1 / 28

Dangers of the Internet

Dangers of the Internet. Joseph Leclerc, Pierre-Marie Labry , Adrian Hügli. Agenda. Introduction Different kinds of malware Internet scams Youth, a poorly protected group Invasions of privacy Different internet threats Protection against all dangers. Introduction.

zorana
Télécharger la présentation

Dangers of the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dangers of the Internet Joseph Leclerc, Pierre-Marie Labry, Adrian Hügli

  2. Agenda • Introduction • Different kinds of malware • Internet scams • Youth, a poorly protected group • Invasions of privacy • Different internet threats • Protection against all dangers

  3. Introduction • The internet is a global village with around 2 billion users • Vast range of information • Traditional communication media are redefined • New forms of human interaction • Changes for business and companies • Many people, many crimes • Nearly impossible to regulate it

  4. Malware Malware, short for malicious software, is a software designed to harm or secretly access a computer system without the owner's informed consent. Different types of malware: • Virus • Worm • Trojan • Spyware • Adware • Backdoor

  5. Computer Virus Definition: • A computer virus is a program that can copy itself, and infect files, programs and computers. How it inflicts a damage: • It is placed in commonly used programs, and will run when the infected program boots. • Once a virus is active, it saves itself to your hard drive or copies itself to applications or system files you use. • Damages the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive.

  6. Computer Worm Definition: • A computer worm is a self-replicating malware program, that uses a computer network to send copies of itself to other computers of the network without any user intervention. How it inflicts a damage: • It targets network vulnerability and spread through emails, instant messaging, file sharing networks or the internet. • The security threat of worms is equivalent to that of viruses.

  7. Trojan horse Definition: • A Trojan horse(Trojan), is a malware that appears to perform a desirable function for the user but instead facilitates unauthorized access, steals information or harms the system. How it inflicts a damage: • Trojan horses disguise themselves as valuable and useful software available for download on the internet. • Once the client Trojan executes on your computer, the attacker has a high level of control over your computer.

  8. Spyware Definition: • A computer spyware is a type of malware that can be installed on computers to collect information about users without their knowledge. How it inflicts a damage: • Typically, spyware is secretly installed on the user's personal computer. • Spyware programs can collect various types of personal information. • They can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity or even change computer settings.

  9. Adware Definition: • Adware, or advertising-supported software, is any software which automatically plays, displays, or downloads advertisements to a computer. How it inflicts a damage: • These advertisements are usually in the form of a pop-up. • Adware, by itself, is harmless. • Can occur with integrated spyware. • Interruptions or annoyances, or distractions from the task at hand.

  10. Backdoor Definition: • A backdoor in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. How it inflicts a damage: • It enables an alternative access to an application or the whole computer system. • It gives access to your e-banking account or private mail.

  11. Scams on the net • On the web, there are more and more websites trying to rip you off or steal your money. • Constantly, new swindles appear and the only way to protect internet users are the warning campaigns against this phenomenon . • Example of swindles circulating right now on the web: • credit card fraud • fake website

  12. Youth: a publicpoorlyprotected • Young peoplearethemostexposedandmosttargetedbypredatorsof all kinds on the web. • In 2003 morethan 87% of 12/17 yearoldshavebeenconnectedto Internet andthephenomenonisgrowingwiththedevelopmentof mobile Internet. • The web: A ludic but riskyspace in whichtheyenterwith a simple click! • The dangerstheyarefacing.

  13. Invasion ofPrivacy This canbedone in different waysWhenthey: • fillout formstoparticipate in contestsforcommercialwebsites. • provideinformationsaboutthemselvestostrangers in chator instant messaging. • givepersonal information, whenregisteringtovarious Internet servicesorsoftware (instant messaging, chat, filesharing, etc.). • completea personal profile, whenregisteringfor email accountsandfree instant messaging.

