SlideShare une entreprise Scribd logo
1  sur  27
UNIVERSITY OF RAPARIN
FACULTY OF PRIMARY EDUCATION
COMPUTER SCIENCE DEPARTMENT
Computer & Internet
Security
HOSHMAND KAREEM SALIH
• What is the origin of the name “malware” ?
• Malicious software
Malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is the definition of malware ?
• Software that is intended to damage or disable
computers and computer systems
• Any kind of unwanted software that is installed
without your adequate consent viruses, worms
and Trojan horses are examples of malicious
software that are often grouped of malicious
software that are often grouped together and
referred to as malware.
There are many types of malware such as
• Worms
• Virus
• Spyware
• Trojan horse
• Scare ware
• Ransom ware
Types of malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Make copies of themselves again and again on
• Local drive
• Network shares
• USB drives
• Purpose
• Reproduce
• Worms does not need to attach itself to
an exiting program
Types of malware (worms)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• When executed – usually by a human, replicates by inserting copies
of itself (possibly modified) into other computer programs, data files,
or the boot sector of the hard drive; when this replication succeeds,
the affected areas are then said to be "infected.“
• Purpose
• Harm computers
Types of malware (virus)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• What is it?
• It is any software which takes information from your computer
without your knowledge or consent.
• Types of Spyware (just three of them)
• Trojans
• Web Bugs
• Advertiser software
Types of malware (Spyware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Activity
• Appears to perform a desirable function but
instead drops a malicious payload, often
including a backdoor allowing unauthorized
access
• Purpose
• Gains privileged access to the operating system
• Trojans Does not need to attach itself to an
existing program.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• It gets the idea and the name from the story of the Trojan
horse in troy.
Types of malware (Spyware) Trojan horse
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Appears to be beneficial from a
security perspective but provides
limited or no security, generates
erroneous or misleading alerts, or
attempts to lure users into
participating in fraudulent
transactions.
Types of malware (Scare ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Restricts access to the computer
system that it infects
• Encrypt files lock system
• Displays messages intended to coax the
user into paying
• Demands a ransom in order for the
restriction to be removed
Types of malware (ransom ware)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• The reasons
• Economical
• Personal
• Political
• Others
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Economical
• Stealing sensitive information which is then sold on the black market.
• Take down networks
• Personal
• Revenge , Vandalism , Experimental / research , Hobby and art
• Political
• Gaining information about different political parts
• Spying on political parts or persons
• Political messages
Why do malware writers write malware?
Computer & Internet Security
HOSHMAND KAREEM SALIH
• A system or group of systems
that enforces an access
control policy between two
networks.
Firewall Visible
IP
Address
Internal
Network
PC Servers
Host
• Hackers
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
Hackers and Crackers
Computer & Internet Security
• Crackers
• A person who accesses a
computer or network illegally but
has the intent of destroying data,
stealing information, or other
malicious action.
HOSHMAND KAREEM SALIH
Some systems for hacking
Computer & Internet Security
HOSHMAND KAREEM SALIH
A system for cracking (OllyICE)
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use an Antimalware app
• Installing an antimalware app and keeping it up to date
can help defend your PC against viruses and other
malware (malicious software). Antimalware apps scan for
