S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
V IDEO G AME A DDICTION By: Nikiya Kelly. V.G.A Background Addiction There are people around the world who play Video Games all day and night. I understand.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Risks & Dangers on the internet.. We will introduce you to the harm the internet could cause. - Sharing and posting personal information – By Chloé &
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Format Scandisk Defragmentation Antivirus Compression Software
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Welcome to our E-Safety
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Addiction? Addiction – the state of being enslaved to a habit or practice or to something that is psychologically or physically habit- forming to such.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
STAY SAFE!! Don’t fall for the same old tricks !!.
Computer Math. The Decimal System How do we represent “One Hundred and Twenty Five”? How do we represent “One Hundred and Twenty Five”? Simple: 125 !!!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
P ERSUASIVE WRITING Advertising. W HAT IS ADVERTISING ? Advertising is a tool used to get people to want to buy something. The main reason ads are created.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$
Technology Competency Computer Infestations Mr. Locke.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cassidy Culligan Digital Citizenship Project ED 505.
Computer security By Isabelle Cooper.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Take a tour around my slideshow to learn more about viruses.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Security Keeping you and your computer safe in the digital world.
Computer Viruses Standard A-4 (Safety Unit)
links and attachments: Help stop malware from spreading
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
Computer Viruses Standard A-4 (Safety Unit)
Presentation transcript:

S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris

S PYWARE IS …… Spyware is bad software that hides behind popup windows to harm your computer. Use popup windows that draw attention to it- saying you won a prize. Make computers operate extremely slowly. Make unwanted changes to your computer without permission.

Y OU CAN GET SPYWARE BY … You cause yourself to get spyware by clicking on popup windows Installing a software package They use fake system alert messages to say cancel, but it installing spyware. Piggybacked software installation, drive-by downloads, browser add-ons, masquerading as anti-spyware.

C AN YOU GET RID OF SPYWARE... You can get rid of spyware Buy legitimate anti-spyware software. Could cost a lot of money RARELY Your computer has not lost hope if it gets infected by spyware.

Y OU CAN PREVENT SPYWARE BY …. Using a spyware scanner Use a pop-up blocker. Disable Active-X. Be suspicious about installing new software. Close pop-up adds instead of clicking on them.

V IDEO GAME ADDICTION IS EXCESSIVE OR COMPULSIVE USE OF COMPUTER AND VIDEO GAMES THAT INTERFERES WITH DAILY LIFE.

F ACTS ABOUT VIDEO GAME ADDICTION Children who play four to five hours a day, they no time for their family, homework, friends, or play sports. Adults who play video games for four to five hours a day, they have no time for their family, friends, and their jobs.

WARNING SIGNS FOR VIDEO GAME ADDICTION ! Playing for increasing amounts of time Thinking about gaming during other activities Gaming to escape from real- life problems, anxiety, or depression Lying to friends and family Feeling irritable when trying to cut down on gaming

W AYS TO PROTECT YOUR CHILDREN Logs of when the child plays and for how long Problems resulting from gaming How the child reacts to time limits

F ACTS A BOUT V IDEO G AME ADDICTION MMRPG stand for massive multiplayer online role playing game. Age are the most risk for gaming addiction

T HE B ASE OF B INARY N UMBERS Decimal numbers function on a base 10 system. This means that each time you moved one digit to the left, the value increases by a multiple of ten. Ex. 1 is 10^0, 10 is 10^1, 100 is 10^2, ect. Binary numbers differ from this because they use a base two system. This means that the rightmost number is 1, the number to the left of that is 1 to the power of 2, and so on. Ex. 1 is 2^0, 2 is 2^1, 4 is 2^2, ect.

N UMBERS Another thing that makes binary code different from decimal numbers is that binary code uses only two numerals, 1 and 0. You can remember this because “bi” means two, like bi cycle, and there are two numerals used in binary code.

R EADING B INARY N UMBERS Binary numbers read from right to left, the exact opposite of decimal numbers. As was stated earlier, binary code uses a base two, meaning that each number is greater than the number to the right of it by a power of two This can be seen here: …512, 256, 128, 64, 32, 16, 8, 4, 2, 1.

R EADING B INARY N UMBERS ( CONT.) Reading binary numbers is basically like adding. You add the numbers that are marked by a 1. *Remember, you read binary code from left to right. Since the smallest number in binary code is one, if the rightmost number is marked by a 1 we know to add one to the total, if it is marked by a 0, do not add one. If the next number (2^1, or 2) is marked by a 1, add two, if it is marked by a 0, add nothing.

R EADING B INARY N UMBERS ( CONT.) If the next number to the left (2^2, or 4) is marked by a 1, add four to the total. If it is marked by a 0, add nothing. See a pattern? Each time we move one digit to the left the value is multiplied by two, starting with one and going to two, then four, and so on to infinity. Also, we know whether or not to add a number to the total by whether or not it is marked with a 1. If it is marked with a zero instead, add nothing.

