Threats Grade 10.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
Computer Viruses.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
COMPUTER VIRUSES Computer Technology.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Technology Day 21
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Computer Security.
Chap 10 Malicious Software.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Threats Grade 10

Threats A computer virus is a computer program that invades your computer system without your knowledge and consent It hides itself while doing its work. Frequently e-mails attachments spread viruses

Basic Characteristics It is able to duplicate itself: It could replicate or attach itself to a file which when shared will infect the next computer. It is able to hide and protect itself It must have a PAYLOAD.

Types of threats Trojan Horse Boot Sector Virus File Virus Worms Time Bombs Macro Viruses

Trojan Horse This often comes as an appealing attachment While you are busy with the game the virus infects your system. These files could lead to data theft

Boot Sector Virus The boot sector contains vital data for a computer. It is one of the first things looked at when you switch on. This virus could put the boot sector somewhere else.

File Virus This will attach itself to any program i.e. any file with the extension EXE or COM. It can be carried to another system via a USB

Worm A worm will replicate themselves until all available locations on the hard drive are full causing the system to crash.

Time bomb These programs lurk in your system, infecting all disks and other computers on a network. They wait for a specific time or event to do whatever job they have been programmed to do.

Macro Virus These viruses infect Microsoft application files. They attach themselves to a document The document enters the system as a macro. A macro is a program  a collection of words, phrases or commands that can be activated by a simple action like a combination of two key presses. When the next clean document is worked with, the macro attaches itself to the new document to go and infect another computer.

Benign or malignant? Benign Malignant When activated does something harmless but irritating When it has stopped running you are given control of your computer again. Generally written as jokes Malignant Written to cause damage to files It can replicate rapidly and infect data and program files within minutes of entering your system.

Who Writes a Virus? Malicious people who have some sort of grudge. Bored students who need something to stimulate their creative powers. Pranksters who think it is amusing.

Damage Caused by a Virus It can cause damage any file on your hard drive or memory stick e.g. drivers. Businesses Clearing up is time-consuming and costly. It requires the services of a specialist in the field. Essential data could be lost Home Loss of data Inconvenience because you may have to reformat your hard drive.

Infection rate A virus can transfer copies of itself dozens of times in a matter of seconds. In the workplace, computers are usually networked. If a computer is infected every machine in the company could be infected almost instantly. If each worker takes an infected USB home, each home machine becomes infected. If each spouse takes an infected USB to work and if each child takes an infected USB to school you will have a pandemic.

Does your computer have a virus? Strange messages or graphics appear on your monitor. Sounds that are not part of your program could be played. Your hard disk could reformat itself without you having given the reformat command. Unknown files or directories are created. Files expand in size for no known reason. Files are corrupted. Your computer starts to work slowly. The computer is unable to boot up because the boot sector has been relocated. The FAT has been moved and it appears that you have no files on your disk.

Cleaning an infection Reformatting the hard drive is extreme but undesirable Use an inoculation programs. These programs find the virus and destroy or quarantine it. They may try to patch the damage They can fix a known virus they cannot fix a virus that is still to be written.

What are virus definitions? These define what a virus is and what it can do. When a company finds a new virus they get into the program code and look for the defining part of the virus. They write code to defuse or destroy the virus.

Update your virus definitions The fact that the old viruses can be treated is a stimulus to their authors. You can almost hear them saying “They found that one! Let’s see how long it takes them to crack this new one!” and out will pop a new virus. This is then analysed by the anti virus companies until they find the program that will crack that new virus and so the vicious circle starts again!

How to Prevent Infection Only use new software bought from a reputable agent. Isolate your machine if you can! Ensure that a computer is clean before you use your USB Install a virus checker in your home computer and convince your company and friends to do the same. Update your virus checker’s data base regularly. Download files from reputable sites on the Internet. Don’t boot with a USB in place. Change your CMOS setting so that drive C is the first drive it examines on boot-up. Scan all disks with your virus checking software before using them. Don’t open attachments from a strange source.

Hoax You will often receive an e-mail warning you not to open an e-mail with a particular subject line because it is a virus. Most of these are a hoax. Hoaxes cause panic and flood inboxes throughout the world. Before sending these warnings check on the Internet.

Spam This is unsolicited e-mail. In businesses it clutters up the inbox and uses space on the server. You can build in a filter that will delete all e-mail from a particular person as soon as it is received.

Phishing When someone wants to gain access to your private details like passwords or bank details, they will use bait in the form of an e-mail or text message hoping to catch the “phish” – you! They could be attractive offers (“You have won £500,000 in the UK Lottery. Send us your details so that we can transfer the money to your account”) or Could cause you alarm (“We have noticed some unusual activity on credit card. Click here so that we can verify your details.”). Keyloggers are programs that capture all keystrokes as you type in the hopes that soon a password will be entered. The “Phisher” has access to your computer through this program and will patiently wait until he can pick up personal details.

E-mail spoofing Most of us will open a friend’s e-mail. E-mail spoofing relies on this. E-mail spoofing is often used to gain access to certain details that could be used in Spam or in Phishing.

Pharming Pharming is an attempt by a hacker to block a legitimate web site. The people who type in the web address of this site will be redirected to a false web site. One of the main purposes of pharming is to assist in identity theft particularly if an on-line banking site is affected.

Some other threats Twishing Phishing using Twitter Smishing Phishing using an SMS Vishing Phishing using VOIP