Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services



Similar documents
PC Security and Maintenance

How to easily clean an infected computer (Malware Removal Guide)

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Get Started Guide - PC Tools Internet Security

How To Understand What A Virus Is And How To Protect Yourself From A Virus

COMPUTER-INTERNET SECURITY. How am I vulnerable?

What's the difference between spyware and a virus? What is Scareware?

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

F-Secure Anti-Virus for Mac 2015

Computer Security Maintenance Information and Self-Check Activities

Guideline for Prevention of Spyware and other Potentially Unwanted Software

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Contents. McAfee Internet Security 3

F-Secure Anti-Virus for Mac. User's Guide

Don t Fall Victim to Cybercrime:

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Open an attachment and bring down your network?

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

NewNet 66 Network Security

Corporate Account Takeover & Information Security Awareness. Customer Training

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Introduction to Computer Security Table of Contents

What are Viruses, Trojans, Worms & Spyware:

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

What you need to know to keep your computer safe on the Internet

BE SAFE ONLINE: Lesson Plan

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Computer infiltration

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Business Internet Banking / Cash Management Fraud Prevention Best Practices

(12) United States Patent

Countermeasures against Spyware

Business ebanking Fraud Prevention Best Practices

System Administrator Guide

How to remove Encrypted File guide. How to manually remove Encrypted File

User Guide for the Identity Shield

Remote Deposit Quick Start Guide

Protecting your business from fraud

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Basic Computer Maintenance

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Airtel PC Secure Trouble Shooting Guide

Payment Fraud and Risk Management

October Is National Cyber Security Awareness Month!

Module 5: Analytical Writing

ANDRA ZAHARIA MARCOM MANAGER

Cyber Security Awareness

Sophos Endpoint Security and Control Help

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

F-Secure Internet Security 2012

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

PREVENTING HIGH-TECH IDENTITY THEFT

Free and Legal Software You Can Download By Tom Krauser

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Types of cyber-attacks. And how to prevent them

Cyber Security Awareness

Spyware: Securing gateway and endpoint against data theft

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ViRobot Desktop 5.5. User s Guide

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

How Spyware and Anti-Spyware Work

Malware & Botnets. Botnets

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Internet tools and techniques at this level will be defined as advanced because:

Common Cyber Threats. Common cyber threats include:

Information Security Awareness

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Spyware Doctor Enterprise Technical Data Sheet

Housekeeping Your PC

Transcription:

Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services

The average computer user should be aware of potential threats to their computer every time they connect to the Internet. There are new security threats everyday. If you do not have good antivirus software installed on your computer you are at a high risk of infecting your computer. If you have an antivirus but do not download the updates you are at high risk of infecting your computer.

What is Malware? Malware short for "Malicious" software is designed to infiltrate or damage a computer system without the owner's informed consent. Malware fundamentally disregards a user's choice regarding how his or her computer will be used. Malicious software can be divided into different categories which includes viruses, worms, Trojans, and spyware. Malware has the ability to hijack your web browser, redirect your search engine, bombard your screen with pop-ups and monitor your activity.

What is Spyware? Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else. Spyware can compromise the safety of your passwords, logon information, financial, or personal information. Other spyware will record your actions and browsing habits on the internet. Any information collected by spyware is usually with the intent to sell. What spyware and malware have in common is the ability to collect and distribute your personal information without your permission.

What is Adware? Adware is another form of malware and is exactly as the name suggests, software with advertising. Adware can be downloaded and sometimes included in free programs. For example Windows Live messenger and Yahoo messenger contain adware. Although some programs give the option not to install the extra adware, others seem to sneak it in without permission.

What is a Virus? A small program designed to infect your computer and cause errors, computer crashes, and even destroy your computer hardware. Unlike spyware, a virus can grow and replicate itself. It can also travel from one computer to another via an internet connection. Of course you can get viruses from discs with virus infested files stored on them, however the internet is the most common entry point. Some common symptoms of a virus are emails being sent to all contacts when you didn't send them, being taken to webpage's that you didn't choose, or being told you have a virus and to download a program to fix it.

Summary Malicious code Can invade your PC and will take up hard drive space and slow down your PC! Will allow unauthorized sites to add themselves to your desktop programs. May allow unwanted toolbars and search bars to attach themselves to your browser without your knowledge or approval. Your browsing activity can be tracked and monitored thus stealing your identity, one piece at a time. Your personal information can be sold to other parties without your knowledge or consent. Your default homepage and settings can be hijacked so you can't change them.

Basic Security Three things you need to protect your computer: Firewall A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. Antivirus Microsoft Security Essentials (MSE) Windows Automatic Updates Make sure that updates are automatically installed on your computer.

Security Checklist Check for latest Service Packs/Updates for Windows, Office, Internet Explorer. Keep antivirus definitions updated. Don't click on suspicious pop-up windows. Don't download or execute applications from untrusted sources. Delete your temporary Internet files, clean Internet history, and delete Cookies. Never open email or an email attachment from an unknown source. Run Malwarebytes at least once a month.