Internet Security

Report
Internet Security
How to be “Reasonably Safe” on the
Internet
The following slides are an
explanation of the terminology used
in the antivirus and antimalware
definitions
Virus

A computer virus is a computer program that
can replicate itself and spread from one
computer to another.
Worms

A computer worm is a self-replicating
malware computer program, which uses a
computer network to send copies of itself to
other nodes (computers on the network) and it
may do so without any user intervention.
Trojan

A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user prior to run or install, but (perhaps in
addition to the expected function) steals
information or harms the system.
Keylogger

Keystroke logging (often called keylogging)
is the action of tracking (or logging) the keys
struck on a keyboard, typically in a covert
manner so that the person using the keyboard
is unaware that their actions are being
monitored.
Phishing

Phishing is a way of attempting to acquire
information such as usernames, passwords,
and credit card details by masquerading as a
trustworthy entity in an electronic
communication
Adware

Adware, or advertising-supported software,
is any software package which automatically
plays, displays, or downloads advertisements
to a computer. These advertisements can be in
the form of a pop-up.
Spam

Spam is the use of electronic messaging
systems (including most broadcast media,
digital delivery systems) to send unsolicited
bulk messages indiscriminately.
Root Kit
A rootkit is software that enables
continued privileged access to a
computer while actively hiding its
presence from administrators by
subverting standard operating system
functionality or other applications.
What can you do about all of these

1. Have a good anti-virus with currently
updated virus signatures and scan regularly.

2. Have several spyware removal programs
and scan frequently.

3. Have a good firewall (either hardware or
software preferably both).
Online Virus Scanners

House Call (housecall.trendmicro.com)

Bitdefender (www.bitdefender.com/scanner/online)
Kaspersky (www.kaspersky.com/virusscanner)
Symantec (security.symantec.com)
Eset (eset.com/us/online-scanner)
McAfee (home.mcafee.com/Downloads/FreeScan.aspx)
Also there are others





Antivirus Programs







Avg
Avast
Microsoft Security Essentials
Symantec Antivirus
McAfee Antivirus
Kaspersky Antivirus
And many others
Free versus Paid Programs


All free programs offer fairly good protection
Paid versions offer more protection
Free Antivirus Programs




Protection is very basic
Do not have the in-depth scanning as the paid ones
Do not have as many active scanning modules
Malware protection very basic
Paid Antivirus

More robust antivirus scanning
More active scanning modules
More antimalware scanning prevention

In general are more protective than the free versions


Antimalware Programs






Malwarebytes Antimalware
Super antispyware
Spyware blaster
BoClean
Emsisoft Antimalware
And some others
Antimalware Programs Free vs Paid

Free versions usually have to be updated and
scanned manually.

Paid versions have automatic updating,
scanning on schedule, and finally have active
scanning modules running.
Internet Searching

Programs are available to keep you reasonably
safe doing a search on the internet.

Remember that nothing is ever really safe on
the Internet.
Internet Site Scanners





Safe Search (Google)
Site Advisor (McAfee)
WOT (MyWot)
Link Scanner (AVG)
And Others
Firewalls






Symantec
McAfee
Zone alarm
Kaspersky
Trend Micro
Windows
Firewall Recommendation




You can use the built-in Windows firewall
You can use free or paid firewalls
You can use only one firewall at a time
You can use a hardware firewall such as a
router.
Summing Up

You can have all of the best Internet Security
that is available but all of that is useless if the
following is in place
PEBKAC
Problem
Exists
Between
Keyboard
And
Chair

similar documents