Willem Wiechers 3 rd March 2015

Similar documents
How To Understand What A Virus Is And How To Protect Yourself From A Virus

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Viruses, Worms, and Trojan Horses

Computer Security Maintenance Information and Self-Check Activities

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Internet basics 2.3 Protecting your computer

Introduction to Computer Security Table of Contents

What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk.

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

F-Secure Anti-Virus for Mac 2015

Know the Risks. Protect Yourself. Protect Your Business.

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

F-Secure Anti-Virus for Mac. User's Guide

ESET SMART SECURITY 6

ESET SMART SECURITY 9

Protect your personal data while engaging in IT related activities

Module 5: Analytical Writing

Evaluating the Perceptions of People towards Online Security

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Computer Viruses: How to Avoid Infection

E Commerce and Internet Security

What are Viruses, Trojans, Worms & Spyware:

How to remove Encrypted File guide. How to manually remove Encrypted File

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Don t Fall Victim to Cybercrime:

BE SAFE ONLINE: Lesson Plan

PC Security and Maintenance

What's the difference between spyware and a virus? What is Scareware?

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Get Started Guide - PC Tools Internet Security

Basic PC Maintenance. Instructors. Action Center

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Malware: Malicious Code

Network Security and the Small Business

Outpost For Home Users

How not to lose your computer or your research. M.R. Muralidharan SERC IISc

ANTIVIRUS BEST PRACTICES

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Think secure. Information security at the University of Copenhagen

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 8

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Desktop and Laptop Security Policy

Chapter 11 Computers and Society, Security, Privacy, and Ethics

The Care and Feeding of Your Computer Troubleshooting and Maintenance

User Documentation Web Traffic Security. University of Stavanger

Contents of this tutorial. Virus Protection under windows

How to easily clean an infected computer (Malware Removal Guide)

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

This guide will go through the common ways that a user can make their computer more secure.

Open an attachment and bring down your network?

Northwestern IT Tech Talk

Norton AntiVirus 9.0 for Macintosh

CougarTrack Troubleshooting - Internet Explorer 8

Internet Security. For Home Users

Online Payments Threats

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

1 Introduction. Agenda Item: Work Item:

C&G FLUX MARKET Internet Safety

Malware & Botnets. Botnets

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

COB 302 Management Information System (Lesson 8)

10 Security Packages for Mac OS X: No less than 5 products achieved a perfect score of 100 percent in detection (AV-TEST April 2015).

Quick Start Guide. www. K7Computing.com

Keeping you and your computer safe in the digital world.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Internet Bank security recommendations of Komercijalna Banka AD Skopje on prevention against identity fraud

Virus Definition and Adware

How To Monitor The Internet In Idaho

Top tips for improved network security

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Boston University Security Awareness. What you need to know to keep information safe and secure

white paper Malware Security and the Bottom Line

Contents. McAfee Internet Security 3

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

26.6% 20.2% 28% 70% 67% Market Share Analysis of Antivirus & Operating Systems. Contents. Report Highlights. Introduction.

DO YOU USE FIREWALLS?

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

MRG Effitas 360 Assessment & Certification Programme Q4 2014

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

Statistical Analysis of Internet Security Threats. Daniel G. James

F-Secure Internet Security 2012

Seamless ICT Infrastructure Security.

Tracking Anti-Malware Protection 2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

PC Security & Housekeeping March 2015

Transcription:

Willem Wiechers 3 rd March 2015 1

Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping, buying of travel tickets etc. Wish to keep our e-mail content & our address books private Etc. 2

All communication with a computer takes place over the internet using a network. So it is the traffic in and out of a computer that we have to safeguard. This takes place automatically in the background without most users being aware of it. So how does it all work? 3

A physical firewall is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building. In computing, a firewall serves a similar purpose. It acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. 4

5

Is the Firewall On? Important at home Especially open to virus attacks when off Crucial when on a public Network Far more likely to be targetted 6

Malware (Malicious Software) Is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware. 7

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". 8

A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. Trojans often present themselves as routine, useful, or interesting in order to persuade victims to install them on their computers. 10

Computers software that is installed surreptitiously and gathers information about an Internet user's browsing habits, intercepts the user's personal data, etc., transmitting this information to a third party: 11

Viruses, Worms & Trojan Horses can be linked together. They cause disruption on a computer by affecting the files in some way. They may alter, delete, or replace certain files on the computer and cause havoc that way. They don t steal your data nor do they use your data. Spyware does look at your data, e.g. your browser history, may steal your address book, try getting hold of your passwords etc. 12

You must have one On new computers with Windows 8.1 it is preinstalled (Windows Defender) Need to install one on earlier systems Microsoft has Microsoft Essentials for free Other free ones: Avira, Avast, AVG, Windows Defender Others : Norton, Kaspersky, McAfee 13

No simple answer All free systems also sell a chargeable version Better virus detection for non-free packages? Not proven according to reviewers So why pay? More bells & whistles. Free automatic backups of computers on the cloud. Also include virus removal tools once computer infected, also may deal with spyware. 14

It checks all incoming data for viruses. Every web page accessed & every e-mail received is checked including attachments USB sticks as soon as they are inserted are checked as are cd s & dvd s On program execution some checks are made 15

No antivirus software is 100% efficient Paid for systems claim they deal more quickly with new viruses So it is essential to keep updating the antivirus software definition files. (Automatic for most of them) Leave computer on permanently, it will do it overnight, otherwise on booting up. It is the uploading of new definition files, and the checking of the system that slows down the computer on booting up 16

Hardware Troubles No Response Slow Performance Slow Start-up Crashing System Missing Files Disks or Disk Drives are not Accessible Extra Files Printer Issues Unusual Error Messages 17

Malwarebytes http://uk.pcmag.com/malwarebytes-antimalware-20/3774/review/malwarebytes-antimalware-20 18

http://www.malwarebytes.org/mwbdownload/confirm/ 19

20

21

22

23

24

25