Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.

Similar presentations


Presentation on theme: "UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS."— Presentation transcript:

1 UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS

2 COMPUTER VIRUS  A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user.  Viruses can either be considered a Nuisance or Destructive.  They can  Corrupt files  Destroy data  Display irritating messages  Corrupt computer systems  Some viruses replicate themselves which means that they copy themselves over and over.

3 TYPES OF VIRUSES  Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Read the information and give a brief description in your own words of each type on your study guide.

4 TROJAN HORSE  A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

5 WORM  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself.

6 BOOT SECTOR VIRUS  Attaches itself to the first part of the hard disk that is read by the computer during the boot up process.

7 MACRO VIRUS  Uses another application’s macro programming language to distribute themselves. They infect documents such as MS Word, Excel, etc.

8 MEMORY RESIDENT VIRUS  Viruses that reside in a computers RAM. They stay in memory after its initiating program closes.

9 ROOTKIT VIRUS  An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.

10 POLYMORPHIC VIRUS  Copies itself by creating multiple files of itself. It changes its signature making it hard for antivirus software to detect.

11 LOGIC BOMBS/TIME BOMBS  Programmed to initiate at a specific date or when a specific event occurs.

12 SPREADING VIRUSES  Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading files from the Internet.  Viruses attach themselves to files with.exe,.com, or.vbs filename extensions  When you open the infected file, the virus opens and waits to infect the next program you run or disk you use.  Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves.  You may not even know your computer has a virus, thus making it easier to spread the virus.

13 HOW VIRUSES SPREAD  Click on the clipart below to discover 11 ways viruses are spread in our computer systems.  Using a your own words, write a brief description of each on your study guide.

14 PROTECTING YOUR COMPUTER  Just as you protect yourself from illness and disease, there are ways you can cut the chances of your computer systems being infected.  Click on the clipart below to discover 11 suggestions for protecting your computer. List them on your study guide.

15 COMPUTER THEFT & PRIVACY  The most popular tech item to steal are Laptops which are then most often sold.  Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations.

16 PASSWORDS  Use passwords to keep your files and information safe and to keep most people out of your files.  Minimum of 8 characters  Combination of uppercase letters, lowercase letters, numbers, and symbols  No dictionary words – spelled backwards or forwards  No personal information  Use a different password for each system you access  Change your passwords regularly

17 HACKING  Hacking  Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. Their objective is to do damage or steal personal information.  The Penalty  The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.  Hackers cost business money because of downtime and loss of data

18 INTERNET CONTROLS  Types of controls for internet safety  Firewalls: forms a barrier between two networks  Filters: controls what can be viewed on Internet  Parental Control: Software allows parental control over what kids do on the Internet Firewall LAN WAN

19 FREEWARE & SHAREWARE  Freeware  is copyrighted computer software which is made available for use free of charge for an unlimited time  Shareware Software  Is typically obtained free of charge, either by downloading from the Internet or other source. A user tries out the program, and thus shareware has also been known as "try before you buy". A shareware program is accompanied by a request for payment, and the software's distribution license often requires such a payment.

20 PLEASE COMPLETE THE ATTACHED ACTIVITY AS A HOMEWORK ASSIGNMENT. The end! Look for the Extra Credit Opportunity!


Download ppt "UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS."

Similar presentations


Ads by Google