Computer Protection Guide 1 Mr Hahn’s Computer Proctection Guide Use this guide along with the video Computer Protection Guide 2 Slide 1 COMPUTER PROTECTION MADE EASY A SIMPLE GUIDE Slide 2 USUALLY CALLED MALWARE Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private information stored on a Prior to any discussion of the complicated and confusing topic of personal computer threats; it may be helpful to define the terminology commonly in use today. It’s important to note that these descriptions are intended to be brief and concise, so please don’t tune out just yet! This presentation will focus on malware which are the most destructive threats to your computer. Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private information stored on a computer. computer. Slide 3 WHAT ARE MALWARE THREATS ? Viruses Worms Trojans Spyware Scareware Browser Hijackers Malware Threats are: • Computer Viruses • Worms • Trojan Horses • Spyware • Scareware • Browser Hijacking Computer Protection Guide Slide 4 COMPUTER VIRUSES Software that replicates by inserting copies of itself into other computer programs in order to perform some type of harmful activity such as sending out bogus emails. Example: Melisa Virus Targeted at Microsoft Office files. It generates emails to send to email contacts stored in Microsoft Outlook. 3 Computer Viruses Software that replicates by inserting copies of itself into other computer programs in order to perform some type of harmful activity such as sending out bogus emails. . Example: Melisa Virus Targeted at Microsoft Office files. It generates emails to send to email contacts stored in Microsoft Outlook. Slide 5 WORMS Worms are similar to viruses in that it replicates on to other computers but usually targets networked computers in order to overwhelm the network. For example: requesting the same webpage thousands of times causing the network to crash. Examples: The Flame Worm Usually targets corporations and government websites Worms are similar to viruses in that it replicates on to other computers but usually targets networked computers in order to overwhelm the network. For example: requesting the same webpage thousands of times causing the network to crash. Examples: The Flame Worm Usually target corporations and government websites Slide 6 TROJANS A non-self-replicating program typically causing system malfunction. In some cases Trojans can also steal data. Usually runs in the background so the user is unaware. Example: System Crash Trojan A Trojan that targets and corrupts the most important system files causing the system to malfunction. A non-self-replicating program typically causing system malfunction. In some cases Trojans can also steal data. Usually runs in the background so the user is unaware. Example: System Crash Trojan A Trojan that targets and corrupts the most important system files causing the system to malfunction. Computer Protection Guide Slide 7 SCAREWARE Software with the malicious and unethical intent of selling consumers something that is presented in a manner that causes shock, anxiety, or the perception of a threat. Also known as Ransomeware. For example: You may receive an unsolicited message from some type of “security software” that deceives users into buying the software in order to remove a fake malware threat. Slide 8 SPYWARE Spyware collects information stored on the computer, then sends that information to another entity. The information is gathered without the user’s knowledge. Spyware such as keyloggers, can be the most damaging because it can be used to collect everything typed on a keyboard, including credit card numbers, passwords, social security numbers, etc. Slide 9 ADWARE Adware is the name given to advertising supported software which in itself is not illegal and usually is not harmful (other than being annoying) to the end user. Even legitimate adware can however pose a privacy risk to users. Adware survives by serving advertisements to the user which allow them to offer software or utilities to the user for free. 4 Software with the malicious and unethical intent of selling consumers something that is presented in a manner that causes shock, anxiety, or the perception of a threat. Also known as Ransomeware. For example: You may receive an unsolicited message from some type of “security software” that deceives users into buying the software in order to remove a fake malware threat. Spyware collects information stored on the computer, then sends that information to another entity. The information is gathered without the user’s knowledge. Spyware such as keyloggers, can be the most damaging because it can be used to collect everything typed on a keyboard, including credit card numbers, passwords, social security numbers, etc. Adware is the name given to advertising supported software which in itself is not illegal and usually is not harmful (other than being annoying) to the end user. Even legitimate adware can however pose a privacy risk to users. Adware survives by serving advertisements to the user which allow them to offer software or utilities to the user for free Computer Protection Guide 5 Slide 10 BROWSER HIJACKERS The modification of a web browser's settings. The term "hijacking" is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page or search page with its own. Babylon Toolbar, Conduit Search and Onewebsearch are common browser hijackers. The modification of a web browser's settings. The term "hijacking" is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page or search page with its own. Babylon Toolbar, Conduit Search and Onewebsearch are common browser hijackers. Slide 11 WHY DO PEOPLE CREATE MALWARE? To take control of a computer and use it for specific tasks Why do People Create Computer Viruses? To generate money To steal sensitive information (credit card numbers, passwords, personal details, data etc.) To prove a point, to prove it can be