SlideShare a Scribd company logo
1 of 7
Virus, Trojans & Worms. Oh My! Malware can be a computer virus, trojan horse, worm,  spyware, or adware. Malware is often installed by downloading programs such as screensavers, games, “free” software or by visiting malicious Web sites.
Malware Protection Section: Virus, Trojans & Worms Keep your antivirus software updated to protect your computer from the latest malware.  Set up the free Symantec Antivirus available to all UNC-Chapel Hill affiliates with a valid Onyen.  Use firewall software to prevent unwanted communications with your computer.
Malware Protection Section: Virus, Trojans & Worms Obtain and install computer firewall to protect against any unauthorized or unwanted computing activity.  Call the ITS Help Desk at (919.962.HELP) with your questions on how to protect a computer against malware.
	Social Engineering & Phishing – What Is It? Section: Virus, Trojans & Worms Social engineeringused by criminals to try to manipulate you into disclosing Sensitive Information  Phishinga form of social engineering that uses fake email messages to trick you into disclosing confidential information
	Social Engineering & Phishing Protection Section: Virus, Trojans & Worms Be suspicious of email attachments and unexpected email messages. Think twice before clicking on any link, including those in an email, pop-ups or ads.  Be wary of emails asking for personal or financial information. Call (919.962.HELP) to determine whether a suspect email is legitimate.
Learning Point # 9 Section: Virus, Trojans & Worms There is so much malware on theInternet, it makes little difference whether  you have antivirus softwareinstalled and updated on your computer Right? Wrong! Antivirus software may not detect all malware, but it is free for University staff and faculty and provides, if regularly updated, an effective tool against many viruses and other types of malware.
Learning Point # 10 Section: Virus, Trojans & Worms It’s your birthday and you get a lot of messages from your MySpace friends. Some of the names do not sound familiar, but since it’s your birthday, you may as well enjoy the greeting cards. Right? Wrong! If your profile on your favorite social networking is public, it may contain your actual birthdate. Social engineering scammers will use personal information on public sites to target individuals with phishing messages. Never open attachments or download files in messages from unknown senders.

More Related Content

What's hot

Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its preventiondavidmmc
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber AttacksThe eCore Group
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 

What's hot (18)

Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
C 7
C 7C 7
C 7
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer viruses and its prevention
Computer viruses and its preventionComputer viruses and its prevention
Computer viruses and its prevention
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
spyware
spywarespyware
spyware
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 

Viewers also liked

Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมChainarong Maharak
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
Network virus
Network virusNetwork virus
Network virusA M
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computerlmadison10
 

Viewers also liked (20)

Malwares
MalwaresMalwares
Malwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Virus
VirusVirus
Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network virus
Network virusNetwork virus
Network virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 

Similar to Protect Your Computer from Malware

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxMarkemmanLopez
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 

Similar to Protect Your Computer from Malware (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
M
MM
M
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

More from Megan Bell

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesMegan Bell
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioMegan Bell
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewMegan Bell
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserMegan Bell
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailMegan Bell
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipMegan Bell
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracMegan Bell
 

More from Megan Bell (9)

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slides
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audio
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 Overview
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web Browser
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got Mail
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect Equip
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
 

Recently uploaded

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Recently uploaded (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Protect Your Computer from Malware

  • 1. Virus, Trojans & Worms. Oh My! Malware can be a computer virus, trojan horse, worm, spyware, or adware. Malware is often installed by downloading programs such as screensavers, games, “free” software or by visiting malicious Web sites.
  • 2. Malware Protection Section: Virus, Trojans & Worms Keep your antivirus software updated to protect your computer from the latest malware. Set up the free Symantec Antivirus available to all UNC-Chapel Hill affiliates with a valid Onyen. Use firewall software to prevent unwanted communications with your computer.
  • 3. Malware Protection Section: Virus, Trojans & Worms Obtain and install computer firewall to protect against any unauthorized or unwanted computing activity. Call the ITS Help Desk at (919.962.HELP) with your questions on how to protect a computer against malware.
  • 4. Social Engineering & Phishing – What Is It? Section: Virus, Trojans & Worms Social engineeringused by criminals to try to manipulate you into disclosing Sensitive Information Phishinga form of social engineering that uses fake email messages to trick you into disclosing confidential information
  • 5. Social Engineering & Phishing Protection Section: Virus, Trojans & Worms Be suspicious of email attachments and unexpected email messages. Think twice before clicking on any link, including those in an email, pop-ups or ads. Be wary of emails asking for personal or financial information. Call (919.962.HELP) to determine whether a suspect email is legitimate.
  • 6. Learning Point # 9 Section: Virus, Trojans & Worms There is so much malware on theInternet, it makes little difference whether you have antivirus softwareinstalled and updated on your computer Right? Wrong! Antivirus software may not detect all malware, but it is free for University staff and faculty and provides, if regularly updated, an effective tool against many viruses and other types of malware.
  • 7. Learning Point # 10 Section: Virus, Trojans & Worms It’s your birthday and you get a lot of messages from your MySpace friends. Some of the names do not sound familiar, but since it’s your birthday, you may as well enjoy the greeting cards. Right? Wrong! If your profile on your favorite social networking is public, it may contain your actual birthdate. Social engineering scammers will use personal information on public sites to target individuals with phishing messages. Never open attachments or download files in messages from unknown senders.