Network Security - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Network Security

Description:

Macro Virus- These types of viruses load themselves into the templates used in ... http://i122.photobucket.com/albums/o272/softarchive/img13/26909_s__avast_pr o_v_1. ... – PowerPoint PPT presentation

Number of Views:92
Avg rating:3.0/5.0
Slides: 20
Provided by: daniel337
Category:

less

Transcript and Presenter's Notes

Title: Network Security


1
Network Security
  • By Daniel Jordan

2
What is a Virus?
  • A virus is a program that is designed to infect a
    host computer and spread to any computer it is
    executed on.

3
Types of Viruses
  • Macro Virus- These types of viruses load
    themselves into the templates used in common
    Microsoft office products. These include Word,
    Excel, and PowerPoint. They are loaded onto the
    computer anytime the saved document or file is
    opened.
  • Program Virus- These viruses attach themselves to
    executable files and load themselves onto the
    computer when the setups are launched.
  • Boot Virus- These viruses load into the boot
    sector of the hard disk drive when the system is
    being booted from a boot disk.

4
How do they begin infecting?
  • A virus is loaded onto a computer through opening
    downloaded and transferred files.
  • Anytime a file containing a virus is opened on a
    computer, the virus begin to infect the computer
    it was loaded on.

5
Virus Myths
  • The majority of computer users believe that a
    virus can infect a computer by opening an email.
    This is not true. It can only begin infecting a
    computer when a file attached to the email is
    opened.
  • It is also believed that a user can put the
    computer at risk by viewing a website. This is
    also not true. A file must be run or opened in
    order for the virus to begin its infecting.
  • Computer users also often believe that by
    downloading a file a virus has infected their
    computer. This is also not true. A file must be
    opened or run before the virus can begin
    infecting.

6
Windows Anti-Virus Solutions
  • Norton AntiVirus
  • McAfee
  • Kaspersky
  • Panda
  • Security Shield
  • CA
  • BitDefender
  • Trend Micro
  • Webroot
  • BullGuard

7
Mac Anti-Virus Solutions
  • Avast!
  • ClanXav
  • MacScan
  • Norton AntiVirus
  • Sophos
  • Intego VirusBarrier
  • VirusScan
  • McAfee

8
Linux Anti-Virus Solutions
  • AVG
  • Avira Antivir
  • BitDefender
  • Clam AV
  • FProt
  • Command AntiVirus
  • Kasperky

9
What is Spyware, Adware, and Malware?
  • Spyware is a piece of software that is used to
    change the way a computer is setup, to track web
    surfing habits for advertising purposes, and is
    also used to collect personal information.
  • Adware is a piece of software designed to hoard
    your computer with advertisements. Can often slow
    web surfing down to a crawl. It can also use RAM
    space and CPU cycles.
  • Malware is almost synonymous with spyware and
    adware. However, it tends to have a more
    malicious intent to it.

10
How Are They Contracted?
  • Adware is often loaded through shareware.
    Shareware software developers are often paid to
    include adware. It is also often contracted
    through advertisements.
  • Spyware is loaded through opening downloaded
    applications, through browser plug-in
    installations, and through clicking on
    advertisements.
  • Malware is contracted through the same methods as
    spyware and adware.

11
Spyware, Adware, and Malware solutions
  • Spy Sweeper
  • Spy Bot- Search and Destroy
  • Ad-Aware
  • Windows Defender
  • CounterSpy
  • Trend Micro Anti-Spyware
  • AntiSpy
  • Spyware Doctor
  • Pest Patrol
  • Spyware Be Gone
  • McAfee Anti-Spyware
  • Maxion Spy Killer

12
Phishing
  • A new form of security threat.
  • Most commonly defined as any online deception
    used to acquire credit card numbers, usernames,
    passwords, and even account information.

