Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308:

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Crime and Security in the Networked Economy Part 4.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Threats and Attacks Principles of Information Security, 2nd Edition
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Computer Concepts & Careers Exam 1 Study Guide. Hardware What is RAM? – Random Access Memory – A temporary holding area for data, application instructions,
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Cyber crime & Security Prepared by : Rughani Zarana.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
D. Beecroft Fremont High School VIRUSES.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Return to the PC Security web page Lesson 5: Dealing with Malware.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Crimes Career & Technology Education Department.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
CONTROLLING INFORMATION SYSTEMS
Understand Malware LESSON Security Fundamentals.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Britanny polca Objectives: * Identify what Malicious code is * Know the categories of Malicious code * Introduce you to the parts of Malicious software.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308: lab sections 16, 17, 19, 20

Computer Graphic Formats

Encoding Graphics, Pictures, and Images Two different approaches to encoding graphics: –bitmap or raster –vector or object oriented

Bitmap uses a code to indicate the state of each individual pixel takes a lot of storage space for each image slower file transfer times.bmp.pcx.tif.gif.jpg can modify by changing individual pixels realistic images

CIRCLE 40 Y

Vector consists of a set of instructions that recreate a picture less storage space than a bitmap picture can easily modify the picture.wmf.dxf..mgx.cgm

Sources of Graphics Files Clip Art Gallery Internet Image scanner Create your own –Microsoft Paint –Adobe

Computer Crime The use of computers to commit unauthorized acts.

Major Categories manipulation or theft of data or assets direct attack on hardware, software, or data using the computer for conducting or planning a crime unauthorized use of the computer for personal gain

Computer Crime Laws different for each state define computer data and software as personal property define as a crime: – unauthorized access, use, modification of data – disabling a computer system

Federal Legislation Computer Fraud and Abuse Act (1984) Computer Fraud and Abuse Act (1986) Computer Abuse Amendment Act (1994)

UW Computer Use Policy Improper use includes, but is not limited to the following:  Use for personal gain, such as using the computing facilities for another job outside of the University.  Use which intentionally interferes with legitimate use by others.  Use of the electronic communication facilities to deliver threats to others, including sexual harassment.

Viruses a program designed to reproduce itself and spread from one computer to another can destroy data, display irritating messages or otherwise disrupt computer operations generally infects the executable files

Other Software Hazards Time Bombs –Michelangelo Logic Bombs Worms –Internet 1988 Trojan Horses –Explore Zip Denial of Service Attack

Detecting a Computer Virus virus detection programs –checksum –signature virus removal programs information for virus protection for Windows 95/NT: –

Preventative Measures back up your data use some type of virus detection and removal program and keep it updated check any files downloaded from the Internet always check attachments before opening or running them

Virus Information for information about virus hoaxes: –