Senior Net 4 July Rein van de Vusse

Similar documents
FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

What's the difference between spyware and a virus? What is Scareware?

Computer Security Maintenance Information and Self-Check Activities

Computer Viruses: How to Avoid Infection

Why you need. McAfee. Multi Acess PARTNER SERVICES

BE SAFE ONLINE: Lesson Plan

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Desktop and Laptop Security Policy

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Internet basics 2.3 Protecting your computer

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

How To Understand What A Virus Is And How To Protect Yourself From A Virus

F-Secure Anti-Virus for Mac 2015

Viruses, Worms, and Trojan Horses

ESET SMART SECURITY 6

Online Cash Manager Security Guide

F-Secure Anti-Virus for Mac. User's Guide

What are Viruses, Trojans, Worms & Spyware:

ESET SMART SECURITY 9

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

ESET NOD32 ANTIVIRUS 8

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

ESET NOD32 ANTIVIRUS 9

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Bellsouth Internet Security)

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

How to easily clean an infected computer (Malware Removal Guide)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software)

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Boston University Security Awareness. What you need to know to keep information safe and secure

White Paper - Crypto Virus. A guide to protecting your IT

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

E-BUSINESS THREATS AND SOLUTIONS

Network Security and the Small Business

Building a Business Case:

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

McAfee Internet Security Suite Quick-Start Guide

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

What you need to know to keep your computer safe on the Internet

How to fight CryptoLocker and evade its Ransomware demands

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Module 5: Analytical Writing

WHITE PAPER. Understanding How File Size Affects Malware Detection

Top tips for improved network security

General Security Best Practices

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Introduction (Contd )

Antivirus. Quick Start Guide. Antivirus

Preparing Your Personal Computer to Connect to the VPN

E Commerce and Internet Security

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Open an attachment and bring down your network?

Internet threats: steps to security for your small business

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Common Cyber Threats. Common cyber threats include:

Cyber Security. Maintaining Your Identity on the Net

Contents. McAfee Internet Security 3

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

What Do You Mean My Cloud Data Isn t Secure?

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

F-Secure Mobile Security for Nokia E51, E71 and E75. 1 Installing and Activating F-Secure Client 5.1

Protecting your Identity, Computer and Property

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

ANDRA ZAHARIA MARCOM MANAGER

This guide will go through the common ways that a user can make their computer more secure.

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Presented by: Islanders Bank

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

Don t Fall Victim to Cybercrime:

Transcription:

Senior Net 4 July 2014 Rein van de Vusse

How does Internet Security work?

So if transactions on the internet are safe What to watch out for? Email Scams Infected Websites Telephone Scams

From: Inland Revenue [taxrefund @ ird.govt.nz] Subject: You are eligible to receive a tax refund of 649.85 NZD Dear New Zealand citizen. After the last annual calculations of your fiscal activity, we have determined that you are eligible to receive a tax refund of 649.85 NZD Click here to submit your tax refund. Please submit the tax refund request and allow us 3-5 days in order to process it. Please Note: A refund can be delayed for a variety of reasons, for example submitting invalid records or applying after deadline. Inland Revenue - Te Tari Taake

Some threats that can damage our computer systems Virus (Malicious program that replicates itself by attaching itself to a file) Worm (Malicious program that replicates itself and does not need to attaching itself to a file) Trojan horse (Malicious program inside harmless file) Spyware (Program that aids in gathering information about a person or organization without their knowledge) Malicious: having or showing a desire to cause harm

Multiple protections Anti-virus: Specifically protects against viruses and worms Anti-spyware: Protects against malicious software that may be gathering your information without your knowledge Firewall: Screens out threats that try to reach your computer over the Internet

Security suites Security suites are generally easier to manage and offer a wide range of protection, which can be useful if you are a beginner. Some security suites have a tendency to slow down a computer.

Things to consider before you buy Investigate your computer: Windows Vista & 7 offer free download of MS Security Windows Vista, 7 & 8 already have built-in firewalls Windows 8 has built-in security (Windows Defender) Most new computers come with 3 rd party security software, but you have to subscribe after a trial period Free vs. paid Anti-virus software Free software often doesn t include support Paid software is based on a yearly subscription

Scareware Malicious links disguised as security warnings have become a popular tactic with cybercriminals These official-looking notices warn you that your computer has a virus and claim that you need to click a link or download a program to fix it They are trying to scare you into clicking the link, but in reality the link leads to malware (malicious software)

Paid Security Software

Free Security Software

Additional computer safety practices to consider Install software updates When your computer informs you of a software update, download and install it. Software updates are designed to fix security vulnerabilities and other bugs in your operating system. This will help protect your computer against some of the latest threats

Additional computer safety practices to consider Use system restore If you have a download that is causing problems, try your operating system's system restore function. This feature allows you to restore your computer to a time and place before it started having issues

Ransomware Ransomware is a program that restricts access to the computer that it infects and demands a ransom paid to the creator of the malware to remove the restriction Some forms of ransomware encrypt files on the system's hard drive (cryptoviral extortion) Some ransomware may simply lock the system and display messages intended to coax the user into paying In June 2013 security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013

CryptoLocker CryptoLocker is a ransomware The attack comes from various sources disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on your PC and network- or USB drives The private key is stored on the malware's control servers A message offers to decrypt the data if a payment is made by a stated deadline It threatens to delete the private key if the deadline passes