Click to begin
This presentation is the property of its rightful owner.
Sponsored Links
1 / 19

Click to begin PowerPoint PPT Presentation


  • 66 Views
  • Uploaded on
  • Presentation posted in: General

Click to begin. How many times has this happened to you?. Spyware, Adware, and Malware. Different Types of Malicious Infections Dangers of Being Infected Prevention Methods. Credentials. A+ Core Certification in Computer Hardware -Repair and Maintenance

Download Presentation

Click to begin

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Click to begin

Click to begin


How many times has this happened to you

How many times has this happened to you?


Spyware adware and malware

Spyware, Adware, and Malware

Different Types of Malicious Infections

Dangers of Being Infected

Prevention Methods


Credentials

Credentials

  • A+ Core Certification in Computer Hardware

    -Repair and Maintenance

    2. A+ Core Certification in Microsoft Software

    -Windows NT/2000/2003

    -Windows 98/XP/Vista

    -Windows .NET

  • A+ Core Certification in Networking

    -Repair, management, and administration


What is spyware

What is spyware?

  • Software that secretly gathers information about a person or organization.

  • Any software that is designed to take partial or full control of a computer’s operation without the knowledge of the user.

  • Source: http://dictionary.reference.com/browse/spyware


What is spyware con t

What is spyware? (con’t)

  • Generally displays advertisements against your will

  • Can tracks your online habits and reports them to companies

  • Can deploy pop-up advertisements

  • Most popular forms of infection: browser toolbars and loopholes within the OS


Programs bundled with spyware aol instant messenger

Programs Bundled with SpywareAOL Instant Messenger


What is adware

What is adware?

  • Software applications in which advertisements are displayed while the program is running, esp. in pop-up windows or banners, and which is often installed without the user’s knowledge or consent. Also called advertising-supported software.

  • Source: http://dictionary.reference.com/browse/spyware


Adware installation edonkey

Adware Installation - eDonkey


What is malware

What is malware?

  • Software designed to infiltrate or damage a computer system without the owner’s informed consent

  • Portmanteau of the words “malicious” and “software”

  • Only one of the –wares that can be infectious

  • Can also be considered as ‘contaminating’ as viruses, worms, and trojan horses.

  • Source: http://en.wikipedia.org/wiki/Malware


What is malware con t

What is malware? (con’t)

  • Biggest malware scandal to date – 2005 Sony BMG CD copy prevention scandal.

  • Infected computers with “rootkit” software that changed how the Windows platform read all CDs.

  • Opened security holes in Windows that could not be repaired without reformat/reinstallation.


Dangers of spyware

Dangers of Spyware

  • Passwords can be obtained by third parties

  • Personal information can be obtained and sold to third parties, privacy invaded

  • Identity theft

  • Reap havoc on your computer, causing you to reformat and reinstall operating system, drivers, and software


Prevention methods

Prevention Methods


Ad aware free by lavasoft

Ad-Aware Free by Lavasoft


Hi jack this by merijn org

Hi-Jack This by Merijn.org


Windows defender by microsoft

Windows Defender by Microsoft


Prevention methods con t

Prevention Methods (con’t)

  • Knowledge!


Recapitulation

Recapitulation

  • Three types of “wares”

  • Dangers of all three

  • Prevention methods


  • Login