Mr Hahn`s Computer Proctection Guide

Computer Protection Guide
1
Mr Hahn’s Computer Proctection Guide
Use this guide along with the video
Computer Protection Guide
2
Slide 1
COMPUTER PROTECTION
MADE EASY
A SIMPLE GUIDE
Slide 2
USUALLY CALLED MALWARE
Malware, short for malicious
software, is any software used
to disrupt computer operation,
gather sensitive information, or
gain access to private
information stored on a
Prior to any discussion of the
complicated and confusing topic of
personal computer threats; it may be
helpful to define the terminology
commonly in use today.
It’s important to note that these
descriptions are intended to be brief
and concise, so please don’t tune out
just yet!
This presentation will focus on malware
which are the most destructive threats
to your computer.
Malware, short for malicious software,
is any software used to disrupt
computer operation, gather sensitive
information, or gain access to private
information stored on a computer.
computer.
Slide 3
WHAT ARE MALWARE THREATS ?
Viruses
Worms
Trojans
Spyware
Scareware
Browser
Hijackers
Malware Threats are:
•
Computer Viruses
•
Worms
•
Trojan Horses
•
Spyware
•
Scareware
•
Browser Hijacking
Computer Protection Guide
Slide 4
COMPUTER VIRUSES
Software that replicates by inserting copies of itself into other
computer programs in order to perform some type of harmful
activity such as sending out bogus emails.
Example:
Melisa Virus
Targeted at Microsoft Office files. It generates emails to send to
email contacts stored in Microsoft Outlook.
3
Computer Viruses
Software that replicates by inserting
copies of itself into other computer
programs in order to perform some
type of harmful activity such as sending
out bogus emails.
.
Example:
Melisa Virus
Targeted at Microsoft Office files. It
generates emails to send to email
contacts stored in Microsoft Outlook.
Slide 5
WORMS
Worms are similar to viruses in that it replicates on to other
computers but usually targets networked computers in order
to overwhelm the network. For example: requesting the
same webpage thousands of times causing the network to
crash.
Examples: The Flame Worm
Usually targets corporations and government websites
Worms are similar to viruses in that it
replicates on to other computers but
usually targets networked computers in
order
to overwhelm the network. For
example: requesting the same webpage
thousands of times causing the
network to crash.
Examples: The Flame Worm
Usually target corporations and
government websites
Slide 6
TROJANS
A non-self-replicating program typically causing system
malfunction. In some cases Trojans can also steal data.
Usually runs in the background so the user is unaware.
Example: System Crash Trojan
A Trojan that targets and corrupts the most important
system files causing the system to malfunction.
A non-self-replicating program typically
causing system malfunction. In some cases
Trojans can also steal data.
Usually runs in the background so the user
is unaware.
Example: System Crash Trojan
A Trojan that targets and corrupts the most
important system files causing the system
to malfunction.
Computer Protection Guide
Slide 7
SCAREWARE
Software with the malicious and unethical intent of selling consumers
something that is presented in a manner that causes shock, anxiety,
or the perception of a threat.
Also known as Ransomeware.
For example: You may receive an unsolicited message from some
type of “security software” that deceives users into buying the
software in order to remove a fake malware threat.
Slide 8
SPYWARE
Spyware collects information stored on the computer, then
sends that information to another entity. The information is
gathered without the user’s knowledge.
Spyware such as keyloggers, can be the most damaging
because it can be used to collect everything typed on a
keyboard, including credit card numbers, passwords, social
security numbers, etc.
Slide 9
ADWARE
Adware is the name given to advertising supported software
which in itself is not illegal and usually is not harmful (other than
being annoying) to the end user.
Even legitimate adware can however pose a privacy risk to users.
Adware survives by serving advertisements to the user which
allow them to offer software or utilities to the user for free.
4
Software with the malicious and unethical
intent of selling consumers something that
is presented in a manner that causes
shock, anxiety, or the perception of a
threat.
Also known as Ransomeware.
For example: You may receive an
unsolicited message from some type of
“security software” that deceives users
into buying the software in order to
remove a fake malware threat.
Spyware collects information stored on
the computer, then sends that
information to another entity. The
information is gathered without the
user’s knowledge.
Spyware such as keyloggers, can be the
most damaging because it can be used
to collect everything typed on a
keyboard, including credit card
numbers, passwords, social security
numbers, etc.
Adware is the name given to
advertising supported software which
in itself is not illegal and usually is not
harmful
(other than being annoying) to the end
user.
Even legitimate adware can however
pose a privacy risk to users.
Adware survives by serving
advertisements to the user which allow
them to offer software or utilities to
the user for free
Computer Protection Guide
5
Slide 10
BROWSER HIJACKERS
The modification of a web browser's settings. The term
"hijacking" is used as the changes are performed without the
user's permission.
A browser hijacker may replace the existing home page or
search page with its own. Babylon Toolbar, Conduit Search
and Onewebsearch are common browser hijackers.
The modification of a web browser's
settings. The term "hijacking" is used as
the changes are performed without the
user's permission.
A browser hijacker may replace the
existing home page or search page with
its own. Babylon Toolbar, Conduit
Search and Onewebsearch are common
browser hijackers.
Slide 11
WHY DO PEOPLE CREATE MALWARE?
To take control of a computer and
use it for specific tasks
Why do People Create Computer
Viruses?
To generate money
To steal sensitive information
(credit card numbers, passwords,
personal details, data etc.)
To prove a point, to prove it can be
done, to prove ones skill or for
revenge purposes
To cripple a computer or network
Slide 12
HOW CAN I PROTECT MY COMPUTER
FROM MALWARE?
There is no 100% assured
method of protecting your
computer.
You can reduce most of
the risk by installing antimalware monitoring
software;
however, the software can’t
do it all.
Just as important in
malware prevention is
Most of them fall under the following
categories:
To take control of a computer and use it
for specific tasks
To generate money
To steal sensitive information (credit
card numbers, passwords, personal
details, data etc.)
To prove a point, to prove it can be
done, to prove ones skill or for revenge
purposes
To cripple a computer or network
There is no 100% assured method of
protecting your computer.
You can reduce most of the risk by
installing anti-malware monitoring
software;
however, the software can’t do it all.
Just as important in malware
prevention is YOU
Computer Protection Guide
Slide 13
6
ME? I DON’T KNOW MALWARE FROM
SCHMALWARE!
You don't need expert knowledge or special
training.
You just need vigilance to avoid downloading
and installing anything you do not understand
or trust, no matter how tempting something
appears to be!
.
Remember that by clicking that “Yes” or “ I Agree” button, you
are allowing access to your entire system.
You don't need expert knowledge or
special training.
You just need vigilance to avoid
downloading and installing anything
you do not understand or trust, no
matter how tempting something
appears to be!
Remember that by clicking that “Yes” or
“ I Agree” button, you are allowing
access to your entire system.
Slide 14
“FREE” SOFTWARE
•
“Anything that looks too good to be true, usually is too good to be true”
-Anonymous
• Some programs attempt to install malware as a part of
the installation process for a “free” software program.
• Before installing any free software, search the web to be
sure you’re installing malware free software.
• Take a couple of seconds to scan the EULA (End User
License Agreement) for anything that suggests other
programs may be a part of the installation.
•
Some programs attempt to install
malware as a part of the
installation process for a “free”
software program.
Before installing any free
software, search the web to be
sure you’re installing malware
free software.
Google the web address of
software name
•
Slide 15
EMAIL
E-mail Attachments
• You cannot get malware by simply reading an email. The
problem is the ATTACHMENT.
• Only open attachments from trusted sources.
Beware of Phishing Emails
•
•
A phishing email looks like it comes from a well-known
organization, like PayPal, Amazon, or a national bank,
containing a malicious attachment or a link for you to click
which will open the door to an infection, or worse.
Never use email links to access your accounts.
Take a couple of seconds to scan
the EULA (End User License
Agreement) for anything that
suggests other programs may be a
part of the installation.
E-mail Attachments
You cannot get malware by
simply reading an email. The
problem is the ATTACHMENT.
Only open attachments from
trusted sources.
Beware of Phishing Emails
A phishing email looks like it
comes from a well-known
organization, like PayPal,
Amazon, or a national
bank, containing a
malicious attachment or a
Computer Protection Guide
7
link for you to click which
will open the door to an
infection, or worse.
Never use email links to access
your accounts.
Slide 16
WHAT ABOUT SPAM?
Spam
Unsolicited, undesired, or illegal email messages
• The message itself will not infect your computer.
• May have malware attachments.
To be safe, just delete them
Spam
Unsolicited, undesired, or illegal email
messages
The message itself will not
infect your computer.
May have malware
attachments.
To be safe, just delete them
Slide 17
POP UP WINDOWS
Pop-ups
• Whenever you’re browsing the web and see a pop-up
message appear, exercise extreme caution: pop-ups are
a favorite means of delivering viruses.
• A favorite tactic of hackers is generating messages that
pop up and look legitimate, such as your Flash player is
out of date and needs an update, prompting you to click
for the update. DON’T DO IT.
• Never trust a pop-up that says you’ve been infected with
something and to “click here” to install a program “to get
rid of it”.
Pop-ups
•
Whenever you’re browsing the
web and see a pop-up message
appear, exercise extreme caution:
pop-ups are a favorite means of
delivering viruses.
•
A favorite tactic of hackers is
generating messages that pop up
and look legitimate, such as your
Flash player is out of date and
needs an update, prompting you
to click for the update. DON’T DO
IT.
•
Never trust a pop-up that says
you’ve been infected with
something and to “click here” to
install a program “to get rid of it”.
Computer Protection Guide
Slide 18
8
WHAT PROGRAMS DO I NEED TO
PROTECT MY COMPUTER?
For computers running Microsoft Windows there are 2
programs that can be run simultaneously. Both are free.
Windows 7 – Microsoft Security Essentials
Windows Defender is included with
Windows 7 and 8, however
the Windows 7 version is designed to
prevent Spyware only.
• is a free download from Microsoft
Windows 8 – Windows Defender
• is included and installed with the operating system.
And
avast!
• is a free download from www.avast.com
The Defender version shipped with
Windows 8 is both and antivirus and
antispyware
And
avast!
is a free download from
www.avast.com
Slide 19
LETS SUMMARIZE
•
• Antivirus and antispyware monitoring software by itself
will not provide 100% malware prevention.
• Your vigilance and attention must be part of the
overall prevention.
Questions, concerns, allegations and outrage should be
directed at William Hahn ([email protected])
•
Antivirus and antispyware
monitoring software by itself will
not provide 100% malware
prevention.
Your vigilance and attention must
be part of the overall prevention.