Internet Security - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Internet Security

Description:

... (www.kaspersky.com/virusscanner) Symantec (security.symantec.com) Eset (eset.com/us/online-scanner) McAfee (home.mcafee.com/Downloads/FreeScan.aspx) ... – PowerPoint PPT presentation

Number of Views:344
Avg rating:3.0/5.0
Slides: 26
Provided by: Carl1218
Category:

less

Transcript and Presenter's Notes

Title: Internet Security


1
Internet Security
  • How to be Reasonably Safe on the Internet

2
The following slides are an explanation of the
terminology used in the antivirus and antimalware
definitions
3
Virus
  • A computer virus is a computer program that can
    replicate itself and spread from one computer to
    another.

4
Worms
  • A computer worm is a self-replicating malware
    computer program, which uses a computer network
    to send copies of itself to other nodes
    (computers on the network) and it may do so
    without any user intervention.

5
Trojan
  • A Trojan horse, or Trojan, is software that
    appears to perform a desirable function for the
    user prior to run or install, but (perhaps in
    addition to the expected function) steals
    information or harms the system.

6
Keylogger
  • Keystroke logging (often called keylogging) is
    the action of tracking (or logging) the keys
    struck on a keyboard, typically in a covert
    manner so that the person using the keyboard is
    unaware that their actions are being monitored.

7
Phishing
  • Phishing is a way of attempting to acquire
    information such as usernames, passwords, and
    credit card details by masquerading as a
    trustworthy entity in an electronic communication

8
Adware
  • Adware, or advertising-supported software, is any
    software package which automatically plays,
    displays, or downloads advertisements to a
    computer. These advertisements can be in the form
    of a pop-up.

9
Spam
  • Spam is the use of electronic messaging systems
    (including most broadcast media, digital delivery
    systems) to send unsolicited bulk messages
    indiscriminately.

10
Root Kit
  • A rootkit is software that enables continued
    privileged access to a computer while actively
    hiding its presence from administrators by
    subverting standard operating system
    functionality or other applications.

11
What can you do about all of these
  • 1. Have a good anti-virus with currently updated
    virus signatures and scan regularly.
  • 2. Have several spyware removal programs and scan
    frequently.
  • 3. Have a good firewall (either hardware or
    software preferably both).

12
Online Virus Scanners
  • House Call (housecall.trendmicro.com)
  • Bitdefender (www.bitdefender.com/scanner/online)
  • Kaspersky (www.kaspersky.com/virusscanner)
  • Symantec (security.symantec.com)
  • Eset (eset.com/us/online-scanner)
  • McAfee (home.mcafee.com/Downloads/FreeScan.aspx)
  • Also there are others

13
Antivirus Programs
  • Avg
  • Avast
  • Microsoft Security Essentials
  • Symantec Antivirus
  • McAfee Antivirus
  • Kaspersky Antivirus
  • And many others

14
Free versus Paid Programs
  • All free programs offer fairly good protection
  • Paid versions offer more protection

15
Free Antivirus Programs
  • Protection is very basic
  • Do not have the in-depth scanning as the paid
    ones
  • Do not have as many active scanning modules
  • Malware protection very basic

16
Paid Antivirus
  • More robust antivirus scanning
  • More active scanning modules
  • More antimalware scanning prevention
  • In general are more protective than the free
    versions

17
Antimalware Programs
  • Malwarebytes Antimalware
  • Super antispyware
  • Spyware blaster
  • BoClean
  • Emsisoft Antimalware
  • And some others

18
Antimalware Programs Free vs Paid
  • Free versions usually have to be updated and
    scanned manually.
  • Paid versions have automatic updating, scanning
    on schedule, and finally have active scanning
    modules running.

19
Internet Searching
  • Programs are available to keep you reasonably
    safe doing a search on the internet.
  • Remember that nothing is ever really safe on the
    Internet.

20
Internet Site Scanners
  • Safe Search (Google)
  • Site Advisor (McAfee)
  • WOT (MyWot)
  • Link Scanner (AVG)
  • And Others

21
Firewalls
  • Symantec
  • McAfee
  • Zone alarm
  • Kaspersky
  • Trend Micro
  • Windows

22
Firewall Recommendation
  • You can use the built-in Windows firewall
  • You can use free or paid firewalls
  • You can use only one firewall at a time
  • You can use a hardware firewall such as a router.

23
Summing Up
  • You can have all of the best Internet Security
    that is available but all of that is useless if
    the following is in place

24
PEBKAC
25
ProblemExistsBetweenKeyboardAndChair
Write a Comment
User Comments (0)
About PowerShow.com