Topic 12 internet security
Transcript of Topic 12 internet security
![Page 1: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/1.jpg)
Spyware & Internet Security
![Page 2: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/2.jpg)
Different Types of Spyware
Spyware Adware Embedded Programs Trojan Horse Browser Hijackers Dialers Malware
![Page 3: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/3.jpg)
Why do people make Spyware?
Profit A challenge Malice Boredom Business
![Page 4: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/4.jpg)
How do I know if I’ve got Spyware?
Computer is running slower than normal Popups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web
![Page 5: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/5.jpg)
What does Spyware look like?
![Page 6: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/6.jpg)
What does Spyware look like?
![Page 7: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/7.jpg)
What does Spyware look like?
![Page 8: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/8.jpg)
What does Spyware look like?
![Page 9: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/9.jpg)
What does Spyware look like?
![Page 10: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/10.jpg)
What does Spyware look like?
![Page 11: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/11.jpg)
What does Spyware look like?
![Page 12: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/12.jpg)
What does Spyware look like?
![Page 13: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/13.jpg)
What does Spyware look like?
![Page 14: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/14.jpg)
What does Spyware look like?
![Page 15: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/15.jpg)
What does Spyware look like?
![Page 16: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/16.jpg)
How do I get rid of Spyware?
Use a legitimate spyware removal program
We suggest Spybot Search and Destroy in combination with Microsoft Antispyware (now called Defender)
Ad-aware is a good program and is free for home use but is no longer free for educational use.
![Page 17: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/17.jpg)
Steps in Spyware Removal
1. Add and Remove Programs Menu2. Reboot3. Run a Spybot Scan4. Reboot5. Run a Microsoft Antispyware Scan6. Reboot7. If still having problems manually remove
registry and startup entries (Do NOT do this yourself)
![Page 18: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/18.jpg)
How do I prevent Spyware?
Be conscious of what you are clicking on/downloading
Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X.
Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.
![Page 19: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/19.jpg)
The Least Wanted List
Weatherbug (GAIN or Claria)Hotbar180 Search AssistantMyWebSearchPopular ScreensaversComet CursorsA Better Internet (Aurora)Kazaa / MorpheusGameSpy ArcadeWhenUSaveNew.NetStarware ToolbarMySearch
Begin2Search180SolutionsZangoCoolWebSearchDyFuCABonzaiBuddyBargainBuddyDashbarGatorWeatherScopeBest Offers NetworkPrecision TimeFunWeb
![Page 20: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/20.jpg)
Phishing
Most commonly an Email stating your account Information needs updating
Watch for URL’s that are numeric or different from the link you clicked on
Best thing to do is to type in the URL and check your account directly without following any links in the Email
Many legitimate emails no longer contain a link (Paypal)
![Page 21: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/21.jpg)
Phishing Examples
![Page 22: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/22.jpg)
Phishing Examples
![Page 23: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/23.jpg)
Phishing Examples
![Page 24: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/24.jpg)
Phishing Examples
![Page 25: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/25.jpg)
Phishing Examples
![Page 26: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/26.jpg)
Phishing Examples
![Page 27: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/27.jpg)
How secure do you need to be?
Be Prudent not Paranoid Did you initiate the action? Why is this free? Is the source trustworthy? When in doubt Google it
![Page 28: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/28.jpg)
Safer Alternatives
Download.com – All programs are adware/spyware free
Freesaver.com – Screensavers from this site are safe DO NOT click on ads
KFOR or News9 Cleansoftware.org
![Page 29: Topic 12 internet security](https://reader033.fdocuments.us/reader033/viewer/2022052602/55a4243d1a28aba9278b487e/html5/thumbnails/29.jpg)
The Bottom Line
It is safe to install these programs: Microsoft AntiSpyware (Defender)Spybot Search & DestroySpywareBlasterSpywareGuard
If you are running a different Spyware program contact your Technology Specialist to make sure it is not a rogue