internet security
DESCRIPTION
Internet Security SlideshowTRANSCRIPT
![Page 1: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/1.jpg)
Internet Security
![Page 2: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/2.jpg)
Where do trojan viruses get their name from?
Trojans tend to make users believe they are making a decision with a positive effect, but are misleading
with this information just as the Trojans did with their horse.
![Page 3: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/3.jpg)
![Page 4: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/4.jpg)
What can Trojans do?
• Files that allow others to view others personal data.
• Trojans are also capable of erasing files from hard drives and even temporarily shutting down operations that normally occur with your computer.
![Page 5: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/5.jpg)
Worms
• Worms are destructive programs that replicate itself many times.
• Worms can replicate themselves up to hundreds of times on a single node.
![Page 6: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/6.jpg)
• Worms also modify files, including registry files and files that are key for Windows to run.
• They also eat up your bandwidth which would make your internet speed slower.
![Page 7: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/7.jpg)
Spyware & Adware
• Spyware secretly places itself on your computer and views transactions that are made on websites.
• Adware often appears as an advertisement and inevitably is harmful to the user.
• Spyware and adware both cause a great risk dealing with credit card fraud and identification theft.
![Page 8: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/8.jpg)
Where can you find any of these malicious programs?
• Rogue websites• P2P (person to
person) connections• Email box from
random users
![Page 9: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/9.jpg)
Solutions to these Problems?
• Virus Scanners• Firewalls• Antivirus Programs
![Page 10: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/10.jpg)
Virus Scanners
• Virus scanners locate worms, Trojans, and other malicious programs and delete them.
• Virus scanners tend to locate these files by looking for patterns for certain byte strings.
![Page 11: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/11.jpg)
Firewalls
• Work as a “wall” to your internet ports not allowing anything to come in without the users permission.
• Firewalls filter in everything that is being downloaded onto the computer online.
![Page 12: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/12.jpg)
Antivirus Programs
• The most effective way to keep your personal computer cleansed of viruses
• Introduced in the early nineties and have been improving these programs since then.
![Page 13: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/13.jpg)
Norton & AVGTwo very popular antivirus programs
![Page 14: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/14.jpg)
There are many evils lurking on the internet to corrupt your computer or even worse, steal your identity, credit card numbers, and even your social security number. Browsing the internet is a fun past-time, but needs to be done with caution. This antivirus software as well as being safe and smart with the internet will keep your computer running correctly.
![Page 15: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/15.jpg)
Works Cited / References
• Brown, Marshall. “How Computer Viruses Work.” <http://www.howstuffworks.com/virus.htm
• Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, 2002. <http://www.sciam.com/article.cfm?id=how-does-a-computer-virus&topicID=5>.
• Tyson, Jeff. “How Firewalls Work.” <http://computer.howstuffworks.com/firewall.htm>.
• Vilbert, Robert. “How a Virus Scanner Works. <http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci788685,00.html>.
• “Spyware Information.” 2008 <http://www.spyware-information.com/\.>.
![Page 16: Internet Security](https://reader035.vdocuments.site/reader035/viewer/2022081404/5575c2bcd8b42a312a8b4af8/html5/thumbnails/16.jpg)
Christopher Rodgers
Soundtrack: The Rolling Stones – Gimme Shelter