 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Chapter 9: Privacy, Crime, and Security
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Chapter 13 Security Strategies and Systems. Security Issues The Internet has opened up many new frontiers for everyone, including con artists and computer.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
BUSINESS B1 Information Security.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Security Issues, Ethics, & Emerging Technologies in Education
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
CHAPTER 3 Securing your PC and LAN Suraya Alias. Securing your desktop or Notebook Computer ◦Know an access control ◦Limit use of the administrator accounts.
Attack Methods  Attacks  DoS (Denial of Service)  Malware.
Chapter 15: Security.
Presentation on Computer Virus
War between Good and Evil.
Lecture 8. Cyber Security, Ethics and Trust
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Ethics.
Chap 10 Malicious Software.
مرکز فناوری اطلاعات دانشگاه رازی
Malicious Software Network security Master:Mr jangjou
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Malicious Program and Protection
Presentation transcript:

 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses

 viruses  Macro viruses  Boot sector viruses  Trojan Horse viruses  Stealth viruses  Polymorphic viruses  Logic (time) bombs

 Files become corrupt  Program does not operate properly  Programs or files vanish  Strange messages appear on monitor  Less memory space available  A volume name has changed  message appears repeatedly

 Data backup  Disaster recovery plan  Data encryption  User IDs and passwords  Biometric authentication  Network sniffers  Mini webcams  Firewalls