Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari027354 Hazira Hamiza

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

VIRUS Presented by: Dhruv Harsh Hitesh Lakshmi Narayan Shashank.
Computer Viruses Computer viruses are a type of Malware that can infect other computer operating systems. They can do harmful things to the host it infected.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
MODULE 3 SAFE USE OF COMPUTER. Virus and Antivirus A computer virus is a malware program that, when executed, replicates by inserting copies of itself.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Three Things About Malware
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
CYBER SECURITY...
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
Computer Applications Unit B
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Stay Safe While Using The Internet
Computer Security.
Chap 10 Malicious Software.
Presentation transcript:

Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza

Malware (malicious software), is software used to:  disrupt computer operation  gather sensitive information  gain access to private computer systems.

It can appear in the form of :  Code  Scripts  active content  other software.

 In US law, malware = computer contaminant  Malware is different from defective software:  It is legitimate software but contains harmful bugs  some disguised as genuine software

 Today, malware is used to:  steal sensitive information of personal, financial, or business importance by black hat hackers with harmful intentions.  used broadly against government or corporate websites  used against individuals to gain personal information

 2 categories: 1) Dependent (those that need a host program). 2) Independent.

 Parasitic: fragments of programs that cannot exist independently of some actual application program  Examples: Viruses, logic bombs, and backdoors.

 It is a self-contained program  that can be scheduled and run by the operating system.  Examples: Worms and bot programs.

 the use of electronic messaging systems to send unsolicited bulk messages (example: advertising) indiscriminately.

 instant messaging spam  Usenet newsgroup spam  Web search engine spam  spam in blogs, wiki spam  online classified ads spam  mobile phone messaging spam  Internet forum spam  junk fax transmissions  social networking spam  social spam  television advertising and file sharing spam

 standalone malware computer program that replicates itself in order to spread to other computers.

 Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.  Unlike a computer virus, it does not need to attach itself to an existing program.

 a type of malware that replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive

 often perform some type of harmful activity on infected hosts, such as : stealing hard disk space or CPU time accessing private information corrupting data displaying political or humorous messages spamming their contacts logging their keystrokes.

 However, not all viruses carry a destructive payload or attempt to hide  they are self-replicating computer programs which install themselves without the user's consent

  tronic)  worm  virus