WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer safety Filip Hruby.
Chapter Objectives In this chapter, you will learn:
Viruses & Destructive Programs
CYBER SECURITY...
Presentation on Computer Virus
Unit A: Exploring Computer Systems
Why Computer Security Need???
SEMINAR ON PC SECURITY FROM VIRUSES
Computer Technology Notes 5
Computer Viruses.
Chap 10 Malicious Software.
Computer Security.
Chap 10 Malicious Software.
Malicious Program and Protection
THIS IS Jeopardy. THIS IS Jeopardy With Your Host... Mrs. Glenn.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy itself and infect a computer. A true virus can only spread from one computer to another when its host is taken to the target computer. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. The first virus appeared in the early 1970’s, when it was used in a game played by some scientists. The target of this game was to fill the other person’s RAM memory using the viruses.

We can find Four different types of computer viruses 1- Trojan Horse We can find four different types of computer viruses: 1-Trojan Horse: It facilitates unauthorized access to the user's computer. This kind of viruses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access to it and do any kind of operation. This virus normally appears in software you can download, websites with executable stuff and sent files. 2-Computer Worm: It causes at least some harm to the network. It uses a network to send copies of itself to other computers in that network. Unlike a virus, it doesn’t have to be sent with an executable program. 2- Computer Worm

3- Logic Bomb 3- Logic Bomb: will set off a malicious function when specified conditions are met. Usually viruses and worms contain logic bombs that start working when the hacker wants. The most famous logic bomb success happened in 1982. This logic bomb was responsible of the damages caused in the Trans-Siberian pipeline incident. 4-Hoax: Is all the false stuff that is use on the Internet in order to obtain valuable things from a user. This word is not only used talking about computers. 4- Hoax

HOW DO THEY WORK? A file virus attaches itself to a file, usually an executable application. When click on it will start sending information to our computer until it gets infected. Many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed.

HOW ARE THEY TRANSFERRED? These viruses spread normally via floppy disks which may come from virtually any source:   - Unsolicited demonstration disks - Brand-new software - Disks used on your PC by salesmen or engineers - Repaired hardware A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network. These viruses spread normally via floppy disks which may come from virtually any source:   -Unsolicited demonstration disks -Brand-new software -Disks used on your PC by salesmen or engineers -Repaired hardware  

Unsolicited demonstration disks Infected PC

PREVENTION MEASURES: Anti-Virus Software Anti-Virus Software: Anti-Virus software is the best way to protect our computers from the viruses. There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses.

Backup Data to an Unconnected Memory: The second way of protecting our computers is Backup Data on an Unconnected Memory. This can be a nice way to protect it too, but we need an external device such as a hard drive or CD/DVD. Backup Data to an Unconnected Memory: