Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 18 Data Security 1.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Video Following is a video of what can happen if you don’t update your security settings! security.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
By Demi Gardiner 8P Who’s been on your computer??
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Viruses & Destructive Programs
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Technology Day 21
Viruses.
Computer Viruses Standard A-4 (Safety Unit)
Presentation transcript:

Computer Technology Part 5 Megan Rees ERMS 5/13

 Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other files  It can ◦ Corrupt files ◦ Destroy data ◦ Display irritating messages ◦ Corrupt computer systems Megan ReesERMS 5/13

 Viruses spread because people distribute infected files by exchanging disks and CDs, sending attachments, and downloading documents from the Internet.  Viruses attach themselves to files with.exe,.com, or.vbs filename extensions  When you open an infected file, the virus opens and waits to infect the next program you run or disk you use Megan ReesERMS 5/13

 Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves  You may not even know your computer has a virus, thus making it easier to spread the virus Megan ReesERMS 5/13

 An event that activates a task often associated with a computer virus  Time Bomb ◦ Watches for the PC clock to reach a certain date to activate the virus  Example  Michelangelo virus  Damages files on March 6 the artist’s birthday  Logic Bomb ◦ Watches for a specific set of input to activate the virus Megan ReesERMS 5/13

Megan ReesERMS 5/13

 Virus that attaches to an application program ◦ Example  Chernobyl  Notorious for overwriting a section of the hard disk, making it impossible to access data  Written by Chen Ging Hau of Taiwan in One of the most damaging viruses. Megan ReesERMS 5/13

 Infects the system files that your computer uses every time it is turned on  Cause widespread damage and recurring problems ◦ Example  Stoned Virus  Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk  Created in 1987, written by a university student in Wellington, New Zealand. One of the very first viruses. Megan ReesERMS 5/13

 Macro ◦ A miniature program that usually contains legitimate instructions to automate a document or task. Infects data files—chiefly files created in Word, Excel, Power Point, and even Access.  This virus infects a macro ◦ Example  Melissa Virus  Attaches itself to Microsoft Word documents  Codemas Virus  Attaches itself to Microsoft Excel spreadsheets Megan ReesERMS 5/13

Megan ReesERMS 5/13

 Computer program that seems to perform one function while actually doing something else ◦ Different from a virus because it does not make copies of itself  Different tasks that can be affected ◦ Stealing passwords ◦ Deleting files Megan ReesERMS 5/13

Megan ReesERMS 5/13

 Software program designed to enter a computer system usually through a network, through security holes and then replicate itself  Spreads from computer to computer Megan ReesERMS 5/13

Megan ReesERMS 5/13

Megan ReesERMS 5/13

 Antivirus software ◦ Set of utility programs that looks for and eradicates a wide spectrum of problems, including viruses, Trojan horses, and worms ◦ Example  McAfee Virus Scan  Don’t open s attachments that have strange names or are from people you don’t recognize Megan ReesERMS 5/13

 Jeff has a disk he borrowed from a friend. He puts in the school computer lab and retrieves the data he needs. He turns off the computer and leaves, leaving his disk behind and forgetting all about it. The next morning, Molly comes to the lab and starts the same computer. The computer tries to start from the disk in drive A, and is unable to start, giving Molly an error message. Molly notices the strange disk and takes it out, then tries to start the computer again. But the computer will not start up even when Molly removes the disk. Megan ReesERMS 5/13

 David is surfing the internet for some free games. He finds a really awesome game, and it’s FREE! He’s super excited! He downloads the game, ignoring the user agreement and just clicking “yes” without reading it. He plays the game for a while, but then he notices his computer is slowing down and isn’t working properly. There is a virus on his computer! I wonder where it came from? Megan ReesERMS 5/13

 Delilah is at the University checking her in the computer lab. She sees she has several s and is going through them one by one. One of the s has the subject line: ILOVEYOU. Wahoo! Someone is in love with her! It’s a love note! YES! Delilah opens the eagerly. But there was nothing interesting in the . Before she knows it, a copy of this same has been sent to all the people in her address book. The next day, the computer lab is closed because it and all the other computers on the network have been infected. Dang it! She has a paper due! Why did they close the lab?? Megan ReesERMS 5/13

 Brian is a computer programmer at Synco Systems International. It’s an awesome company and he gets paid really well. He loves his job. He’s just finished writing a new software program for the company that will be used Internationally by hundreds of employees. He loves his job SO much. Three weeks later, Brian is shocked to find out he’s been let go due to “company cutbacks.” Brian is SO ticked off. Strangely, within minutes of Brian’s name being removed from the company database, the software program suddenly goes down, causing a huge breach in the company. Weird. Megan ReesERMS 5/13

Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, Megan ReesERMS 5/13