13
How to protect against phishing
  • The best way to start protecting yourself is to
    use the keyboard to type in URLs instead of
    clicking on links.
  • Try to use websites that have a logo of a lock on
    the bottom of your browser window. It is not
    placed on the website.
  • The last way to protect yourself is to use
    security software that blocks against phishing.

14
Other Risks
  • Computer users also have to protect themselves
    from hackers.
  • To achieve this protection, computer use a piece
    of software or hardware called a firewall.

15
  • Firewalls were created to prevent the intrusion
    of another person on a personal computer. They
    were also created to stop computer hackers from
    taking control of a persons computer.

16
Firewalls
  • Firewalls can be found in software such as
    Internet Security software.
  • Firewalls can also be found in many routers from
    companies such as D-link, Linksys, and Netgear.

17
Common Firewall Software
  • Windows ZoneAlarm, McAfee, Norton, Webroot, AVG,
    and Kaspersky
  • Mac Apple, Intego, Flying Buttress, Doorstop X,
    and Firewalk X
  • Linux Fwbuilder, Firestarter, Guarddog,
    Guidedog, and Knetfilter

18
Works Cited
  • In order of appearance
  • http//www.extension.iastate.edu/Publications/PM17
    89J.pdf
  • http//www.learnthenet.com/english/gifs/virus.gif
  • http//askbobrankin.com/computer-virus.jpg
  • http//static.howstuffworks.com/gif/virus-ch.jpg
  • http//www.microsoft.com/protect/computer/basics/v
    irus.mspx
  • http//6starreview.com/Internet-Security.aspx?Refe
    rGolskeyboardInternet20SecuritygclidCBPKZPF1
    75ECFQ80SwodrEYdwQ
  • http//img.planetonline.com/Original/norton_av2007
    .jpg
  • http//www.devnetsoftware.com/wp-content/uploads/2
    007/05/mcafee-virusscan-plus-2007.jpg
  • http//yasir03.online.fr/imgs/KasperskyAnti-Virus.
    jpg
  • http//www.pure-mac.com/virus/html
  • http//i122.photobucket.com/albums/o272/softarchiv
    e/img13/26909_s__avast_pro_v_1.jpg
  • http//store.solutions-inc.co.uk/image/intego_vb_n
    ig.jpg
  • http//www.freebyte.com/anivirus/
  • http//resnet.uidaho.edu/Images/AVG_Antivirus_Syst
    em_logo.jpg
  • http//www.m2tek.com/images/bitdefender10antivir.j
    pg
  • http//www.4pcfix.co.nz/Images/spyware.jpg

19
Works Cited Cont
  • http//www.tech-faq.com/adware.shtml
  • Http//www.adwarereport.com/mt/archives/000032.htm
    l
  • http//www.microsoft.com/protect/computer/basics/s
    pyware.mspx
  • http//computer.howstuffworks.com/spyware1.htm
  • http//www.softwaretipsandtricks.com/windowsxp/art
    icles/590/1/Different-types-of-spyware
  • http//www.riblio.com/riblio/box_front_spysweeper
    5B15D.jpeg2.jpg
  • http//www.fxhstore.com/images/AdAware3DproBox.gif
  • http//magaria.com/blo/image/counterspy-lores.jpg
  • http//www.microsoft.com/protect/yourself/phishing
    /identify.mspx
  • http//www.networksecurityjournal.com/features/44-
    ways-protect-phishing/
  • http//static.howstuffworks.com/gif/phishing-1.jpg
  • http//www.dmccormick.org/pictures/firewall.jpg
  • http//www.codinghorror.com/blog/images/dlink-dgl4
    500.jpg
  • http//www.codinghorror.com/blog/images/dlink-dgl4
    500.jpg
  • http//www.serif.com/serifextra/products/pcsystemt
    ools/DesktopFirewall/DesktopFirewall.jpg
  • http//cdn.overstock.com/images/products/3/L103207
    04.jpg
Write a Comment
User Comments (0)
About PowerShow.com