Computer Threats: Major Types and Risks

 
COMPUTER THREATS
COMPUTER THREATS
 
WATCH OUT!
 
MAJOR TYPES OF THREATS
 
 
VIRUSES
 
-
 
DAMAGE COMPUTERS
WORMS 
- 
SPREAD, CLOG,
                          RUIN YOUR SECURITY
TROJANS
 - 
DISGUISED
, 
TAKES THINGS
BOTS –
 
RECRUITS YOUR COMPUTER INTO A
 
REMOTE CONTROLLED CRIMINAL
 
NETWORK
 
 
 
 
WHAT IS LURKING IN YOUR COMPUTER?
 
INFECTS YOUR DEVICE AND
ENCRYPTS YOUR DATA
 
THEN IT DEMANDS MONEY
TO RETURN YOUR FILES!
 
RANSOMWARE
 
CYBER TRICKS
 
 
 
THE INTERNET IS INFECTED
 
    
STORY FROM 60 MINUTES ABOUT THE
CONFLICKER WORM.
 
IT STARTED TO SPREAD IN THE FALL OF
2009.  PEOPLE WORRIED THAT THE
WORM WOULD TRIGGER INSTRUCTIONS
THAT WOULD STEAL AND DESTROY.
STILL ONE OF TOP 10 VIRUSES TO DATE
and IN 500,000 COMPUTERS TODAY!
 
CONFLICKR STILL LIVES!
 
 
THE WORM SPREAD RAPIDLY BY NETWORK
SHARES AND USB STICKS, AND AT ITS HEIGHT HAD
INFECTED SOMEWHERE AROUND 11 MILLION
DEVICES
.
 
 
THE WORM CAUSED CHAOS: IT COST ONE UK
AUTHORITY £1.4M TO RECOVER FROM A CONFICKER
INFECTION IN 2009, FRENCH FIGHTER PLANES WERE
GROUNDED BECAUSE OF THE WORM,
AND ONE ESTIMATE PUT THE GLOBAL
ECONOMIC COST OF THE
CLEAR-UP AT MORE THAN $9BN.
 
CONFLICKR ALL AROUND
 
 
IT WASN'T JUST PCS THAT WERE BEING
INFECTED. Paul Vixie, CEO of Farsight Security
and part of the team that fought against the
Conflicker worm, remembers one security
expert who phoned a hospital which had a
Conflicker infection, to help them identify which
machines were affected. One device turned out
to be a portable x-ray machine in an operating
theatre!
 
WARNING SIGNS?
 
SPAM EMAILS: WATCH OUT FOR “GOOD
DEALS” – DON’T LOWER YOUR GUARD
FAKE WEBSITES – THAT PHISH YOU – STEAL
YOUR CREDIT  & PERSONAL INFORMATION
FAKE WEBSITES APPEAR ON SEARCH ENGINES
OFFICIAL SITES CAN BECOME INFECTED TOO
KEEP ANTI-VIRUS PROTECTION
    CURRENT
 
 
WIFI HOT SPOTS & OTHER WOES
 
 
LOGGING -ON AT PUBLIC PLACES?
WHAT CAN HAPPEN WHEN YOU DO?
 
DRONES CAN HACK
YOUR PHONES TOO !!!
 
 
JUST A WALK IN THE PARK!
 
CALL A VIRUS?
 
 
ANY DEVICE CONNECTED TO THE
INTERNET OR A COMPUTER ….
    IS AT RISK
EVEN YOUR PHONE!
 
WHAT IS PHISING?
 
 
 
HOW MANY WAYS CAN YOU BE
“PHISHED-IN”?
 
IS THE INTERNET IN TROUBLE?
 
WHO’S RESPONSIBILITY IS IT TO PROTECT YOUR
COMPUTER?
Anti-virus up to date – Use a SPAM Filter
Update your Operating System and browser
Automatically
Choose complex passwords & change them often
Guard personal Data & Passwords
Don’t click unfamiliar & suspicious links
Don’t use open Wi-Fi networks for personal stuff
Use privacy and safety settings on social networks
Back Up – Back Up – Back Up
 
IS THE INTERNET IN TROUBLE?
 
WHO’S RESPONSIBILITY IS IT TO PROTECT
YOUR COMPUTER?
 
 
HOW TO RECOGNIZE SAFE
WEBSITES
 
TOXIC SOFTWARE
 
 
WHAT SURPRISED YOU MOST?
 
THE NUMBER OF INFECTIONS?
THE EASE OF INFECTION?
THE LEVEL OF INVASION?
THE NUMBER OF INFECTIONS?
THE NUMBER OF WAYS YOU CAN GET INFECTED?
THAT HACKING IS A BUSINESS THAT ADVERTISES?
WHAT ARE THE NEWEST DEVICES TO NEED
PROTECTION?
 
