Transcript File

When you have two or more computers
connected to each other, you have a
network. The purpose of a network is
to enable the sharing of files and
information between multiple systems.
The Internet could be described as a
global network of networks. Computer
networks can be connected through
cables, such as Ethernet cables or
phone lines, or wirelessly, using
wireless networking cards that send
and receive data through the air.
NETWORK
A bot (short for "robot") is an automated
program that runs over the Internet. Some
bots run automatically, while others only
execute commands when they receive
specific input. There are many different
types of bots, but some common
examples include web crawlers, chat
room bots, and malicious bots.
While most bots are used for
Chat bots were one of the first types of
good purposes, some are
automated programs to be called "bots"
considered malware, since they
and became popular in online chatrooms.
perform unwanted functions. For
These bots are scripts that look for certain
example, spambots capture
text patterns submitted by chat room
email addresses from website
participants and respond with automated
contact forms, address books,
actions. For example, a chat bot might
and email programs, then add
warn a user if his or language is
them to a spam mailing list.
inappropriate.
BOT
While this term originally referred to a clever or
expert programmer, it is now more commonly
used to refer to someone who can gain
unauthorized access to other computers. A
hacker can "hack" his or her way through the
security levels of a computer system or
network. This can be as simple as figuring out
somebody else's password or as complex as
writing a custom program to break another
computer's security software.
Hackers are the reason software manufacturers
release periodic "security updates" to their
programs. While it is unlikely that the average
person will get "hacked," some large
businesses and organizations receive multiple
hacking attempts a day.
HACKER
A computer firewall limits the data that can
pass through it and protects a networked
server or client machine from damage by
unauthorized users.
Firewalls can be either hardware or softwarebased. A router is a good example of a
hardware device that has a built-in
firewall. Most routers can be configured to
limit traffic from certain IP addresses or
block requests based on other criteria.
Software programs that monitor and
restrict external access to a computer or
network can also serve as firewalls. A
network firewall only allows authorized
traffic from the Internet to flow in and out
of the network.
FIREWALL
This is a hardware device that routes
data (hence the name) from a local
area network (LAN) to another
network connection. A router acts like
a coin sorting machine, allowing only
authorized machines to connect to
other computer systems. Most
routers also keep log files about the
local network activity.
ROUTER
Computer viruses are small programs or
scripts that can negatively affect the
health of your computer. These
malicious little programs can create
files, move files, erase files, consume
We all know it's hard enough to get a your computer's memory, and cause
computer to work well when it is
your computer not to function
healthy, let alone when it has been
correctly. Some viruses can copy
attacked by a virus. Therefore, it is
themselves, attach themselves to
better to prevent an attack than to
programs, and travel across
try and cure it. There are many
networks. In fact opening an infected
antivirus programs available that
scan incoming files for viruses
e-mail attachment is the most
before they can cause damage to
common way to get a virus.
your computer.
VIRUS
Examples of an
Infected System!
Antivirus software is a type of utility
used for scanning and removing
viruses from your computer.
Since new viruses are constantly being
created by computer hackers,
antivirus programs must keep an
updated database of virus types.
While antivirus software is primarily
designed to protect computers
against viruses, many antivirus
programs now protect against other
types of malware, such as spyware,
adware, and rootkits as well.
ANTIVIRUS
“Spam" refers to junk e-mail or
irrelevant postings to a newsgroup or
bulletin board. The unsolicited e-mail
messages you receive about
refinancing your home, reversing
aging, and losing those extra pounds
are all considered to be spam.
Spamming other people is definitely
not cool and is one of the most
notorious violations of Internet .
SPAM
Short for "malicious software," malware
refers to software programs designed
to damage or do other unwanted
actions on a computer system. In
Spanish, "mal" is a prefix that means
"bad," making the term "badware,"
which is a good way to remember it
(even if you're not Spanish).
https://www.malwarebytes.org/
Is a program to use to scan for
malware.
Common examples of malware include
viruses, worms, trojan horses, and
spyware.
MALWARE
A Trojan horse, or Trojan, is a generally
non-self-replicating type of malware
program containing malicious code
that, when executed, carries out
actions determined by the nature of
the Trojan, typically causing loss or
theft of data, and possible system
harm.
https://www.malwarebytes.org/
Is a program to use to scan for
malware.
Malicious programs are classified as
Trojans if they do not attempt to inject
themselves into other files (computer
virus) or otherwise propagate
themselves (worm)
TROJAN
https://www.malwarebytes.org/
Is a program to use to scan for
malware.
A computer worm is a standalone
malware computer program that
replicates itself in order to spread to
other computers. Often, it uses a
computer network to spread itself,
relying on security failures. Unlike a
computer virus, it does not need to
attach itself to an existing program.
Worms almost always cause at least
some harm to the network, even if
only by consuming bandwidth,
whereas viruses almost always
corrupt or modify files on a targeted
computer.
WORM
Spyware can capture information like Web
browsing habits, e-mail messages,
usernames and passwords, and credit
card information. If left unchecked, the
software can transmit this data to
another person's computer over the
Internet.
You can purchase anti-spyware
So how does spyware get on your
that will search for spyware on your computer? Just like viruses, spyware can
computer and stomp the unwanted be installed when you open an e-mail
software out of your system. A
attachment containing the malicious
good way to prevent spyware from
software. It can also be installed when
infecting your computer is to install you install another program that has a
a security program that lets you
spyware installer attached to it. Because
know when any program is being
of the insidious nature of spyware, most
installed, so that you can choose to people don't even know when spyware is
allow or stop the installation.
on their computer.
SPYWARE
Adware is free software that is supported by
advertisements. Common adware programs are
toolbars that sit on your desktop or work in your
Web browser. They include features like advanced
searching of the Web or your hard drive and better
organization of your bookmarks and shortcuts. They
are free to use, but require you to watch
advertisements as long as the programs are open.
Most adware is safe to use, but some can serve as
spyware, gathering information about you from your
hard drive, the Web sites you visit, or your
keystrokes. Spyware programs can then send the
information over the Internet to another computer.
So be careful what adware you install on your
computer. Make sure it is from a reputable company
and read the privacy agreement that comes with it.
ADWARE
A rootkit is a software program designed to
provide a user with administrator access
to a computer without being detected.
Rootkits are considered one of the most
serious types of malware since they may
be used to gain unauthorized access to
Fortunately, most operating
remote systems and perform malicious
systems and software programs
operations.
are designed to prevent
unauthorized access via rootkits The name "rootkit" includes the word "root,"
because the goal of a rootkit is to gain
or other malware. Therefore, it is
root access to a computer. By logging in
difficult to use a rootkit to gain
access to modern systems.
as the root user of a system, a hacker
However, rootkits are constantly
can perform nearly any operation he or
modified and updated in order to
she wishes.
try and breach security holes.
ROOTKIT
Test your knowledge
on the weekly
Edmodo Quiz!
Due Friday!