done, to prove ones skill or for revenge purposes To cripple a computer or network Slide 12 HOW CAN I PROTECT MY COMPUTER FROM MALWARE? There is no 100% assured method of protecting your computer. You can reduce most of the risk by installing antimalware monitoring software; however, the software can’t do it all. Just as important in malware prevention is Most of them fall under the following categories: To take control of a computer and use it for specific tasks To generate money To steal sensitive information (credit card numbers, passwords, personal details, data etc.) To prove a point, to prove it can be done, to prove ones skill or for revenge purposes To cripple a computer or network There is no 100% assured method of protecting your computer. You can reduce most of the risk by installing anti-malware monitoring software; however, the software can’t do it all. Just as important in malware prevention is YOU Computer Protection Guide Slide 13 6 ME? I DON’T KNOW MALWARE FROM SCHMALWARE! You don't need expert knowledge or special training. You just need vigilance to avoid downloading and installing anything you do not understand or trust, no matter how tempting something appears to be! . Remember that by clicking that “Yes” or “ I Agree” button, you are allowing access to your entire system. You don't need expert knowledge or special training. You just need vigilance to avoid downloading and installing anything you do not understand or trust, no matter how tempting something appears to be! Remember that by clicking that “Yes” or “ I Agree” button, you are allowing access to your entire system. Slide 14 “FREE” SOFTWARE • “Anything that looks too good to be true, usually is too good to be true” -Anonymous • Some programs attempt to install malware as a part of the installation process for a “free” software program. • Before installing any free software, search the web to be sure you’re installing malware free software. • Take a couple of seconds to scan the EULA (End User License Agreement) for anything that suggests other programs may be a part of the installation. • Some programs attempt to install malware as a part of the installation process for a “free” software program. Before installing any free software, search the web to be sure you’re installing malware free software. Google the web address of software name • Slide 15 EMAIL E-mail Attachments • You cannot get malware by simply reading an email. The problem is the ATTACHMENT. • Only open attachments from trusted sources. Beware of Phishing Emails • • A phishing email looks like it comes from a well-known organization, like PayPal, Amazon, or a national bank, containing a malicious attachment or a link for you to click which will open the door to an infection, or worse. Never use email links to access your accounts. Take a couple of seconds to scan the EULA (End User License Agreement) for anything that suggests other programs may be a part of the installation. E-mail Attachments You cannot get malware by simply reading an email. The problem is the ATTACHMENT. Only open attachments from trusted sources. Beware of Phishing Emails A phishing email looks like it comes from a well-known organization, like PayPal, Amazon, or a national bank, containing a malicious attachment or a Computer Protection Guide 7 link for you to click which will open the door to an infection, or worse. Never use email links to access your accounts. Slide 16 WHAT ABOUT SPAM? Spam Unsolicited, undesired, or illegal email messages • The message itself will not infect your computer. • May have malware attachments. To be safe, just delete them Spam Unsolicited, undesired, or illegal email messages The message itself will not infect your computer. May have malware attachments. To be safe, just delete them Slide 17 POP UP WINDOWS Pop-ups • Whenever you’re browsing the web and see a pop-up message appear, exercise extreme caution: pop-ups are a favorite means of delivering viruses. • A favorite tactic of hackers is generating messages that pop up and look legitimate, such as your Flash player is out of date and needs an update, prompting you to click for the update. DON’T DO IT. • Never trust a pop-up that says you’ve been infected with something and to “click here” to install a program “to get rid of it”. Pop-ups • Whenever you’re browsing the web and see a pop-up message appear, exercise extreme caution: pop-ups are a favorite means of delivering viruses. • A favorite tactic of hackers is generating messages that pop up and look legitimate, such as your Flash player is out of date and needs an update, prompting you to click for the update. DON’T DO IT. • Never trust a pop-up that says you’ve been infected with something and to “click here” to install a program “to get rid of it”. Computer Protection Guide Slide 18 8 WHAT PROGRAMS DO I NEED TO PROTECT MY COMPUTER? For computers running Microsoft Windows there are 2 programs that can be run simultaneously. Both are free. Windows 7 – Microsoft Security Essentials Windows Defender is included with Windows 7 and 8, however the Windows 7 version is designed to prevent Spyware only. • is a free download from Microsoft Windows 8 – Windows Defender • is included and installed with the operating system. And avast! • is a free download from www.avast.com The Defender version shipped with Windows 8 is both and antivirus and antispyware And avast! is a free download from www.avast.com Slide 19 LETS SUMMARIZE • • Antivirus and antispyware monitoring software by itself will not provide 100% malware prevention. • Your vigilance and attention must be part of the overall prevention. Questions, concerns, allegations and outrage should be directed at William Hahn ([email protected]) • Antivirus and antispyware monitoring software by itself will not provide 100% malware prevention. Your vigilance and attention must be part of the overall prevention.
© Copyright 2026 Paperzz