Cyber Security – Virus and the Internet

15
1 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet By By Adedayo O.S Adedayo O.S A paper delivered during the General Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008 at the Conference Room

Transcript of Cyber Security – Virus and the Internet

11Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Cyber Security – Virus and the Internet

ByBy

Adedayo O.S Adedayo O.S

A paper delivered during the General Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008 at the Conference Room

INTRODUCTIONINTRODUCTION

2213/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Spyware, adware, and viruses can not Spyware, adware, and viruses can not only threaten your privacy, they can only threaten your privacy, they can reduce your computer's performance and reduce your computer's performance and even disable your computer. Many even disable your computer. Many computer users have replaced their computer users have replaced their computers believing the computer is not computers believing the computer is not performing well enough when they really performing well enough when they really need to remove the malware from their need to remove the malware from their systems to get that "like new" systems to get that "like new" performance. performance.

INTRODUCTION cont.INTRODUCTION cont.

3313/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

You can prevent and cure the problem of You can prevent and cure the problem of adware, spyware, viruses and other adware, spyware, viruses and other hostile software by learning basic hostile software by learning basic preventative measures and learning how preventative measures and learning how to take precautionary steps to protect your to take precautionary steps to protect your computer when removing hostile software. computer when removing hostile software.

Virus SourcesVirus Sources

4413/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

1.1. Simply visiting a compromised Web site can Simply visiting a compromised Web site can cause infection if certain browsercause infection if certain browser vulnerabilities vulnerabilities are not patched.are not patched.

2.2. Indiscriminate downloading of software from Indiscriminate downloading of software from InternetInternet..

3.3. Over liberality with visitors. That is in Over liberality with visitors. That is in the the use of use of your Internet facility and in use of foreignyour Internet facility and in use of foreign storage mediastorage media..

4.4. Through e-mail both from friends and strangers Through e-mail both from friends and strangers (as attachments).(as attachments).

5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.

CHARACTERISTICSCHARACTERISTICS

5513/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

MALWARE AND SPYWARESMALWARE AND SPYWARES 1. 1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).2.2. They use up memory and often bring the system to a They use up memory and often bring the system to a

halt. This can be noticed initiallyhalt. This can be noticed initially by the considerable by the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc)..

3.3. Viruses are capable of transmitting themselves across Viruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems.

44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.5.5. They usually fulfil whatever their designer(s) had in They usually fulfil whatever their designer(s) had in

mind when mind when produced. E.gproduced. E.g deletion, theft, truncation, deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc. etc.

Adware, Spyware, and Virus Adware, Spyware, and Virus PreventionPrevention

6613/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Malware prevention requires all computer Malware prevention requires all computer users to educate themselvesusers to educate themselves

Make some system configuration changesMake some system configuration changes

Operate malware prevention programsOperate malware prevention programs

Avoid spamAvoid spam

Utilize basic computer security measuresUtilize basic computer security measures

System Configuration System Configuration ChangesChanges

7713/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Using an browser other than Internet Using an browser other than Internet Explorer when surfing the internet.Explorer when surfing the internet.

Changing your Internet Explorer settings Changing your Internet Explorer settings to make the browser less vulnerable to to make the browser less vulnerable to being compromised if an attack occurs.being compromised if an attack occurs.

Changing your system to show file Changing your system to show file extensions for known file names which is extensions for known file names which is contrary to Microsoft's default setting. contrary to Microsoft's default setting.

Operate Malware Prevention Operate Malware Prevention ProgramsPrograms

8813/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Please run at anti-virus/spyware/adware Please run at anti-virus/spyware/adware product on your computer.product on your computer.

Please also use a personal firewall on your Please also use a personal firewall on your computer which will prevent internet worms computer which will prevent internet worms attack and adware or spyware from attack and adware or spyware from contacting their creators or downloading contacting their creators or downloading other nasty programs without permission from other nasty programs without permission from you. you.

Avoid SpamAvoid Spam

9913/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

It is wise to avoid spam since it can It is wise to avoid spam since it can contain malware which may use contain malware which may use vulnerabilities in your email program, vulnerabilities in your email program, default web browser, or other programs to default web browser, or other programs to infect your computer. So you should guard infect your computer. So you should guard your email address carefully and possibly your email address carefully and possibly run spam management or spam run spam management or spam prevention software. prevention software.

Application for protectionApplication for protection

101013/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Application for protectionApplication for protection

111113/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Internet Best PracticesInternet Best Practices

121213/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

Reduce the risk of viruses. Use of anti-virus software Reduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current.Never open suspicious e-mail messages or file Never open suspicious e-mail messages or file attachmentsattachmentsUse Windows Security Centre to manage your Use Windows Security Centre to manage your settings. Adjust to the level of protection you are settings. Adjust to the level of protection you are comfortable with. comfortable with. Download internet files from trusted sources only and Download internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner.Use a firewall, Install a Microsoft Internet Connection Use a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outside firewall as a basic line of defence against outside intruders. intruders. Use strong passwords that are at least eight Use strong passwords that are at least eight characters long and a combination of lower and upper characters long and a combination of lower and upper case letters, numbers and symbols. case letters, numbers and symbols.

Block Pop-upsBlock Pop-ups

131313/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

How to download CorrectlyHow to download Correctly

141413/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet

THANK YOU SIRTHANK YOU SIR

151513/02/1513/02/15 Cyber Security – Virus and the Internet Cyber Security – Virus and the Internet