Glenn Goggin Michael Mahony Colm Madden Aidan O Neill - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

Glenn Goggin Michael Mahony Colm Madden Aidan O Neill

Description:

Portmanteau term for all malicious software covers any unwanted program that ... the word is used as a portmanteau term for all malicious programs - those that ... – PowerPoint PPT presentation

Number of Views:54
Avg rating:3.0/5.0
Slides: 33
Provided by: Chea70
Category:

less

Transcript and Presenter's Notes

Title: Glenn Goggin Michael Mahony Colm Madden Aidan O Neill


1
Glenn GogginMichael MahonyColm MaddenAidan O
Neill
2
  • http//bis.ucc.ie/

2
3
Lets .
  • From HTML and look at..

4
Famous Computer Hackers

5
Kevin Mitnick
6
Kevin Mitnick
  • The first hacker to have his face immortalized on
    an FBI "Most Wanted" poster.
  • he is like a snakes venom,a threat at first,
    but once researched became a cure

7
List of convicted computer criminals
  • http//en.wikipedia.org/wiki/List_of_convicted_com
    puter_criminals

8
 Kevin Poulsen
9
 Kevin Poulsen
  • In 1990 Poulsen took over all telephone lines
    going into Los Angeles area radio station
    KIIS-FM, assuring that he would be the 102nd
    caller. Poulsen won a Porsche 944 S2 for his
    efforts.
  • He was caught after a friend commemorated the
    break-ins with snapshots of Poulsen picking locks.

10
Hollywood's take on computer breaches/security
etc
11
Continued
12
(No Transcript)
13
Anyone Know what these mean..?
  • ADWARE
  • FIREWALL
  • HONEYPOT
  • IP ADDRESS
  • MALWARE
  • SPYWARE
  • TROJAN
  • VIRUS
  • WORM

14
Links
  • http//news.bbc.co.uk/2/hi/uk_news/5400052.stmtop
  • http//news.bbc.co.uk/2/hi/in_depth/629/629/603327
    9.stm
  • http//news.bbc.co.uk/2/hi/technology/5414502.stm
  • http//news.bbc.co.uk/2/hi/technology/5414696.stm
  • http//news.bbc.co.uk/2/hi/technology/5407516.stm
  • http//news.bbc.co.uk/2/hi/technology/5414992.stm
  • http//news.bbc.co.uk/2/hi/technology/6047560.stm

15
ADWARE
  • Unwanted programs that, once installed, bombard
    users with unwanted adverts. Often those pushing
    the aware programs get paid for every machine
    they manage to recruit.
  • Some adware poses as fake computer security
    software. Can be very hard to remove.

16
FIREWALL
  • Either a program or a feature built into hardware
    and which sits between a computer and the
    internet. Its job is to filter incoming and
    outbound traffic.
  • Firewalls stop net-borne attacks such as worms
    reaching your PC.

17
HONEYPOT
  • An individual computer or a network of machines
    set up to look like a poorly protected system but
    which records every attempt, successful or
    otherwise, to compromise it.

18
HONEYTrap Diagram
19
IP ADDRESS
  • The numerical identifier that every machine
    attached to the internet needs to ensure the data
    it requests returns to the right place. IP stands
    for Internet Protocol.

20
MALWARE
  • Portmanteau term for all malicious software
    covers any unwanted program that makes its way on
    to a computer. Derived from Malicious software.

21
SPYWARE
  • Malicious program that, once installed on a
    target machine, steals personal and confidential
    information. Distinct from adware.
  • Spyware can be contracted many different ways.
    Increasingly it arrives on a PC via a web
    download.

22
TROJAN
  • Like the wooden horse of legend this is a type of
    program or message that looks benign but conceals
    a malicious payload. Many of the attachments on
    virus-bearing e-mail messages carry trojans.

23
VIRUS
  • A malicious program - usually one that requires
    action to successfully infect a victim. For
    instance - the malicious programs inside e-mail
    attachments usually only strike if the recipient
    opens them.
  • Increasingly the word is used as a portmanteau
    term for all malicious programs - those that
    users must set off or those that find their own
    way around the net.

24
WORM
  • Self-propelled malicious program that scours the
    web seeking new victims
  • Worms can infect and take over computers without
    any help, bar lax security, from a victim.

25
Question?
  • Do you have a clear image in your head on what
    your page will look like??

26
Question?
  • Do you have a clear image in your head on what
    your page will look like??
  • What do you want to put in it??

27
Question?
  • Do you have a clear image in your head on what
    your page will look like??
  • What do you want to put in it??
  • Any ideas??

28
Question?
  • Do you have a clear image in your head on what
    your page will look like??
  • What do you want to put in it??
  • Any ideas??
  • Images??

29
Question?
  • Do you have a clear image in your head on what
    your page will look like??
  • What do you want to put in it??
  • Any ideas??
  • Images??
  • What about Divs?

30
Question?
  • Do you have a clear image in your head on what
    your page will look like??
  • What do you want to put in it??
  • Any ideas??
  • Images??
  • What about Divs?
  • What Divs do you want to put in your Page??

31
(No Transcript)
32
Any Questions?
  • ..
  • On Your Web Page?
Write a Comment
User Comments (0)
About PowerShow.com