Computer Viruses.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
An Introduction to Phishing and Viruses
Intro to Malware Attacks
3.6 Fundamentals of cyber security
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
Chap 10 Malicious Software.
Chap 10 Malicious Software.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Viruses

Malware Malicious software Programs designed to infiltrate or damage a computer system without the owner's informed consent. Viruses, worms, Trojan horses, adware, spyware

Virus A virus is a program that reproduces its own code by attaching itself to other executable files The virus code is executed when the infected file is executed. Most viruses do their "job" by placing self-replicating code in other programs

The Life Cycle Viruses embed themselves into the code of software They are harmless until the infected program is actually started (executed)

Who Writes Viruses- and Why? Viruses can be written by anyone It could include researchers for demonstration purposes In some cases, they can be written by pranksters. These viruses get passed around and can be altered by other people.

Are All Computer Viruses Harmful? Every computer virus ever written takes up disk space Many of them are able to remain in the computer's memory taking control Some viruses are written to halt the computer There are viruses created to deliberately destroy data on the disk

What do they do? slower processing decreased memory a disk drive LED lighting up for no apparent reason a screen going blank when you touch a certain letter on your keyboard delete data copy password

How do you get the virus?? Viruses are contracted by downloading files from the Internet Close to 75% of all viruses are contracted through friendly means

How do you prevent virus?? Use less popular e-mail clients; virus developers don't target these e-mail clients. Mac users are less prone to contracting computer viruses (remember virus creators are looking for the highest body count) Anti-virus software is not a ‘cure all’ Run a virus scan on any executable (.exe) files or MS Word/Excel Files that are emailed to you

Common Types Boot Sector - Stays resident by infecting the boot sector of the computer FAT Virus - infects the File Allocation Table of a hard drive, these usually cause a loss of files that are on a hard drive Memory viruses - execute and stay resident in memory

Macro viruses - viruses that attach themselves to documents in the form of macros. Usually in Microsoft Word and Microsoft Excel documents CMOS viruses - viruses that make themselves resident in the CMOS . These viruses can damage the hardware of the computer

Worms - A computer worm is a software program that is designed to copy itself from one computer to another, without human interaction. Unlike a computer virus, a worm can copy itself automatically. You might have heard of specific computer worms, including the Sasser worm, the Blaster worm, and the Conficker worm.

Trojan Horse - designed to cause damage or do something malicious to a system, but are disguised as something useful. Unlike viruses, these don't make copies of themselves. Trojan horses are designed to allow a hacker remote access to a target computer system.

Spyware Software that performs certain behaviors, generally without appropriately obtaining your consent first, such as: Advertising Collecting personal information Changing the configuration of your computer

Spam Unsolicited e-mail annoying and time consuming people have lost money to bogus offers

Phishing “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.” “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.” “We are updating all email accounts on our mail server. Please click the link below and update your username and password. If you don’t reply within 48 hours your account will be closed”

Hackers a hacker is a person who breaks into computers, usually by gaining access to administrative controls most hackers are thieves, looking for personal data or bank/ credit card information

How do hackers gain access to your account? worms, viruses and Trojan horse programs make your computer vulnerable to remotely controlled exploits Use ’security holes’ through which they can gain entry without much trouble use programs that are designed to figure out the passwords to your accounts use Brute Force password attacks

The Bottom Line To prevent your computer from contracting a virus, use a virus protection program. Keep up-dated on what viruses are going around. Don't open email that is suspicious or that you don't recognize the senders name. Activate firewall Always back up your files! If your computer does contract a virus, be prepared to reformat and start all over again!

Hopefully, you will not be the victim of a virus or hacker!