Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.

Slides:



Advertisements
Similar presentations
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
What is it, how does it work, and why is it important?
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Unit 19 INTERNET SECURITY
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
 a crime committed on a computer network, esp. the Internet.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Computer security By Isabelle Cooper.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Managing Windows Security
Three steps to prevent Malware infection
Chap 10 Malicious Software.
Chap 10 Malicious Software.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm

What is a computer virus? .Small software programs designed to spread from one computer to the next to:.Corrupt/ Delete Data.Hack personal information.Erase information on a hard drive.How do they spread?.Through pop-ups, attachments, downloads. All computer viruses are a type of Malware.Malware, short for, “Malicious Software” is programmed to disrupt the proper functioning of a private computer, gather sensitive information and more

Types of Malware and how they work  Some of the most common types of Malware include: Trojan Horses Computer Worms “ScareWare”  “ScareWare”: ○ Alert you of a virus on your computer, convince you to download a program to “clean” the computer  Computer Worms: ○ Use computer networks, find lapses in program security. Allows them to multiply rapidly  Trojans: ○ Appear harmless, when downloaded open a “backdoor” through the use of Rookits.

What is an Antivirus System? .Computer Software designed to protect a private computer from Malware.  There are two main techniques Antivirus Systems use: Signature Detection ○ Scanning incoming files and cross referencing the file codes with those of known viruses Sandbox Security ○ Scans already running programs and looks for untested/unwanted codes

Other Key Features of Anti-Virus Systems:  Scheduled and On Access Scanning: ○ Scan downloaded programs on site as well as daily complete system scans  Fire Walls: ○ Protects users by not allowing unauthorized access to their compuer  Constant Updates: ○ Relates to Heuristics, most systems have constant updates for new software as well as virus signatures that were not originally in the system  Automatic clean-up: ○ Anti-Virus systems will stop the infected program, isolate it (depending on system) and quarantine or delete the file/program  Heuristic Scanning: ○ Detect new “wild type” or modified malware

BitDefender  Romanian Based Company: Softwin.  Original Anti-Virus System Release: November, 2001  Notable Technologies: Active Virus Control: ○ Used when a program is infected. Checks every running program for malicious characteristics ○ When a threshold of malicious activity is reached in a program, it will be deemed as harmful and treated as malware B-Have: ○ Created in 2006, to decrease dependency on virus signatures ○ Instead, the system looks at the behavior of programs to determine if they are malicious ○ Uses a virtual computer system to test new programs ○ If clean the system is allowed to run, if suspected as malware, the system will destroy the file and record its information

Norton Anti-Virus  A Product of Symantec Company  Mostly uses virus signatures with constant program and heuristic updates.  Notable Technologies: Insight: ○ The “smart scanning” of programs, where information is sent to Norton to update the system of new malware ○ Allows for “trusted” programs and files to be looked over in scans thus increasing scan speed ○ Performed when computer is idle to not interfere with the user SONAR: ○ Much like B-Have in that it checks program behaviors, not signatures ○ Constantly scans running programs using algorithms to find out attributes about the program. Such as, if the program is using shortcuts to gain access to private files ○ Main goal is to identify any malware instantaneously, known as “zero day” threat detection

AVAST! Anti-virus  Developed by AVAST Software a.s.  Key Features: Primarily monitors program activities to determine if they are malicious Has a “Safe-Zone” firewall which helps to go undetected on the internet Impossible for malware to destroy AVAST! Sorts corrupted files from safe files and quarantines them known as a “virus chest” Real time protection as files are downloaded GMER ○ Designed to locate and destroy Rookit technology ○ Rookits enable constant access to a computer to malware or a hacker. They are hard to detect due to the fact that they will die within seemingly safe programs, often times the user has no idea there is a Rookit until it is too late

Sources/ Questions?  "Bitdefender Antivirus Plus 2013." Bitdefender. N.p., n.d. Web. 5 May  "The All-new Avast! 8 Is Here." AVAST N.p., n.d. Web. 5 May  Norton AntiVirus." Norton AntiVirus N.p., n.d. Web. 5 May  "What Are Viruses, Worms, and Trojan Horses? - Knowledge Base." What Are Viruses, Worms, and Trojan Horses? - Knowledge Base. N.p., n.d. Web. 1 May  What Is a Rootkit? -- Definition by The Linux Information Project (LINFO)." What Is a Rootkit? -- Definition by The Linux Information Project (LINFO). N.p., n.d. Web. 1 May 2013.