kef 7 plhroforikh a lykeioy

Upload: efty-c

Post on 31-Oct-2015

31 views

Category:

Documents


0 download

DESCRIPTION

ΚΕΦΑΛΑΙΟ 7 - ΠΡΟΣΤΑΣΙΑ - ΠΛΗΡΟΦΟΡΙΚΗ Α ΛΥΚΕΙΟΥ - ΔΙΑΦΑΝΕΙΕΣ

TRANSCRIPT

  • DATA SECURITY & COMPUTER VIRUSES

    CHAPTER 7

    Evagelos C. Zioulas (Information Technology Teacher)

  • KEY WORDS

    11/2/2013 2 E. C. Zioulas (IT Teacher)

    COMPUTER VIRUS

    ANTIVIRUS

    INTERNET SECURITY

    BACK-UP FILES

    HACKER

    UPDATE

    FIREWALL

  • 11/2/2013 3 E. C. Zioulas (IT Teacher)

    CAUSES OF DESTRUCTION

    DAMAGED STORAGE MEDIA

    COMPUTER VIRUSES

  • 11/2/2013 4 E. C. Zioulas (IT Teacher)

    MISHANDLING OF THE USER

    INTRUSION OF UNWANTED USERS

    CAUSES OF DESTRUCTION

  • 11/2/2013 5 E. C. Zioulas (IT Teacher)

    WHAT IS A VIRUS? A PROGRAM HIDDEN IN ANOTHER PROGRAM

  • 11/2/2013 6 E. C. Zioulas (IT Teacher)

    COMPUTER VIRUSES

    They are malicious programs created by particular programmers, which cause many problems to computer

    The virus is a piece of software (a program) that acts as a hidden attachment of another program which when is activated, the virus acts silently and harms computer functions.

    The first virus appeared in 1986, though up to our days there have been created

    almost 150.000

  • 11/2/2013 7 E. C. Zioulas (IT Teacher)

    Monthly Malware Statistics

    June 2011

  • 11/2/2013 8 E. C. Zioulas (IT Teacher)

  • 11/2/2013 9 E. C. Zioulas (IT Teacher)

    WAYS OF TRANSMISSION

    EXTERNAL STORAGE DEVICES

    NETWORKS-INTERNET

  • 11/2/2013 10 E. C. Zioulas (IT Teacher)

    COMPUTER WORM

    It is a self-replicating program (multiplied by itself)

    It sends through the net many copies of it to other computers

    It doesnt need to attach itself to an existing program

    It cause serious delays to computer networks

  • 11/2/2013 11 armlessE. C. Zioulas (IT Teacher)

    TROJAN HORSE

    It is a malicious program

    Externally it seems to be harmless

    On the background, it installs harmful code to computer

    It allows external users to have access to the infected computer causing damages

  • 11/2/2013 12 E. C. Zioulas (IT Teacher)

    MALWARE (MALICIOUS SOFTWARE)

  • 11/2/2013 13 E. C. Zioulas (IT Teacher)

    SCANNING COMPUTER FOR

    MALWARE

  • 11/2/2013 14 E. C. Zioulas (IT Teacher)

    SPYWARE ADWARE

    Programs that full the screen with annoying advertisements

    Programs that act silently and collect private information of the

    user e.g. passwords

  • 11/2/2013 15 E. C. Zioulas (IT Teacher)

    PROTECTION MEASURES AGAINST VIRUSES

    Be careful of the applications you execute especially when they are not authentic (that means they dont come straight from their manufacturer or they are not bought from a commercial store).

    Install Antivirus and Internet Security applications that can fully protect you against the most common and offensive malware (e.g. Norton, Panda, McAfee, Kaspersky, Zone Alarm, AVG etc)

    Update frequently the antivirus software through the internet, so the computer to be updated against all the new viruses.

    Activate computers Firewall every time you connect to the Internet, so that you deter all the unwanted users to invade in your computer. This can be done as follows:

    Start Settings Control Panel Windows Firewall

  • 11/2/2013 16 E. C. Zioulas (IT Teacher)

    ANTIVIRUS & INTERNET SECURITY

  • This software has the objective to protect user against attacks over the Internet (malware or hackers).

    This software is used to prevent, detect, and remove malware from computer (including viruses, worms, Trojan horses, spyware and adware).

    11/2/2013 17 E. C. Zioulas (IT Teacher)

    INTERNET SECURITY ANTIVIRUS

  • 11/2/2013 18 E. C. Zioulas (IT Teacher)

  • 11/2/2013 E. C. Zioulas (IT Teacher)

    BACK-UP FILES

    Copying users data in an alternative storage device (e.g. cd-rom, dvd, external disk) protects user from any possible loss.

    Start Programs Accessories System tools Back-Up

  • FIREWALL

    A firewall is a device designed to permit or deny network transmissions based upon a set of rules.

    It is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

    Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet.

    Many routers that pass data between networks contain firewall components.

    11/2/2013 20 E. C. Zioulas (IT Teacher)

  • 11/2/2013 21 E. C. Zioulas (IT Teacher)

    WINDOWS FIREWALL

    Start Settings Control Panel Windows Firewall

  • UNAUTHORIZED INTRUDERS

    HACKERS

    A hacker is a person who finds out weaknesses in the computer and exploits it.

    Hackers may be motivated by a large number of reasons, such as profit, protest, or challenge.

    CRACKERS

    A cracker is a person who breaks into a computer system without authorization, whose purpose is to cause damage (destroy files, steal credit card numbers, plant viruses)

    11/2/2013 22 E. C. Zioulas (IT Teacher)

  • 11/2/2013 23 E. C. Zioulas (IT Teacher)

    Class Activity 1

    Chapter 7 Activity 6 (p.50)

    Explore the web and find information on modes of

    transmission of viruses.

    Classify the types of viruses according to the risk

    that you think they have.

  • 11/2/2013 24 E. C. Zioulas (IT Teacher)

    Class Activity 2

    Chapter 7 Activity 7, 8 (p.50)

    Execute the application metro.exe and write down

    your impressions.

    With your teachers help, run an antivirus program

    to scan and cure this specific malware.

    Alternatively, you can visit specific antivirus pages

    on the Web, in order to perform virus scanning for

    free.

  • 11/2/2013 25 . ( ) 11/2/2013 25

  • 11/2/2013 26 E. C. Zioulas (IT Teacher)

    DICTIONARY

    Give the explanation of the following terms:

    Computer virus

    Computer worm

    Trojan horse

    Back-up files

    Firewall

    Adware

    Spyware

    Antivirus

    Internet Security

  • 11/2/2013 27 E. C. Zioulas (IT Teacher)

    EXERCISE 1

    Chapter 7 Activity 9 (p. 50)

    Make a list of useful safety rules that a student

    should follow in the computer lab, in order to

    protect the lab from inappropriate actions (e.g. No

    eating or drinking in the laboratory) and keep it in

    optimum condition.

  • 11/2/2013 28 E. C. Zioulas (IT Teacher)

    EXERCISE 2

    Fill the following concept map: