Chapter Objectives In this chapter, you will learn:

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 24 Troubleshooting and Maintenance Fundamentals.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 10 Supporting Hard Drives.
Chapter Fourteen Windows XP Professional Fault Tolerance.
D. Beecroft Fremont High School VIRUSES.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Chapter 6 Protecting Your Files
Computer Viruses Author: Alyse Allen.
Discovering Computers 2012: Chapter 8
3.6 Fundamentals of cyber security
Lecture 8. Cyber Security, Ethics and Trust
SEMINAR ON PC SECURITY FROM VIRUSES
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Troubleshooting and Maintenance Fundamentals
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Chapter Objectives In this chapter, you will learn: About maintaining your PC, including how to make backups How to protect against viruses, Trojan horses, and worms About approaches for troubleshooting a PC Chapter 12: Maintenance and Troubleshooting Fundamentals

Maintaining Your PC Chapter 12: Maintenance and Troubleshooting Fundamentals

Performing Routine Maintenance Tasks Organize the hard drive root directory Organizing the files and folders on your hard drive makes it easier to find files and can help you back up and recover files more easily Keep all of your documents and other files in your My Documents folder Do not store files on the desktop Keep application software files and their data in separate directories The root directory of the hard drive should contain only folders and system startup files or initialization files for software Chapter 12: Maintenance and Troubleshooting Fundamentals

Performing Routine Maintenance Tasks Create rescue disks Document all setup changes, problems, and solutions Record setup data Take practical precautions to protect software and data Backup the system state and create a restore point before installing a new software package Do not store data files in the same directory as the software Enable settings to hide protected files from the user Back up original software Back up data on the hard drive Chapter 12: Maintenance and Troubleshooting Fundamentals

Backup Approaches A full backup backs up all data from the hard drive or a directory or folder of the hard drive An incremental backup backs up only files that have changed or been created since the last backup Differential backups backs up files that have changed or been created since the last full backup Chapter 12: Maintenance and Troubleshooting Fundamentals

Creating a Backup Plan and Schedule Chapter 12: Maintenance and Troubleshooting Fundamentals

Creating a Backup Plan and Schedule Chapter 12: Maintenance and Troubleshooting Fundamentals

Disk Cloning Software Disk cloning is the creation of a complete image or copy of a computer’s hard drive, usually used to deploy a new operating system with application software on multiple computers in a corporate network or educational computer lab Norton Ghost Drive Image ImageCast Chapter 12: Maintenance and Troubleshooting Fundamentals

Creating a Preventative Maintenance Plan Chapter 12: Maintenance and Troubleshooting Fundamentals

Protecting against Viruses, Trojan Horses, and Worms A malicious logic program is any program that acts without a user’s knowledge, deliberately changes the computer’s operations, and does varying degrees of damage to data and software Antivirus software protects a computer against infection by identifying and removing any malicious logic programs in memory, in storage, or on files coming in as e-mail attachments Chapter 12: Maintenance and Troubleshooting Fundamentals

Computer Viruses A computer virus is a program designed to infect a computer and replicate itself by attaching itself to other programs The payload is the destructive event or prank the virus was created to deliver All viruses have three characteristics: Has an incubation period Performs an unwanted function Replicates itself Chapter 12: Maintenance and Troubleshooting Fundamentals

Types of Viruses A file virus inserts virus code into program files or executable files A macro virus uses the macro language of an application to hide virus code A boot sector virus replaces the boot program used to start the computer system with a modified, infected version of the boot program Master Boot Record (MBR) viruses attack disks in the same manner as boot sector viruses MBR viruses typically save a legitimate copy of the master boot record in a different location on the hard disk Chapter 12: Maintenance and Troubleshooting Fundamentals

Types of Viruses A multipartite virus has characteristics of a boot sector virus and a file virus A logic bomb is a program that is activated when a certain condition is detected A time bomb is a type of logic bomb that is activated on a particular date Chapter 12: Maintenance and Troubleshooting Fundamentals

How Viruses Hide Antivirus software detects a known virus by looking for distinguishing characteristics called a virus signature, which is a known pattern of virus code A polymorphic virus changes its distinguishing characteristics as it replicates An encrypting virus can transform itself into a nonreplicating program to avoid destruction by antivirus program A stealth virus actively conceals itself Chapter 12: Maintenance and Troubleshooting Fundamentals

How a Virus Replicates Chapter 12: Maintenance and Troubleshooting Fundamentals

Trojan Horses A Trojan horse is a destructive program disguised as a real application, such as a screen saver Trojan horses can delete files, capture information from your system, or open up a back door that allows a hacker to control your computer remotely AOL4FREE Chapter 12: Maintenance and Troubleshooting Fundamentals

Worms A worm is a malicious logic program that replicates by creating copies of itself, either on one computer or any number of computers on a network Eventually, no memory or disk space remains because the worm is using up all system resources Worms on the Internet routinely perform port scanning Chapter 12: Maintenance and Troubleshooting Fundamentals

Worms Chapter 12: Maintenance and Troubleshooting Fundamentals

Hoaxes A virus hoax is an e-mail message that spreads a false virus warning, usually in chain letter fashion, from person to person Before ignoring a virus warning, you should check with reputable references to determine if a virus warning is legitimate or a hoax Chapter 12: Maintenance and Troubleshooting Fundamentals

Hoaxes Chapter 12: Maintenance and Troubleshooting Fundamentals

Protecting against Computer Viruses Chapter 12: Maintenance and Troubleshooting Fundamentals

Using Antivirus Software Install an antivirus program on your computer and update it frequently Perform routine system scans on your computer Most antivirus programs contain an auto-update feature that regularly prompts users to download the new virus signature or definition files Chapter 12: Maintenance and Troubleshooting Fundamentals

Handling an Infection Run a virus scan using your antivirus software to detect and delete the malicious logic program If the antivirus program cannot remove the infection, it often quarantines the infected file Using a recovery disk, the antivirus program can attempt to repair damaged files In extreme cases, you may need to reformat the hard disk to remove a virus Chapter 12: Maintenance and Troubleshooting Fundamentals

Troubleshooting Tools: Building a PC Toolkit Chapter 12: Maintenance and Troubleshooting Fundamentals

Troubleshooting Tools: Building a PC Toolkit Other tools that are helpful to have in a PC toolkit include: Antistatic bags Needle-nose pliers Flashlight AC outlet ground tester and multimeter Small cups, bags, or plastic containers Pen and paper Utility software Chapter 12: Maintenance and Troubleshooting Fundamentals

Utility and Diagnostic Software Utility software is a program that performs a specific task, usually related to managing system resources or identifying a problem with a PC Diagnostic software generally is used to identify hardware problems Chapter 12: Maintenance and Troubleshooting Fundamentals

Utility and Diagnostic Software Chapter 12: Maintenance and Troubleshooting Fundamentals

Utility and Diagnostic Software Chapter 12: Maintenance and Troubleshooting Fundamentals

Approaches for Troubleshooting a PC: Fundamental Rules Make backups before making changes Follow the important safety precautions Approach the problem systematically Isolate the problem Chapter 12: Maintenance and Troubleshooting Fundamentals

Approaches for Troubleshooting a PC: Fundamental Rules Do not assume the worst Check simple things first Become a researcher Know your starting point Chapter 12: Maintenance and Troubleshooting Fundamentals

Approaches for Troubleshooting a PC: Fundamental Rules Establish your priorities Do not rush Write things down Take a break Chapter 12: Maintenance and Troubleshooting Fundamentals

Gathering Information: Investigating the Problem What operating system is installed? What physical components are installed? What is the nature of the problem? Can you duplicate the problem? Chapter 12: Maintenance and Troubleshooting Fundamentals

Gathering Information: Isolating the Problem Consider the possibilities Eliminate simple things first Eliminate the unnecessary Trade good for suspected bad Trade suspected bad for good Chapter 12: Maintenance and Troubleshooting Fundamentals

Gathering Information: Intermittent Problems The trick in diagnosing problems that come and go is to look for patterns or clues as to when the problems occur If you cannot reproduce the problem, keep a log of when the problems occur and exactly what messages appear Take a screen capture Chapter 12: Maintenance and Troubleshooting Fundamentals

Chapter Summary In this chapter, you learned: About maintaining your PC, including how to make backups How to protect against viruses, Trojan horses, and worms About approaches for troubleshooting a PC Chapter 12: Maintenance and Troubleshooting Fundamentals

Chapter 12 Complete