Computer Threats: Major Types and Risks
Be aware of various computer threats like viruses, worms, Trojans, ransomware, and the infamous Conficker worm that can cause significant damage and chaos. Stay vigilant against cyber tricks and warning signs such as spam emails, fake websites, and the importance of maintaining up-to-date antivirus protection.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
COMPUTER THREATS WATCH OUT!
MAJOR TYPES OF THREATS WHAT IS LURKING IN YOUR COMPUTER? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png VIRUSES - DAMAGE COMPUTERS WORMS - SPREAD, CLOG, RUIN YOUR SECURITY TROJANS - DISGUISED, TAKES THINGS BOTS RECRUITS YOUR COMPUTER INTO A REMOTE CONTROLLED CRIMINAL NETWORK C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png
RANSOMWARE INFECTS YOUR DEVICE AND ENCRYPTS YOUR DATA THEN IT DEMANDS MONEY TO RETURN YOUR FILES! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png CYBER TRICKS
THE INTERNET IS INFECTED STORY FROM 60 MINUTES ABOUT THE CONFLICKER WORM. IT STARTED TO SPREAD IN THE FALL OF 2009. PEOPLE WORRIED THAT THE WORM WOULD TRIGGER INSTRUCTIONS THAT WOULD STEAL AND DESTROY. STILL ONE OF TOP 10 VIRUSES TO DATE and IN 500,000 COMPUTERS TODAY! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png
CONFLICKR STILL LIVES! THE WORM SPREAD RAPIDLY BY NETWORK SHARES AND USB STICKS, AND AT ITS HEIGHT HAD INFECTED SOMEWHERE AROUND 11 MILLION DEVICES. THE WORM CAUSED CHAOS: IT COST ONE UK AUTHORITY 1.4M TO RECOVER FROM A CONFICKER INFECTION IN 2009, FRENCH FIGHTER PLANES WERE GROUNDED BECAUSE OF THE WORM, AND ONE ESTIMATE PUT THE GLOBAL ECONOMIC COST OF THE CLEAR-UP AT MORE THAN $9BN.
CONFLICKR ALL AROUND IT WASN'T JUST PCS THAT WERE BEING INFECTED. Paul Vixie, CEO of Farsight Security and part of the team that fought against the Conflicker worm, remembers one security expert who phoned a hospital which had a Conflicker infection, to help them identify which machines were affected. One device turned out to be a portable x-ray machine in an operating theatre!
WARNING SIGNS? SPAM EMAILS: WATCH OUT FOR GOOD DEALS DON T LOWER YOUR GUARD FAKE WEBSITES THAT PHISH YOU STEAL YOUR CREDIT & PERSONAL INFORMATION FAKE WEBSITES APPEAR ON SEARCH ENGINES OFFICIAL SITES CAN BECOME INFECTED TOO KEEP ANTI-VIRUS PROTECTION CURRENT C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png
WIFI HOT SPOTS & OTHER WOES C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png LOGGING -ON AT PUBLIC PLACES? WHAT CAN HAPPEN WHEN YOU DO? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png JUST A WALK IN THE PARK! DRONES CAN HACK YOUR PHONES TOO !!! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png
CALL A VIRUS? ANY DEVICE CONNECTED TO THE INTERNET OR A COMPUTER . IS AT RISK EVEN YOUR PHONE! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png
WHAT IS PHISING? HOW MANY WAYS CAN YOU BE PHISHED-IN ? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png
IS THE INTERNET IN TROUBLE? WHO S RESPONSIBILITY IS IT TO PROTECT YOUR COMPUTER? Anti-virus up to date Use a SPAM Filter Update your Operating System and browser Automatically Choose complex passwords & change them often Guard personal Data & Passwords Don t click unfamiliar & suspicious links Don t use open Wi-Fi networks for personal stuff Use privacy and safety settings on social networks Back Up Back Up Back Up C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png
IS THE INTERNET IN TROUBLE? WHO S RESPONSIBILITY IS IT TO PROTECT YOUR COMPUTER? HOW TO RECOGNIZE SAFE WEBSITES
TOXIC SOFTWARE WHAT SURPRISED YOU MOST? THE NUMBER OF INFECTIONS? THE EASE OF INFECTION? THE LEVEL OF INVASION? THE NUMBER OF INFECTIONS? THE NUMBER OF WAYS YOU CAN GET INFECTED? THAT HACKING IS A BUSINESS THAT ADVERTISES? WHAT ARE THE NEWEST DEVICES TO NEED PROTECTION?