  14. Pornography The easy access provides by internet to the pornography isamongthemainanxietiesofparentsofyoung Internet users. Itispossibletostumbleacross a pornographicwebsite, by: • usinga searchengine. • makinga mistake in typingtheaddressof a website. • clickingon a link in an email, instant messagingorchat. • usingfilesharingsoftwarethat carry a lotofpornographicimagesandvideoseasilyaccessible.

  15. Internet predators Chats, emailsand instant messagingareenvironmentswhereyoungpeoplemayencounterpredators. Anonymityspecificto Internet meanstrustandintimaterevelations. Predatorsareusingittoquicklyestablish a relationshipoftrustwithyoungpeoplewhoare still lackingofexperienceandJudgment.

  16. Violentandhatefulcontent On Internet youcan find a worldofviolencethattargettheyouthoncemore. With a simple click, youngpeoplecandownload: • Pictures oftortureandsadism. • Music withveryviolentwords (sometimescensored in thediscssold in stores). • Young people also likethe "bloody" sites, thatshow real picturesofaccidents, tortureormutilation. • Moreover, hategroupslikethosecampaigningforthesupremacyofthewhiterace, areincreasinglyusingthe Internet torecruityoungpeople. Theyuse e-mail, and private chatstoaddressthemost vulnerable adolescents.

  17. Disinformation The Web is full of dubious and worthless information. Insofar where anyone can post their personal views or theories.The disinformation is commonplace in many aspects: • Web pages, usually personal, where anyone can publish whatever they want by pretending it's true, and present simple opinions as facts. • Sites Parody or spoof, which induce deliberately mislead the visitor, whether for fun or for political reasons. • Hoaxes circulated by mail, which broadcast false virus warnings, bogus methods to supposedly make a fortune, urban legends and unsubstantiated health alerts. • And a phenomenon increasingly popular for spreading false rumors through the social network (such as the death of a celebrity).

  18. Another danger conveyed by internet There are several profiles of Internet users, youth and even adults, who feel very addicted to the Internet and this according to their main activity on the web: • games (poker, contests, etc..) • network game (Wow, Counter-Strike, etc..) • chat • forum • instant messaging • blog type Skyblog, social network type of MySpace, Facebook • the type of video sharing YouTube and Dailymotion

  19. The risk of using Internet for your health: • A lack of sleep, tiring • Headaches • Irritability • A tiring eyes • A loss or weight gain depend of individuals • Up to a loss of sense of reality (concerning the social aspect or financial) • Strongly affect social relationships

  20. Protection against: • Virus: • Using a good Antivirus updated • Executeonlyfamiliarprograms • Don'topen suspicious email • Worms: • Using a good Antivirus updated • Usinga good Firewall • InstallingUpdate and Patch for your OS and your programs

  21. Protection against: • Trojan: • Using a good Antivirus updated • Usinga good Firewall • Don'topen suspicious email • Spyware • Installing an Anti-spyware software

  22. Protection against: • Adware • Using a good Antivirus updated • Block Spy Software in your browser • Backdoor • Downloadsoftware/applications on the websiteof the programmer or distibutor • Check on a listlike«BugTraq» to know if the software has backdoors

  23. How to protect against scams? • For a transfer check if the website is secured (HTTPS) • Open a Paypal account if it's usual for you to buy on the Internet • Don't answer mail from unknown person • Don't click on the links of suspicious mail • Activate the filter anti-spam and anti-phishing of your browser

  24. How to protect young public In general: • Teach to your kids how to use the Internet • Follow them in the apprenticeship of the Internet • Tell them the dangers of the Internet

  25. How to protect young public Against Pornography, hateful content and Internet predators: • Installing parental controls • Check what are they doing • Never let them alone on the Internet

  26. Protection against disinformation: • Ask • Verify • Keep position

  27. How to protect against: • Gambling: • Self control • Consult specialists if you're feeling addicted • Video Gams: • Limit the hours of video game per day • Have a social life besides the video games

  28. Thank you for your attention!Any questions?

More Related