Protecting Your PC from Viruses, Social Engineering, and Identity Theft

Protecting Your PC from Viruses, Social Engineering, and Identity Theft
paly

Learn how to safeguard your PC from viruses, worms, Trojan horses, phishing, and other cyber threats. Understand social engineering tactics and how to protect yourself from identity theft.

About Protecting Your PC from Viruses, Social Engineering, and Identity Theft

PowerPoint presentation about 'Protecting Your PC from Viruses, Social Engineering, and Identity Theft'. This presentation describes the topic on Learn how to safeguard your PC from viruses, worms, Trojan horses, phishing, and other cyber threats. Understand social engineering tactics and how to protect yourself from identity theft.. The key topics included in this slideshow are PC protection, viruses, social engineering, identity theft, cyber threats,. Download this presentation absolutely free.

Presentation Transcript


1. Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click your mouse to advance slides

2. Social Engineering Social Engineering Also known as pretexting Feeds on human behavior How people interact Tells you that you are trustworthy Are you to willing to please Uses false pretense to get personal information

3. Protect Yourself and Your Job Protect Yourself and Your Job Never feel obligated to pass along sensitive information Ask pertinent questions about the person making requests: Correct name and spelling Who is the person/company representing Employee number Ask for account number request is being made Ask if you can verify any information

4. Phishing Phishing It is using email to get you to click on links and making personal information available to scammers/hackers. Sends email to make you think you have a problem with your personal accounts Wants you to open email and click on links that take you to fake websites where your personal information is captured for them to access your accounts

5. Protect Your Personal Information Protect Your Personal Information Hover over email sender in the Inbox and view true address in the status bar Many of them will have country codes other than US (United States of America) Their only purpose is to get into your accounts Never respond/verify by email Always call o/website or go to the financial institution Report the phishing scam

6. Identity Theft Identity Theft acquires access to: Name Address Social Security number Account numbers Drivers license Birthday steals portable storage: Laptop Flash drive Cell phone PDA Ipad

7. Protect Your Identity Protect Your Identity Learn how to set passwords Use Passwords that will not be easy for theft Use biometric security , fingerprint scan, if possible (newer devices)

8. What is What is Spam Spyware Virus Trojan horse Worms Rootkits Buffer overflow Spoofing Botnets and zombies

9. Spam Spam Unsolicited commercial email and schemes Prescriptions, insurance, adult sites, etc. Steal/acquire addresses from Websites, Internet mailing lists, newsgroups, etc.

10. Spyware Spyware Unsuspectingly collects computer user information without consent Software that runs along with a legitimate program Surveillance software that tracks keystrokes, screen capture, chat loggers, etc Used for spying: spouses, worried parents, government, private detectives Adware that tracks your surfing habits-this is not illegal Legitimate Adware will disclose nature of data collected Involves privacy issues; User has no control

11. Spyware on my computer? Spyware on my computer? Windows desktop is very slow booting Computer is slower when browsing Internet Clicking on links gets unexpected results Nothing, different website, etc Home page changes, unable to reset it Web sites automatically added to bookmarks/favorites list

12. Virus (like human flu) Virus (like human flu) Program or code loaded onto computer without permission and knowledge Attaches itself to code on your computer and replicates itself when a file is launched or executed Then attaches itself to other files and spreads throughout computer

13. Various Viruses Various Viruses Boot sector-puts virus into the first section of hard disk so the virus is loaded into the memory when computer is booted up Program-infects executable program files: .exe, .com, .sys, etc Multipartite-uses multiple techniques such as boot sector and program at the same time Polymorphic-changes each time it is used, avoiding detection Macro-is inserted to a Microsoft Office document and emailed to the unsuspecting user Triggered by clicking, opening, booting

14. Trojan Horse Trojan Horse Like the historic Trojan Horse, it appears to be legitimate software - enemy hiding inside Games, videos, screen saver, file sharing etc. When opened the destructive code is loosed onto the computer

15. Worms Worms Takes advantage of holes in security in applications and operating systems Automatically replicates itself-needs no triggers by computer user Looks for network or Internet connection so it can move to another system

16. Rootkits Rootkits It hides the tracks of intruders so antivirus software cannot detect them Can incorporate itself with other malicious code to take complete control of a system Usually do not replicate themselves

17. Buffer Overflow Buffer Overflow Too much data that is sent to the memory buffer that is causes it to go beyond its fixed boundary Results is overwriting data in adjacent memory locations Can result from vulnerabilities or flaws in software Causes service disruption and lost data Currently no way to check and stop the requests

18. Spoofing Spoofing Program or person pretending to be something or someone they are not to send false information Data appears to be coming from somewhere other than its original place Makes modifications in addresses, IP headers or other source of information Often works with phishing

19. Botnets and their Zombies Botnets and their Zombies Bot - like a robot - remotely controlled by IM (Instant Messaging) or IRC (Internet Relay Chat) Performs automated tasks Botnet is a group of bots that run automatically Goal is to take over as many systems as possib le Zombies - assembled botnets of individual compromised computer that are remotely controlled Look on the Internet for more hosts to infect Launch DDoS (distributed denial of service) attacks Can shut down a server