prevents users Awareness Securitys cyber

RawaAbdulla1 11 views 14 slides Oct 04, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

prevent user awareness


Slide Content

Protect your device from Hackers and Viruses and worms

Agenda GOAL of Seminar What are Hackers? Type of attacks Source of malware Types of files viruses can infect Protect your Computer from Hackers and Viruses device is infected and awareness 2

GOAL 3

Hackers are people who get unauthorized access to devices (i.e. smartphones, tablets, computers etc.) using an internet connection The goal of a hacker is to alter, delete, and/or steal your personal information to use against your consent for their benefit. These types of hackers are commonly known as “black hat” and usually install malware on the target device without permission. 4

Type of attack 5

6

Source of malware 7

Sources of Malware Removable media, like Pen drive, CDs, and DVDs. Viruses can be hidden in document files with the .exe extension. If you download from untrusted websites, there may be chances that those files will contain viruses, and as soon as you open them, the hacker might get access to your system.  If the network is unsecured, then it can be accessed by anyone. Never open email attachments unless the sender can be trusted. These files may contain viruses to create backdoors. Never click on ads that you don’t trust. They are created so that you can click on them, and hackers will receive details about you.  8

1. Choose System Firewall Protection 2. Use Antivirus Software & Anti-Spyware 3. Use Strong Passwords. 4. Always, always, have a backup 5. Setup Two-Factor Authentication 6. Only download software from trusted sources 7. Be cautious of email attachments 8.only Open link from trusted source How to Protect your Device from Hackers and Viruses 9

Types of files viruses can infect Computer viruses infect by attaching themselves to various file types, including: .exe (executable files) .com (command files) .bat (batch files) . cmd (command files) .doc, . xls , .ppt (Microsoft Office files with macros) DLL system files These files require user interaction to activate the virus, such as opening or running the file 10

there are signs to recognize that your device is infected: Slow device performance Application or system crashes System freezes Unsolicited pop ups Missing or corrupt files Trouble restarting your computer Malfunctioning anti-virus software Unrecognized programs downloaded on your device 11

If you notice your device is showing signs of being infected by a virus Disconnect the infected device from the network Turn off Wi-Fi and unplug the cables that connect your devices to networks (e.g. Ethernet) Run your anti-virus software to clean the device and trace any further spread or the virus Wipe or factory reset the device if it is still showing signs of infection Run your anti-virus software on your latest backup version Restore the device with the latest clean backup 12

Conclusion and Awareness Don't open email messages from unfamiliar senders, email attachments that you don't recognize   Keep Windows always updated Use an anti virus and anti-malware Updated Don’t open received files from untrusted device 13

Thank you