War between Good and Evil.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Unit 18 Data Security 1.
Computer Viruses.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses, Hacking and Backups By Katie Louise Bieber!
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER SECURITY: INFORMATION AND ACCOUNT By: Jack Denman.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Viruses & Destructive Programs
Tonga Institute of Higher Education IT 141: Information Systems
Hacking Computer crime and cyber security.
Operating Systems Services provided on internet
Malware and Computer Maintenance
Presentation on Computer Virus
Computer Viruses Latifah alabdulkarim
COMPUTER VIRUSES Computer Technology.
Computing Issues that Affect Us All
computer virus infection & symptoms
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Viruses.
Chap 10 Malicious Software.
Computing Issues that Affect Us All
Technology Mrs. Huddleston
Computing Issues that Affect Us All
Presentation transcript:

War between Good and Evil. The battlefield is your PC! Internet Safety

Internet Safety •Anything you say, no matter how secure you think it is, or who you say it to, may be accessed by others

Internet Safety If you are on your parent’s account, what you say or do might come back to them Always ask the teacher if it’s OK to download something on the computer.

Internet Safety Good citizenship means doing the right things for the right reasons, that benefits others Good citizenship when using the computer means: Not sharing software with others Proper conduct online No chatting in a chat program Not transmitting offensive materials to others Do not share your passwords. Change when your password if your email has been hacked.

A computer virus •Computer virus refers to a program which damages computer systems and/or destroys or erases data files

Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Script Virus Trojan Horse

Time Bomb A time bomb is a virus program that performs an activity on a particular date

Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.

Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped

Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk

Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk

Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages

Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.

Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers

Practice Internet Safety Remember to Always Practice Internet Safety The End