Viruses, Worms & Trojan Horses

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
 Fundamental terms  Diseases vs. Diseases transmitted by a network  Branching Process  The SIR epidemic model  The SIS epidemic Model  5 Worst Computer.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Threats to I.T Internet security By Cameron Mundy.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Understand Malware LESSON Security Fundamentals.
INTRODUCTION & QUESTIONS.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
Protect Your Computer Against Harmful Attacks!
Computer Applications Unit B
UNIT 18 Data Security 1.
Viruses.
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Viruses, Worms & Trojan Horses

What Are viruses? They are programs which can destroy or cause damage to data stored on a computer system and to the computer itself! Virus program must be executed in order to infect a computer system. Viruses can attach themselves to other programs in order to ensure that this happens.

Common Symptoms of Virus Infections Displaying unwanted messages Unusual visual or SFX (sound effects) Loss of Data from a storage medium Computers restarting unexpectedly Unwanted generation of emails

Viruses can ... Corrupt or delete data Disable the computer by changing the operating system Cause silly messages to be displayed or sounds to be produced Use your computer to ATTACK other computer by generating spam (junk emails) or overloading a company website with data.

WORMS Worms operate differently to viruses Worms can spread themselves to other computers without needing to be transferred as part of a host program. The first time a user may notice the presence of a worm is when the computers memory UNEXPECTEDLY fills up

Example of an email worms… Mimail.I and Mimail.F are email worms disguise themselves as an email from the PayPal on-line payment service and try to steal credit cards info. This method of fraud is known phishing

TROJAN HORSES Trojan horse, also known as Trojan, describes a list of computer threats (malware) that appear to perform good functions, but actually performs malicious functions that allow unauthorized access to the hosting machine FOR EXAMPLE – If a program is designed in such a way, it could open a gateway for hackers to control and attack the computer of the user, then that program is said to be a Trojan horse THATS WHAT A REAL TROJAN HORSE LOOKS LIKE!

Lisa Robertson THANKS FOR WATCHING By Jamil Tariq , Mariya Rasul and Jacqui Crooks  Best teacher ever!!!!!!!! (L)