SlideShare a Scribd company logo
Internet Security
Where do trojan viruses get their name from? Trojans tend to make users believe they are making a decision with a positive effect, but are misleading with this information just as the Trojans did with their horse.
 
What can Trojans do? Files that allow others to view others personal data. Trojans are also capable of erasing files from hard drives and even temporarily shutting down operations that normally occur with your computer.
Worms Worms are destructive programs that replicate itself many times. Worms can replicate themselves up to hundreds of times on a single node.
Worms also modify files, including registry files and files that are key for Windows to run. They also eat up your bandwidth which would make your internet speed slower.
Spyware & Adware Spyware secretly places itself on your computer and views transactions that are made on websites. Adware often appears as an advertisement and inevitably is harmful to the user. Spyware and adware both cause a great risk dealing with credit card fraud and identification theft.
Where can you find any of these malicious programs? Rogue websites P2P (person to person) connections Email box from random users
Solutions to these Problems? Virus Scanners Firewalls Antivirus Programs
Virus Scanners Virus scanners locate worms, Trojans, and other malicious programs and delete them. Virus scanners tend to locate these files by looking for patterns for certain byte strings.
Firewalls Work as a “wall” to your internet ports not allowing anything to come in without the users permission. Firewalls filter in everything that is being downloaded onto the computer online.
Antivirus Programs The most effective way to keep your personal computer cleansed of viruses Introduced in the early nineties and have been improving these programs since then.
Norton & AVG Two very popular antivirus programs
There are many evils lurking on the internet to corrupt your computer or even worse, steal your identity, credit card numbers, and even your social security number. Browsing the internet is a fun past-time, but needs to be done with caution. This antivirus software as well as being safe and smart with the internet will keep your computer running correctly.
Works Cited / References Brown, Marshall. “How Computer Viruses Work.”  <http://www.howstuffworks.com/virus.htm Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, 2002. <http://www.sciam.com/article.cfm?id=how-does-a-computer-virus&topicID=5>. Tyson, Jeff. “How Firewalls Work.” <http://computer.howstuffworks.com/firewall.htm>. Vilbert, Robert. “How a Virus Scanner Works. <http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci788685,00.html>. “ Spyware Information.” 2008 <http://www.spyware-information.com/\.>.
Christopher Rodgers Soundtrack: The Rolling Stones – Gimme Shelter
Ad

More Related Content

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
EVOLUTION OF INTERNET
EVOLUTION OF INTERNETEVOLUTION OF INTERNET
EVOLUTION OF INTERNET
aliyatabassumshaik
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
Nimisha Walecha
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
Gerard Sylvester
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
Nitesh Dubey
 
Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
Amandeep Kaur
 

Similar to Internet Security (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Antivirus 7
Antivirus 7Antivirus 7
Antivirus 7
gallegaspar
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Information security
Information securityInformation security
Information security
JAMEEL AHMED KHOSO
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
marwanmohammed_
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Ad

Recently uploaded (20)

Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Ad

Internet Security

  • 2. Where do trojan viruses get their name from? Trojans tend to make users believe they are making a decision with a positive effect, but are misleading with this information just as the Trojans did with their horse.
  • 3.  
  • 4. What can Trojans do? Files that allow others to view others personal data. Trojans are also capable of erasing files from hard drives and even temporarily shutting down operations that normally occur with your computer.
  • 5. Worms Worms are destructive programs that replicate itself many times. Worms can replicate themselves up to hundreds of times on a single node.
  • 6. Worms also modify files, including registry files and files that are key for Windows to run. They also eat up your bandwidth which would make your internet speed slower.
  • 7. Spyware & Adware Spyware secretly places itself on your computer and views transactions that are made on websites. Adware often appears as an advertisement and inevitably is harmful to the user. Spyware and adware both cause a great risk dealing with credit card fraud and identification theft.
  • 8. Where can you find any of these malicious programs? Rogue websites P2P (person to person) connections Email box from random users
  • 9. Solutions to these Problems? Virus Scanners Firewalls Antivirus Programs
  • 10. Virus Scanners Virus scanners locate worms, Trojans, and other malicious programs and delete them. Virus scanners tend to locate these files by looking for patterns for certain byte strings.
  • 11. Firewalls Work as a “wall” to your internet ports not allowing anything to come in without the users permission. Firewalls filter in everything that is being downloaded onto the computer online.
  • 12. Antivirus Programs The most effective way to keep your personal computer cleansed of viruses Introduced in the early nineties and have been improving these programs since then.
  • 13. Norton & AVG Two very popular antivirus programs
  • 14. There are many evils lurking on the internet to corrupt your computer or even worse, steal your identity, credit card numbers, and even your social security number. Browsing the internet is a fun past-time, but needs to be done with caution. This antivirus software as well as being safe and smart with the internet will keep your computer running correctly.
  • 15. Works Cited / References Brown, Marshall. “How Computer Viruses Work.” <http://www.howstuffworks.com/virus.htm Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, 2002. <http://www.sciam.com/article.cfm?id=how-does-a-computer-virus&topicID=5>. Tyson, Jeff. “How Firewalls Work.” <http://computer.howstuffworks.com/firewall.htm>. Vilbert, Robert. “How a Virus Scanner Works. <http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci788685,00.html>. “ Spyware Information.” 2008 <http://www.spyware-information.com/\.>.
  • 16. Christopher Rodgers Soundtrack: The Rolling Stones – Gimme Shelter