote Access Trojans (RAT) • Backdoor Trojans (backdoors) • IRC Trojans (IRCBots) • Key logging Trojans

  5. Security Risks Due To Trojans Several security risks arise after the Trojan is installed on the users system. • Use of the users computer as part of a botnet (the attacker can then use the computer to distribute DoS attacks) • Data theft through the use of keystroke logging (e.g. retrieving user names and passwords) • Modification or deletion of the users files • Installation of other viruses such as malware. • Allows the attacker to view the users screen and to view any attached webcam.

  6. How Are The Trojans Distributed? • Fake software downloads or bundling (e.g. when the Trojan horse is included in a software application, such as when you illegally download a computer game) • Email attachments • Application exploits (e.g. flaws in web browsers, media players and instant messaging clients)

  7. What Is A Conficker Worm? • A Conficker worm is one of the most infamous worms, due to the fact that it is the most widespread and the most dangerous. • Since the Conficker Worms release it has over seven million government, business and home computers in over 200 countries now under its control.

  8. Impacts Of The Conficker Worm • The Conficker Worm has had a massive effect on government computers, mostly located in Europe. • The biggest impact was on the United Kingdom Ministry of Defense, when they reported that some of their major networks and desktops were infected as well as several submarines and Royal Navy warships. The ships had to be docked and the computer systems quarantined. • The worm also had a large impact on businesses, one instance is when the worm caused an estimated 2.3 million dollars.

  9. What Does A Conficker Worm Do? There are stages of a Conficker Worm, the earlier stages disable the users features such as; • The user’s auto update • The user’s safe mode • The user’s anti-malware and anti-virus software Once the Conficker Worm has successfully disabled the features above it updates to a later version (Conficker E) . This later version downloads and installs a spam bot and scareware.

  10. How Can You Protect Yourself? All forms of phishing and hacking are based on two concepts, the first of which is to use social engineering techniques to convince you to give up your private details to some foreign source, the second of which involves placing a file into your computer, either way if you are ever contacted by some third party and they wish for you to hand over details or have you download a file, then you should be suspicious. • Enabling automatic updates • Enabling your firewall • Making regular backups • Surfing the web with a secure web browser • Using a trusted anti-virus software • Only downloading and opening files from a trusted and secure source (e.g. emails)

More Related