You are on page 1of 17

 To inform the user on the most

critical threat to our computing


environment and the actions
individuals must take to safeguard
against those threats
Viruses and its relatives and cousins

• trojans, adware, malware, spyware, etc
Email related threats
Social Engineering
Data breach and leakage
Computer virus - is a computer
program that can copy itself and
infect a computer. The term "virus" is
also commonly but erroneously used
to refer to other types of malware,
adware, and spyware programs that
do not have the reproductive ability.
 First computer virus named “Rother J” was written in
1981 . . . That’s history  . . .
isnon-self-replicating malware that
appears to perform a desirable
function for the user but instead
facilitates unauthorized access to the
user's computer system. The term is
derived from the Trojan Horse story in
Greek mythology
 Adware, or advertising-
supported software, is any
software package which
automatically plays,
displays, or downloads
advertisements to a
computer after the software
is installed on it or while the
application is being used.
Some types of adware are
also spyware and can be
classified as privacy-invasive
software.
 Malware, short for malicious
software, is software
designed to infiltrate a
computer system without
the owner's informed
consent. The expression is a
general term used by
computer professionals to
mean a variety of forms of
hostile, intrusive, or
annoying software or
program code. The term
"computer virus" is
sometimes used as a catch-
all phrase to include all
types of malware, including
true viruses.
 Spyware is a type of malware
that is installed on computers
and collects little bits of
information at a time about users
without their knowledge. The
presence of spyware is typically
hidden from the user, and can be
difficult to detect. Typically,
spyware is secretly installed on
the user's personal computer.
Sometimes, however, spywares
such as keyloggers are installed
by the owner of a shared,
corporate, or public computer on
purpose in order to secretly
monitor other users.
Spam
Malicious attachments
Phishing
isthe act of manipulating people into
performing actions or divulging
confidential information, rather than
by breaking in or using technical
hacking techniques (essentially a
fancier, more technical way of lying).
Hacking humans.

Examples
User Awareness
Vulnerability and patch management
• Windows update
• Service packs
Check email attachments with
suspicious malicious content.
Think before you click specially on
unfamiliar sites and email links
Always lock computer when not in use
Shred unused printed documents

Use strong password


• Must be 8 to 10 characters in length and contains
alpha numeric and special characters
• Example – 1 Like 2 sip soda on my bag –
1L2ssomb*
http://free.avg.com/us-en/homepage
http://www.clamwin.com/
http://www.avast.com/free-antivirus-down
http://www.free-av.com/

Note : Non free anti virus has more


features and functionality
Think before you click . . .
Chito C. Relampagos
MCP, MCSA, Network+, Security+
IT Consultant
chitorelampagos@gmail.com

You might also like