Top Banner
Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
43

Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Dec 24, 2015

Download

Documents

Sabrina Leonard
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Web Page Design and Development IStandards

Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and options in

dealing with virus attacks.

Page 2: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 3: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Malware

• Malware is short for “malicious software.” • Malware could be computer viruses, worms,

Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below.

Page 4: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 5: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

ADWARE• Adware:. The least dangerous and most

lucrative Malware. Adware displays ads on your computer.

Page 7: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

SPYWARE

• Spyware: Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.

Page 8: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 9: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Virus

• Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.

• Computer virus: A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers.

Page 11: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Worm

• Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every contact in your email address book and then send itself to all the contacts in your contacts’ address books.

Page 12: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 13: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

TROJAN

• Trojan: Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.

Page 14: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 15: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

ROOTKIT

• Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on.

Page 16: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 17: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

BACKDOORS

• Backdoors: Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent.

Page 18: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 19: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

KEYLOGGERS

• Keyloggers: Records everything you type on your PC in order to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information.

Page 20: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 21: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

ROGUE SECURITY SOFTWARE

• Rogue security software: This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010

Page 22: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 23: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

RANSOMWARE

• Ransomware: If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake.

Page 24: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 25: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Browser Hijacker

• Browser Hijacker: When your homepage changes to one that looks like those in the images inserted next, you may have been infected with one form or another of a Browser Hijacker. This dangerous Malware will redirect your normal search activity and give you the results the developers want you to see. Its intention is to make money off your web surfing. Using this homepage and not removing the Malware lets the source developers capture your surfing interests. This is especially dangerous when banking or shopping online. These homepages can look harmless, but in every case they allow other more infectious

Page 26: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 27: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

BOTNET

• Botnet: A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as a “zombie“ computer. The botnet is under the command of a “bot herder” or a “bot master,” usually to perform nefarious activities. This could include distributing spam to the email contact addresses on each zombie computer, for example. If the botnet is sufficiently big in number, it could be used to access a targeted website simultaneously in what’s known as a denial-of-service (DoS) attack.

Page 28: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 29: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

SPAM

• Spam: Spam in the security context is primarily used to describe email spam —unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server. Unwanted junk mail advertising items you don’t care for is harmless, relatively speaking. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer.

Page 30: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.
Page 31: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

PHISHING

• Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to verify your account information and password details.

Page 32: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

10 ways to avoid viruses and spyware

Page 33: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

10 ways to avoid viruses and spyware

1: Install quality antivirus• Many computer users believe free antivirus applications, such as

those included with an Internet service provider's bundled service offering, are sufficient to protect a computer from virus or spyware infection. However, such free anti-malware programs typically don't provide adequate protection from the ever-growing list of threats.

• Instead, all Windows users should install professional, business-grade antivirus software on their PCs. Pro-grade antivirus programs update more frequently throughout the day (thereby providing timely protection against fast-emerging vulnerabilities), protect against a wider range of threats (such as rootkits), and enable additional protective features (such as custom scans).

Page 34: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

2. Install real-time anti-spyware protection• Many computer users mistakenly believe that a single antivirus

program with integrated spyware protection provides sufficient safeguards from adware and spyware. Others think free anti-spyware applications, combined with an antivirus utility, deliver capable protection from the skyrocketing number of spyware threats.

• Unfortunately, that's just not the case. Most free anti-spyware programs do not provide real-time, or active, protection from adware, Trojan, and other spyware infections. While many free programs can detect spyware threats once they've infected a system, typically professional (or fully paid and licensed) anti-spyware programs are required to prevent infections and fully remove those infections already present.

Page 35: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

3. Keep anti-malware applications current• Antivirus and anti-spyware programs require regular signature and

database updates. Without these critical updates, anti-malware programs are unable to protect PCs from the latest threats.

• In early 2009, antivirus provider AVG released statistics revealing that a lot of serious computer threats are secretive and fast-moving. Many of these infections are short-lived, but they're estimated to infect as many as 100,000 to 300,000 new Web sites a day.

• Computer users must keep their antivirus and anti-spyware applications up to date. All Windows users must take measures to prevent license expiration, thereby ensuring that their anti-malware programs stay current and continue providing protection against the most recent threats. Those threats now spread with alarming speed, thanks to the popularity of such social media sites as Twitter, Facebook, and My Space.

Page 36: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

4. Perform daily scans• Occasionally, virus and spyware threats escape a system's active

protective engines and infect a system. The sheer number and volume of potential and new threats make it inevitable that particularly inventive infections will outsmart security software. In other cases, users may inadvertently instruct anti-malware software to allow a virus or spyware program to run.

• Regardless of the infection source, enabling complete, daily scans of a system's entire hard drive adds another layer of protection. These daily scans can be invaluable in detecting, isolating, and removing infections that initially escape security software's attention.

Page 37: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

5. Disable autorun• Many viruses work by attaching themselves to a drive and

automatically installing themselves on any other media connected to the system. As a result, connecting any network drives, external hard disks, or even thumb drives to a system can result in the automatic propagation of such threats.

• Computer users can disable the Windows autorun feature by following Microsoft's recommendations, which differ by operating system. Microsoft Knowledge Base articles 967715 and 967940 are frequently referenced for this purpose.

Page 38: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

6. Disable image previews in Outlook• Simply receiving an infected Outlook e-mail message, one in

which graphics code is used to enable the virus' execution, can result in a virus infection. Prevent against automatic infection by disabling image previews in Outlook.

• By default, newer versions of Microsoft Outlook do not automatically display images. But if you or another user has changed the default security settings, you can switch them back (using Outlook 2007) by going to Tools | Trust Center, highlighting the Automatic Download option, and selecting Don't Download Pictures Automatically In HTML E-Mail Messages Or RSS.

Page 39: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

7. Don't click on email links or attachments• It's a mantra most every Windows user has heard repeatedly: Don't

click on email links or attachments. Yet users frequently fail to heed the warning.

• Whether distracted, trustful of friends or colleagues they know, or simply fooled by a crafty email message, many users forget to be wary of links and attachments included within email messages, regardless of the source. Simply clicking on an email link or attachment can, within minutes, corrupt Windows, infect other machines, and destroy critical data.

• Users should never click on email attachments without at least first scanning them for viruses using a business-class anti-malware application. As for clicking on links, users should access Web sites by opening a browser and manually navigating to the sites in question.

Page 40: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

8. Use a hardware-based firewall• Technology professionals and others argue the benefits of software-

versus hardware-based firewalls. Often, users encounter trouble trying to share printers, access network resources, and perform other tasks when deploying third-party software-based firewalls. As a result, I've seen many cases where firewalls have simply been disabled altogether.

• But a reliable firewall is indispensable, as it protects computers from a wide variety of exploits, malicious network traffic, viruses, worms, and other vulnerabilities. Unfortunately, by itself, the software-based firewall included with Windows isn't sufficient to protect systems from the myriad robotic attacks affecting all Internet-connected systems. For this reason, all PCs connected to the Internet should be secured behind a capable hardware-based firewall.

Page 41: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

Surf smart• Many business-class anti-malware applications include browser plug-ins that help

protect against drive-by infections, phishing attacks (in which pages purport to serve one function when in fact they try to steal personal, financial, or other sensitive information), and similar exploits. Still others provide "link protection," in which Web links are checked against databases of known-bad pages.

• Whenever possible, these preventive features should be deployed and enabled. Unless the plug-ins interfere with normal Web browsing, users should leave them enabled. The same is true for automatic pop-up blockers, such as are included in Internet Explorer 8, Google's toolbar, and other popular browser toolbars.

• Regardless, users should never enter user account, personal, financial, or other sensitive information on any Web page at which they haven't manually arrived. They should instead open a Web browser, enter the address of the page they need to reach, and enter their information that way, instead of clicking on a hyperlink and assuming the link has directed them to the proper URL. Hyperlinks contained within an e-mail message often redirect users to fraudulent, fake, or unauthorized Web sites. By entering Web addresses manually, users can help ensure that they arrive at the actual page they intend.

• But even manual entry isn't foolproof. Hence the justification for step 10: Deploy DNS protection. More on that in a moment.

Page 42: Web Page Design and Development I Standards Standard A Safety and Ethics – 2 Describe the threats to a computer network, methods of avoiding attacks, and.

10. Deploy DNS protection• Internet access introduces a wide variety of security risks. Among the most

disconcerting may be drive-by infections, in which users only need to visit a compromised Web page to infect their own PCs (and potentially begin infecting those of customers, colleagues, and other staff).

• Another worry is Web sites that distribute infected programs, applications, and Trojan files. Still another threat exists in the form of poisoned DNS attacks, whereby a compromised DNS server directs you to an unauthorized Web server. These compromised DNS servers are typically your ISP's systems, which usually translate friendly URLs such as yahoo.com to numeric IP addresses like 69.147.114.224.

• Users can protect themselves from all these threats by changing the way their computers process DNS services. While a computer professional may be required to implement the switch, OpenDNS offers free DNS services to protect users against common phishing, spyware, and other Web-based hazards.