COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School 2008 9-1 COMPUTER AND INTERNET SECURITY LESSON 9.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting ICT Systems
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
COMPUTER SECURITY: INFORMATION AND ACCOUNT By: Jack Denman.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Viruses Author: Alyse Allen.
Chapter 40 Internet Security.
Computer Viruses Latifah alabdulkarim
Lesson Objectives Aims You should be able to:
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School LESSON OVERVIEW  COMPUTERS & SECURITY  WHAT IS A VIRUS?  SECURITY TYPES AND WEBSITES  DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY  SECURITY TERMS

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTERS & SECURITY Need to protect  Data  Ability To Use Our Computers 1 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTERS & SECURITY Major Sources Of Danger  Running malicious code on your machine due to system or application vulnerabilities or improper user actions  Carrying infected machines (laptops) in from off site Internet Is A Dangerous Place  We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes. 2 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTERS & SECURITY  Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H)  Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system  In most cases, it is simply common sense plus a little information and care 3 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School WHAT IS A VIRUS? A virus is simply a computer program that is intentionally written to attach itself to other programs or disk boot sectors and replicate whenever those programs are executed or those infected disks are accessed. 1 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School WHAT IS A VIRUS? Viruses, as purely replicating entities, will not harm the system as long as they are coded properly. Any system damage resulting from a purely replicating virus happens because of bugs in the code that conflict with the system's configuration. In other words, a well-written virus that only contains code to infect programs will not damage the system. The programs will contain the virus, but no other harm is done. 2 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School WHAT IS A VIRUS? The real damage _ the erasing of files, the formatting of hard drives, the scrambling of partition tables, etc.--is caused by intentional destructive code contained within the virus. The destructive part of a virus is programmed to execute when certain conditions are met, usually a certain date, day, time, or number of infections. 3 of 3

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School SOME TYPES OF VIRUS  Boot Viruses  Program Viruses  Multipartite Viruses  Stealth Viruses  Polymorphic Viruses  Macro Viruses

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School SECURITY TYPES  Account Security  Server Security  Third Party Security  Software Security  Copyright

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY Who needs this? Anyone who does a lot of downloading, or accesses diskettes from the outside world on a regular basis should develop an antivirus strategy.

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY (1) The most important weapon in an antivirus arsenal is a clean, write- protected bootable system diskette.

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY (2) A second effective defence against viruses is a clean backup of the hard drive.

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY (3) The third part of an antivirus strategy should be antivirus software, preferably more than one package since no one product can do everything. There are many products out there to help guard against viruses.

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School SECURITY TERMS  Encryption  Digital Signature  Firewall  Hacker  Spam

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School ENCRYPTION  Symmetric Encryption  Asymmetric Encryption  Combination Symmetric And Asymmetric Encryption

COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School FIREWALL TECHNIQUES  Packet Filter  Application gateway  Circuit-level gateway  Proxy Server