Presentation is loading. Please wait.

Presentation is loading. Please wait.

Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT.

Similar presentations


Presentation on theme: "Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT."— Presentation transcript:

1

2 Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT

3 MOST COMMON THINGS THAT WOULD MAKE YOUR COMPUTER SICK VIRUSES TROJANSSPYWARE Click on any of the categories above to find out

4 Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

5 Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

6 Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

7 In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

8 Computer Virus is: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)Man made software b)Violent convict from the movie “Conair” c)Cause for widespread stomach flu among networked computers d)Computer word processor Go to the second quiz

9 YOU GOT IT!!!

10 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

11 Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

12 Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

13 Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

14 In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

15 The “I Love You” Virus: QUIZ#2 QUIZ#2 Are you ready? Here is another QUIZ… a)Occurs on Valentine’s Day b)Is in love with computers c)Caused $1 Billion in damages d)It was first featured in a romantic comedy starring Hugh Grant

16 YOU GOT IT!!!

17 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

18 Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

19 Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

20 Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

21 In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

22 The viruses hardly ever replicate themselves to other computers: QUIZ#3 QUIZ#3 Are you ready? Here is another QUIZ… TRUE FALSE

23 YOU GOT IT!!!

24 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

25 ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU

26 It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?

27 There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE

28 There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS

29 What is Trojan Horse: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)USC Football MascotUSC Football Mascot b)It’s a program that contains or installs a malicious programIt’s a program that contains or installs a malicious program c)Computer VirusComputer Virus

30 YOU GOT IT!!!

31 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

32 It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?

33 There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE

34 There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS

35 Which is NOT a type of Trojan QUIZ#2 QUIZ#2 ANOTHER QUIZ a)Time BombTime Bomb b)Logic BombLogic Bomb c)Water BombWater Bomb

36 YOU GOT IT!!!

37 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

38 Erasing or overwriting data on a computer Encrypting files Corrupting files in a subtle way Upload and download files Allowing remote access to the victim's computer Opening and closing CD-ROM tray Harvest e-mail addresses and use them for spam WHAT CAN THE TROJANS DO?

39 You can be infected by visiting a rogue website Using email Infection through open ports HOW CAN YOU GET INFECTED?

40 How can you get infected by a Trojan Horse? a)Visiting TroyVisiting Troy b)Visiting rogue websitesVisiting rogue websites a)Visiting a horse farmVisiting a horse farm QUIZ#3 QUIZ#3 ANOTHER QUIZ

41 YOU GOT IT!!!

42 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

43 ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU

44 Spyware is computer software that collects personal information about users without their informed consent It’s a process where personal information is secretly recorded with a variety of techniques such as: logging keystrokes recording Internet web browsing history scanning documents on the computer's hard disk WHAT IS SPYWARE?

45 Spyware does not directly spread in the manner of a computer virus or worm The spyware stays in the infected computer where it collects information Spyware can be bundled with FREEWARE applications as well The users could be tricked by thinking they are installing useful software HOW IS SPYWARE SPREAD?

46 What is Spyware a)James Bond’s latest toyJames Bond’s latest toy b)Software that collects personal infoSoftware that collects personal info c)Cold War relicCold War relic QUIZ#1 QUIZ#1 Here comes the quiz

47 YOU GOT IT!!!

48 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

49 Anti-spyware programs can combat spyware in two ways: They can provide real time protection against the installation of spyware software Anti-spyware software programs can be used solely for detection and removal of spyware Such programs inspect the contents of Windows registry Operating system file Installed programs BEST SPYWARE PROGRAMS

50 SPYBOT Spy sweeper Spyware Doctor AVG Anti Spyware BEST ANTI SPYWARE SOFTWARE

51 Which software package doesn’t belong to the group of anti software a)Windows VistaWindows Vista b)SPYBOTSPYBOT a)Spy SweeperSpy Sweeper QUIZ#2 QUIZ#2 Here comes the quiz

52 YOU GOT IT!!!

53 OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

54 ALWAYS RUN YOUR ANTI-SPYWARE SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU


Download ppt "Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT."

Similar presentations


Ads by Google