VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 6 Digital Literacy Study S3 Obj 2-2
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
VIRUSES and DESTRUCTIVE PROGRAMS
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Viruses & Destructive Programs
Managing Windows Security
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Security.
Presentation transcript:

VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE Updated by J9Wise from ORIGINAL SOURCE: Stewart Hudnall / Jennifer Morgan

Malware can be a Nuisance or Destructive. Destructive malware can be serious by: Corrupting files Destroying data Corrupting entire computer systems Nuisance malware typically just displays irritating messages or otherwise gets in your way when you're trying to do something else. Malware can travel inside programs and applications that are installed on your computer, as email attachments, as downloadable programs and other files from the Internet, and hidden on hardware such as flash drives.

A Virus is a particular kind of malware program written to alter the way a computer operates without the permission or knowledge of the user. Similar to a flu virus, when computer viruses arrive on your computer, they often inject themselves into other benign software that it finds on your computer, adding some coded instructions inside existing instructions that allow the full virus program to go to work when you use one of your regular applications. To differentiate them from other malware, viruses typically only work after a user has run a program.

Some KNOWN Categories of Malware Worms Trojan Horse Rootkit/Bootsector Virus Bots/Droppers Logic Bombs/Time Bombs Ransomware/Scareware Spyware

Categories of Malware Worm: A program with a primary intent to replicate itself and execute some instructions on a computer, and then spread itself onto another computer and beyond. Its primary distinction from a virus is that a worm runs itself, while viruses typically require a user to run something else first that triggers the virus.

Categories of Malware Trojan/ Trojan Horse: Has the appearance of being a benign and useful program, but hidden inside is something undesirable that acts in secret. For example, you may think you're running a calculator application, but when you activate the calculator program, the Trojan virus inside also starts running something that you don't want.

Categories of Malware RootKit/Boot Sector Virus: A small program that attaches itself to the software used by a computer often during its startup process. The program alters common computer instructions, modifying the results of normal computer operations. Boot sector viruses are a subset of rootkit viruses as they attack the disk boot up software specifically. Once, these were particularly difficult to remove because operating systems prevented antivirus software from accessing the system startup programs, but now, most up-to-date cleaning software can take care of these easily, and modern operating systems make it hard for these kinds of viruses to remain around long enough to do any damage.

Categories of Malware Bots and Droppers: Programs that infest your computer hardware doing nothing at all while waiting for a signal from its owner. The signal will then cause all the computers with bots to execute some instructions at the same time. A dropper is a kind of bot that funnels malware of all kinds into the computer its on, and their owners can even charge for this service to creators of other malware. Spammers, for example, often use these to send junk emails from other computers so that their own computers won't be implicated.

Categories of Malware Logic Bombs/ Time Bombs: Another form of Bot that is programmed simply to initiate its actions on a specific date or when a specific event occurs. When the date passes, it deletes itself to eliminate tracing its source.

Categories of Malware Ransomware/Scareware: Malware programs that attack your computer or threaten to attack your computer that also demand a ransom (often in the form of a purchasable “cleaning service”) before you can rid yourself of the malware. Or they sell you a fake program that appears to work, but actually does nothing because their threat was also fake. This is the malware equivalent of the old “protection racket” that makes you pay somebody so you won't get harmed by the same people you've paid. Sadly, these are quite clever and are often hard to distinguish as legitimate.

Categories of Malware Spyware: Malware bots that search through your computer's files looking for stored passwords and usernames, and then forward that information back to the owner of the malware who can then use it for identity theft and other crimes. Sp yware can also be used to target advertising based on what it finds in your computer files.

SPREADING MALWARE Malware spreads from computer to computer when people distribute infected files by exchanging DVDs and CDs, sending e-mail attachments, and downloading files from a network or the Internet. When you open the infected file, virus malware activates and then prepares itself to infect the next program you run or disk you use. You may not even know your computer has the virus, thus making it easier to spread the virus. Malware can lurk in a computer for days or months, quietly replicating (copying) itself until removed.

How Malware Spreads Networks and the Internet: Phishing Schemes: A computer may be infected through a network which spreads from another computer connected to that same network. And since the Internet is simply a giant network of networks, it is often the primary source of malware attacks. Phishing Schemes: These schemes try to get your personal information through email messages pretending to be legitimate sites. When you visit these sites, malware can also be automatically installed on your computer.

Other Kinds of Attacks Dictionary Attacks use a targeted technique of successively trying all the words in an exhaustive list (dictionary) to figure out usernames and passwords on a computer system.

Other Kinds of Attacks War Driving is the act of driving around a neighborhood in a vehicle with a laptop computer, an antenna, and a wireless adapter trying to find and exploit existing wireless networks.

ADWARE Adware is the common name given to nuisance software that a user acquires with advertisements embedded into the application. A common variation on Adware occurs when installing a program, and additional programs are “offered” to be installed first. If you don't pay attention, you may end up permitting this software to install itself by blithely clicking [Next] during the installation process instead of unchecking the boxes that ask you if you want it in the first place.

PROTECTING YOUR COMPUTER Just as you protect yourself from illness and disease, you can cut the chances of your computer systems being infected with these actions: Install trusted anti-virus program and schedule it to perform regular scans Install an anti-malware program and use it regularly Never open email attachments without scanning them first with your anti-virus software Protect your downloads by using sites you can trust, and scan all downloads before opening them.

Protecting Your Computer From Malware Install security updates coming from your operating system's maker Monitor the actions of your computer for unusual behavior Use legitimate software sources Install a Firewall that always runs Be prepared to lock down in case of an attack Keep your password secure and classified.

Internet Controls for Safety Firewalls: Form a barrier between two networks that can only be crossed with approved credentials These can be software (part of the Operating Sytem) or hardware (often on routers) barriers. Filters: Control what can be viewed on Internet. These typically block certain domains or specific websites using a blacklist/whitelist system. Sites not on the blacklist, or specifically on the whitelist, can be allowed through the filter. Parental Control setting: Filtering software that allows control over kids' access to the Internet as well as specific apps.