 
Slide Note
Embed
Share

Be aware of various computer threats like viruses, worms, Trojans, ransomware, and the infamous Conficker worm that can cause significant damage and chaos. Stay vigilant against cyber tricks and warning signs such as spam emails, fake websites, and the importance of maintaining up-to-date antivirus protection.

  • Computer Threats
  • Cybersecurity
  • Virus Protection
  • Ransomware
  • Warning Signs

Uploaded on Feb 17, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. COMPUTER THREATS WATCH OUT!

  2. MAJOR TYPES OF THREATS WHAT IS LURKING IN YOUR COMPUTER? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png VIRUSES - DAMAGE COMPUTERS WORMS - SPREAD, CLOG, RUIN YOUR SECURITY TROJANS - DISGUISED, TAKES THINGS BOTS RECRUITS YOUR COMPUTER INTO A REMOTE CONTROLLED CRIMINAL NETWORK C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png

  3. RANSOMWARE INFECTS YOUR DEVICE AND ENCRYPTS YOUR DATA THEN IT DEMANDS MONEY TO RETURN YOUR FILES! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png CYBER TRICKS

  4. THE INTERNET IS INFECTED STORY FROM 60 MINUTES ABOUT THE CONFLICKER WORM. IT STARTED TO SPREAD IN THE FALL OF 2009. PEOPLE WORRIED THAT THE WORM WOULD TRIGGER INSTRUCTIONS THAT WOULD STEAL AND DESTROY. STILL ONE OF TOP 10 VIRUSES TO DATE and IN 500,000 COMPUTERS TODAY! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png

  5. CONFLICKR STILL LIVES! THE WORM SPREAD RAPIDLY BY NETWORK SHARES AND USB STICKS, AND AT ITS HEIGHT HAD INFECTED SOMEWHERE AROUND 11 MILLION DEVICES. THE WORM CAUSED CHAOS: IT COST ONE UK AUTHORITY 1.4M TO RECOVER FROM A CONFICKER INFECTION IN 2009, FRENCH FIGHTER PLANES WERE GROUNDED BECAUSE OF THE WORM, AND ONE ESTIMATE PUT THE GLOBAL ECONOMIC COST OF THE CLEAR-UP AT MORE THAN $9BN.

  6. CONFLICKR ALL AROUND IT WASN'T JUST PCS THAT WERE BEING INFECTED. Paul Vixie, CEO of Farsight Security and part of the team that fought against the Conflicker worm, remembers one security expert who phoned a hospital which had a Conflicker infection, to help them identify which machines were affected. One device turned out to be a portable x-ray machine in an operating theatre!

  7. WARNING SIGNS? SPAM EMAILS: WATCH OUT FOR GOOD DEALS DON T LOWER YOUR GUARD FAKE WEBSITES THAT PHISH YOU STEAL YOUR CREDIT & PERSONAL INFORMATION FAKE WEBSITES APPEAR ON SEARCH ENGINES OFFICIAL SITES CAN BECOME INFECTED TOO KEEP ANTI-VIRUS PROTECTION CURRENT C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png

  8. WIFI HOT SPOTS & OTHER WOES C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png LOGGING -ON AT PUBLIC PLACES? WHAT CAN HAPPEN WHEN YOU DO? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png JUST A WALK IN THE PARK! DRONES CAN HACK YOUR PHONES TOO !!! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png

  9. CALL A VIRUS? ANY DEVICE CONNECTED TO THE INTERNET OR A COMPUTER . IS AT RISK EVEN YOUR PHONE! C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\OH7JS0TM\MC900434778[1].png

  10. WHAT IS PHISING? HOW MANY WAYS CAN YOU BE PHISHED-IN ? C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png

  11. IS THE INTERNET IN TROUBLE? WHO S RESPONSIBILITY IS IT TO PROTECT YOUR COMPUTER? Anti-virus up to date Use a SPAM Filter Update your Operating System and browser Automatically Choose complex passwords & change them often Guard personal Data & Passwords Don t click unfamiliar & suspicious links Don t use open Wi-Fi networks for personal stuff Use privacy and safety settings on social networks Back Up Back Up Back Up C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\L8EFOPT7\MC900434778[1].png

  12. IS THE INTERNET IN TROUBLE? WHO S RESPONSIBILITY IS IT TO PROTECT YOUR COMPUTER? HOW TO RECOGNIZE SAFE WEBSITES

  13. TOXIC SOFTWARE WHAT SURPRISED YOU MOST? THE NUMBER OF INFECTIONS? THE EASE OF INFECTION? THE LEVEL OF INVASION? THE NUMBER OF INFECTIONS? THE NUMBER OF WAYS YOU CAN GET INFECTED? THAT HACKING IS A BUSINESS THAT ADVERTISES? WHAT ARE THE NEWEST DEVICES TO NEED PROTECTION?

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#