Presentation is loading. Please wait.

Presentation is loading. Please wait.

By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.

Similar presentations


Presentation on theme: "By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g."— Presentation transcript:

1

2 By : Rishika,Autumn and Melissa Computer and other malware http://www.youtube.com/wa tch?y=c34QwtY40g

3 VIRUS ?. Viruses are small pieces of software.They attach themselves to programs and stay there.When the program runs the virus runs too.They reproduce and spread to other files.You can send them to other people accidentally.They can steal and/or delete your files/information.Security programs can delete viruses

4 VIRAL HISTORY IS A MYSTERY 10 most destructive and popular virus : (1999-2010) 1)Stuxnet (Malware) 2)Conficker (Virus) 3)Agent (Malware) 4)Zeus (Malware) 5)PoisonIvy (Malware) 6)Storm (Worm) 7)Sasser (Worm) 8)Nimda virus 9)Morris (worm) 10)Conflicker (Malware)

5 THE TROJAN HORSE A Trojan horse is a computer virus, that looks like another file or document on your computer. This a evil and 1 of the most popular computer virus. There is a good part about this famous virus it doesn’t duplicate itself There is one and only but just one is destructive enough. This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software. This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.

6 What Is It?  A malware computer program  Can independently replicate itself  Independently sends copies of itself;  Using a computer network COMPUTER WORMS

7 How are they Spread?  MS outlook services  Immediate contact to SMTP servers  Through SMTP API of their own  Windows MAPI f unctions

8 COMPUTER WORMS What are the Different Kinds of Worms?  Instant Messaging worms  Internet worms  IRC worms  File Sharing Network worms

9 ADWARE ATTACKS. Happen mostly when online.Usually don’t notice until it’s too late.Virus attaches to your hard drive.Attach instantly and go through your files.Often disguised as adware protection

10  message sent to a group of people  Same message  Large group  On the internet SPAM: WHAT IS IT?

11 VIRUS PROTECTION How can you Protect your Computer? 1) Firewall Prevents malware or malicious software from gaining access to it 2) Virus Protection Protects against viruses and other security threats

12 VIRUS PROTECTION 3) Spyware and other malware protection -antispyware software -Protects against spyware

13 UPGRADES & PURCHASES Upgrades: -once a week -automatically or manually Where to purchase protection: -purchase at a computer retail store -Ex: Future Shop, Apple, etc.

14 ROOTKITS Provides a root/path for hackers Allows hackers to access your network Hackers install hidden programs on your computer They can access your data and personal information You usually don’t even notice.Rootkits don’t go away on their own You need to look into security software They will give you helpful options

15 BIBLIOGRAPHY http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF- 8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF- 8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ http://images.google.ca/ http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer- Viruses.html?c=y&page=2 http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer- Viruses.html?c=y&page=2 http://www.worsetech.com/hack/hacker-attack/top-5-most-deadly-viruses-1102431.html http://en.wikipedia.org/wiki/Rootkit http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__intern et_surfing__adware_infection.html http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__intern et_surfing__adware_infection.html


Download ppt "By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g."

Similar presentations


Ads by Google