viruses, spyware, and other malware trying to get into your
email, operating system, or files. New threats can appear
daily, so check the antimalware manufacturer's website
frequently for updates
• Some Antimalware apps
• Microsoft Security Essential , Norton , Avast, Avira ,
Kaspersky, AVG
• All the companies that we mentioned has either antivirus
and internet security
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Don't open email messages from unfamiliar senders, or
email attachments that you don't recognize
• Many viruses are attached to email messages and will spread as
soon as you open the attachment. It's best not to open any
attachment unless it's something you're expecting
• Microsoft Outlook and Windows Mail help block potentially
dangerous attachments
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a pop-up blocker with your Internet browser
• Pop-up windows are small browser windows that appear on top of
the website you're viewing. Although most are created by
advertisers, they can also contain malicious or unsafe code. A pop-
up blocker can prevent some or all of these windows from
appearing
• The Pop-up Blocker feature in Internet Explorer and the other
advanced browsers
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Keep Windows Updated
• Periodically, Microsoft releases special security updates that can
help protect your PC. These updates can help prevent viruses and
other malware attacks by closing possible security holes
• Turn on Windows Update to make sure that Windows receives these
updates automatically
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use a firewall
• Windows Firewall or any other firewall app can help notify you about
suspicious activity if a virus or worm attempts to connect to your PC.
It can also block viruses, worms, and hackers from attempting to
download potentially harmful apps to your PC
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Turn on User Account Control (UAC)
• When changes are going to be made to your PC that
require administrator-level permission, UAC notifies you and
gives you the chance to approve the change. UAC can
help keep viruses from making unwanted changes
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Clear your Internet cache and your browsing history
• Most browsers store info about the websites you visit, and they might
also store info that websites might ask you to provide (such as your
name and address). While it can be helpful to have these details
stored on your PC, there are times when you might want to delete
some or all of them—for example, when you're using a public PC
and don't want to leave personal info behind
• For deleting all the history , privacy and stored information in an
easy way use CCleaner app
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Use another type of operating system
• Because Windows is the most operating system used in the world ,
the most malwares are made for windows , so using another type of
OS like Linux or Mac OS x is better , because malwares for these
Operating systems are not too much
• Some types of Linux
• Ubuntu
• Open SUZI
• Backtrack
• Kali
• Red hat
How to protect your pc from malware
Computer & Internet Security
HOSHMAND KAREEM SALIH
•Offensive Security Training and Services
• World Class Information Security Training and Penetration Testing
Online Training courses
HOSHMAND KAREEM SALIH
• We previously talked about these
• What is malware
• Types of malware
• Reasons for writing malware
• firewall
• Hackers and crackers
• How to protect our pc from malwares
• offensive-security.com
Wrap up!
Computer & Internet Security
HOSHMAND KAREEM SALIH
• Book
• Security Fundamentals – an official course - Microsoft
• Windows help center
• “How to protect my pc from viruses ?”
• Internet
• https://www.slideshare.net
• Some slides about malwares , hackers , viruses and spywares
• Some pictures of malwares (searched in google.com)
• YouTube
• A part of video in “Troy” movie
References
Computer & Internet Security
HOSHMAND KAREEM SALIH

