1 / 13

Lions? And Tigers? And Bears?

Lions? And Tigers? And Bears?. Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the yellow brick road. As we travel through the internet we might be saying “Malware, and Spyware and Viruses…Oh, my!

keegan
Download Presentation

Lions? And Tigers? And Bears?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lions? And Tigers? And Bears? Oh my!

  2. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the yellow brick road. As we travel through the internet we might be saying “Malware, and Spyware and Viruses…Oh, my! Let’s take a look at these and try to make ourselves aware of any dangers …

  3. Malware Malware is short for malicious software. It is software specifically created to destroy, or damage your computer. Malware is often a catch all term which is used to describe Spyware and Viruses as well.

  4. Spyware • Spyware are programs installed without your consent and they monitor and control your computer. It may be used to send you unwanted ads, monitor your internet surfing, and/or record your keystrokes (which could lead to identify theft).

  5. Viruses Viruses are programs that copy themselves onto your computer without your permission. Surely, your mom has said when you are sick, “I think you caught a bug.” Viruses are bugs for your computer that are extremely hard to get rid of. Just like you can catch and spread a virus you can catch and spread, computer viruses in much the same way! They can be spread from computer to computer!

  6. Trojan Horse – this virus usually comes to the user disguised as a good program or application but in reality once it is installed it starts to infecting files on your computer. Worm --The biggest danger with a worm is its ability to copy itself on your system. Worms are able to multiply, and instead of sending out a single one, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. Types of Viruses

  7. Some Do’s and Don’ts • Don’t open attachments or click on links in an email unless you are really sure of the person who sent it to you. • Don’t download programs or install software unless you know and trust that website. • Do talk with your siblings and parents and let them know that it is risky to click on pop-up ads or download “free” games (which might have a virus.)

  8. Is your computer infected? Things to look for: Is your computer running slower than usual? Are there error messages displayed repeatedly? Do you have trouble shutting your computer down? Are you plagued by pop-up ads? Are web pages being displayed you didn’t intend to use or e-mails being sent that you didn’t write?

  9. You could hire a private eye to keep you safe and secure but that would be very costly. There are programs out there that can detect if you have Spyware or viruses. However you may have to get professional help if you have exhausted all the free options. Be careful some Anti-Spyware is Malware in disguise…find a legitimate distributor of these products. What to do?

  10. Malware, Spyware and Viruses… Oh My!

  11. Be very careful… the malicious code writers are hard at work thinking up new ways to get Malware on to your computer!

  12. Additional Information • Using you skills in searching the internet find at least 3 sites that explain more about Malware, Spyware and Viruses. Keep track of those sites you will be using them in your upcoming assignments.

  13. Assignments Please refer to the Malware Wiki Assignments page for directions. You have 3 different assignments. As always please contact me if you need further directions. Good Luck!

More Related