Contenu connexe

Tendances

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksRaghu Addanki
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat RansomwareIvanti
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 

Tendances (20)

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Network Security
Network SecurityNetwork Security
Network Security
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 

En vedette

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programminghoshmand kareem
 
Internet security
Internet securityInternet security
Internet securitygohel
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 

En vedette (10)

An introduction to java programming
An introduction to java programmingAn introduction to java programming
An introduction to java programming
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 

Similaire à Computer and internet security

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Systweak Software
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 

Similaire à Computer and internet security (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security
Computer securityComputer security
Computer security
 
Malicious
MaliciousMalicious
Malicious
 
Cyber security
Cyber securityCyber security
Cyber security
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malwares
MalwaresMalwares
Malwares
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Security
SecuritySecurity
Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 

Dernier

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Computer and internet security

  • 1. UNIVERSITY OF RAPARIN FACULTY OF PRIMARY EDUCATION COMPUTER SCIENCE DEPARTMENT Computer & Internet Security HOSHMAND KAREEM SALIH
  • 2. • What is the origin of the name “malware” ? • Malicious software Malware Computer & Internet Security HOSHMAND KAREEM SALIH • What is the definition of malware ? • Software that is intended to damage or disable computers and computer systems • Any kind of unwanted software that is installed without your adequate consent viruses, worms and Trojan horses are examples of malicious software that are often grouped of malicious software that are often grouped together and referred to as malware.
  • 3. There are many types of malware such as • Worms • Virus • Spyware • Trojan horse • Scare ware • Ransom ware Types of malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 4. • Activity • Make copies of themselves again and again on • Local drive • Network shares • USB drives • Purpose • Reproduce • Worms does not need to attach itself to an exiting program Types of malware (worms) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 5. • Activity • When executed – usually by a human, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected.“ • Purpose • Harm computers Types of malware (virus) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 6. • What is it? • It is any software which takes information from your computer without your knowledge or consent. • Types of Spyware (just three of them) • Trojans • Web Bugs • Advertiser software Types of malware (Spyware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 7. • Activity • Appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access • Purpose • Gains privileged access to the operating system • Trojans Does not need to attach itself to an existing program. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 8. • It gets the idea and the name from the story of the Trojan horse in troy. Types of malware (Spyware) Trojan horse Computer & Internet Security HOSHMAND KAREEM SALIH
  • 9. • Appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. Types of malware (Scare ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 10. • Restricts access to the computer system that it infects • Encrypt files lock system • Displays messages intended to coax the user into paying • Demands a ransom in order for the restriction to be removed Types of malware (ransom ware) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 11. • The reasons • Economical • Personal • Political • Others Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 12. • Economical • Stealing sensitive information which is then sold on the black market. • Take down networks • Personal • Revenge , Vandalism , Experimental / research , Hobby and art • Political • Gaining information about different political parts • Spying on political parts or persons • Political messages Why do malware writers write malware? Computer & Internet Security HOSHMAND KAREEM SALIH
  • 13. • A system or group of systems that enforces an access control policy between two networks. Firewall Visible IP Address Internal Network PC Servers Host
  • 14. • Hackers • A person who accesses a computer or network illegally. • Various types • Black • Grey • White Hackers and Crackers Computer & Internet Security • Crackers • A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. HOSHMAND KAREEM SALIH
  • 15. Some systems for hacking Computer & Internet Security HOSHMAND KAREEM SALIH
  • 16. A system for cracking (OllyICE) Computer & Internet Security HOSHMAND KAREEM SALIH
  • 17. • Use an Antimalware app • Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files. New threats can appear daily, so check the antimalware manufacturer's website frequently for updates • Some Antimalware apps • Microsoft Security Essential , Norton , Avast, Avira , Kaspersky, AVG • All the companies that we mentioned has either antivirus and internet security How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 18. • Don't open email messages from unfamiliar senders, or email attachments that you don't recognize • Many viruses are attached to email messages and will spread as soon as you open the attachment. It's best not to open any attachment unless it's something you're expecting • Microsoft Outlook and Windows Mail help block potentially dangerous attachments How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 19. • Use a pop-up blocker with your Internet browser • Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop- up blocker can prevent some or all of these windows from appearing • The Pop-up Blocker feature in Internet Explorer and the other advanced browsers How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 20. • Keep Windows Updated • Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible security holes • Turn on Windows Update to make sure that Windows receives these updates automatically How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 21. • Use a firewall • Windows Firewall or any other firewall app can help notify you about suspicious activity if a virus or worm attempts to connect to your PC. It can also block viruses, worms, and hackers from attempting to download potentially harmful apps to your PC How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 22. • Turn on User Account Control (UAC) • When changes are going to be made to your PC that require administrator-level permission, UAC notifies you and gives you the chance to approve the change. UAC can help keep viruses from making unwanted changes How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 23. • Clear your Internet cache and your browsing history • Most browsers store info about the websites you visit, and they might also store info that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your PC, there are times when you might want to delete some or all of them—for example, when you're using a public PC and don't want to leave personal info behind • For deleting all the history , privacy and stored information in an easy way use CCleaner app How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 24. • Use another type of operating system • Because Windows is the most operating system used in the world , the most malwares are made for windows , so using another type of OS like Linux or Mac OS x is better , because malwares for these Operating systems are not too much • Some types of Linux • Ubuntu • Open SUZI • Backtrack • Kali • Red hat How to protect your pc from malware Computer & Internet Security HOSHMAND KAREEM SALIH
  • 25. •Offensive Security Training and Services • World Class Information Security Training and Penetration Testing Online Training courses HOSHMAND KAREEM SALIH
  • 26. • We previously talked about these • What is malware • Types of malware • Reasons for writing malware • firewall • Hackers and crackers • How to protect our pc from malwares • offensive-security.com Wrap up! Computer & Internet Security HOSHMAND KAREEM SALIH
  • 27. • Book • Security Fundamentals – an official course - Microsoft • Windows help center • “How to protect my pc from viruses ?” • Internet • https://www.slideshare.net • Some slides about malwares , hackers , viruses and spywares • Some pictures of malwares (searched in google.com) • YouTube • A part of video in “Troy” movie References Computer & Internet Security HOSHMAND KAREEM SALIH