W RITING BINARY NUMBERS Writing binary numbers is similar to reading them; it is just done in the opposite order. When writing a binary number from a decimal number, chose the largest exponent of two that is equal to or smaller than your number. For example, if the number is 467, the largest exponent of two would be 256 or 2^8. The exponent of two, in this case 8, tells you how many numbers will follow this original number.

W RITING B INARY N UMBERS ( CONT.) After choosing the largest exponent of two possible, subtract that number from your decimal number. Ex = 211 Put down a 1. Now that your new number is 211, you need to find the largest exponent of two that is smaller than or equal to 211. The next number down, 128, is small enough, so you mark it with a 1 and subtract it from = 83

W RITING B INARY N UMBERS ( CONT.) Now your number is 83, and you must find the next exponent of two that is still smaller than it, which in this case is also the next smallest number, 64. Repeat as in the previous steps, marking with a 1 and subtracting from the previous number. Your new number is 19, and the next smallest number is 32, which is too big, so you mark that spot with a 0.

W RITING B INARY N UMBERS ( CONT.) The number after 32, which is 16, is small enough, so you subtract, and mark 16 with a 1. The new number is 3, and the next two numbers, 8 and 4, are both two big, so you mark those spots with a zero. Two is small enough, so you repeat marking and subtracting, and the new number is 1. You subtract this from the final number, which is also 1, and mark with a one.

V IRUSES A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program.

W ORMS A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

T HE O RIGINS OF V IRUSES Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person

T HE E VOLUTION OF V IRUSES As virus creators became more sophisticated, they learned new tricks. One important trick was the ability to load viruses into memory so they could keep running in the background as long as the computer remained on.

Spyware Video Game Addiction Binary Numbers Viruses $100 $200 $300 $400 $500 Game board

W HAT IS S PYWARE ? Highly trained professionals to spy on ware houses. Software that hides behind popup windows to harm your computer. Program to prevent your computer from being infected by viruses. Software that completely crashes your computer once it infects it.

C ONGRATULATIONS, Y OU E ARNED $100 ! Go Back to the Game Board

 S ORRY, Y OU G OT Q UESTION 1 W RONG  Helpful Hint: Spyware masquerades Itself Please, try again

H OW D O Y OU G ET S PYWARE ? By calling the product’s number to order. Buy it on Amazon.com. Go to a special spyware store and buy it. Clicking on popup windows.

C ONGRATULATIONS, Y OU E ARNED $200 Go Back to the Game Board

S ORRY, Y OU G OT Q UESTION 2 W RONG Helpful Hint: You cannot order spyware onto your computer. Please, try again

I F YOUR COMPUTER / LAPTOP IS INFECTED BY SPYWARE, CAN IT BE FIXED ? Yes No It’s possible None of the above

C ONGRATULATIONS, Y OU E ARNED $300 Go Back to the Game Board

S ORRY, Y OU G OT Q UESTION 3 W RONG Helpful Hint: Your Computer isn’t completely hopeless if it’s infected by spyware. Please, try again

H OW DO YOU GET RID OF SPYWARE ? Get rid of your computer Buy legitimate anti-spyware software Restart your computer multiple times Spend billions of dollars on someone who can fix the problem

C ONGRATULATIONS, Y OU E ARNED $400 Go Back to the Game Board

S ORRY, Y OU G OT Q UESTION 4 W RONG Helpful Hint: Spending an extreme amount of money to fix one computer is not necessary. Please, try again

H OW CAN YOU PREVENT SPYWARE FROM INFECTING YOUR COMPUTER ? Don’t click on popup adds Prevent spyware scans Click on ONLY one popup add to make them all go away Stop getting on the internet

C ONGRATULATIONS, Y OU E ARNED $500 Go Back to the Game Board

S ORRY, Y OU G OT Q UESTION 5 W RONG Helpful Hint: Clicking on one popup add can lead to many more popup adds. Please, try again

W HICH IS A WARNING SIGN OF VIDEO GAME ADDICTION ? Playing for increasing amounts of time Not thinking about gaming during other activities Playing for decrease amounts of time Not lying to friends or families

G OOD JOB ! Click here!

S ORRY TRY AGAIN Go back!

WHAT CAN HAPPEN TO AN ADULT WHEN THEY PLAY FOR FOUR OR FIVE HOURS A DAY ? No time for their family, friends, and jobs Have time for their family Have times to hang out with their friends Doing a good job on their jobs

G OOD JOB ! Click here!

S ORRY TRY AGAIN Go back!

W HAT DOES MMORPG STAND FOR Massive multiplayer online role playing game Massive more online role playing game Massive multiplayer on role playing game Massive more on role playing game

G OOD JOB ! Click here!

S ORRY TRY AGAIN Go back!

W HICH AGE GROUP IS AT THE MOST RISK FOR GAMING ADDICTION ?

G OOD JOB ! Click here!

S ORRY TRY AGAIN Go back!

W HICH ONE IS NOT WHAT YOU CAN DO TO PROTECT YOUR CHILDREN FROM VIDEO GAMES ADDICTION ? Logs of when the child plays and for how long Let your children play as long as they can Not care about them Don’t care about how they react

G OOD JOB ! Click here!

S ORRY TRY AGAIN Go back!

H OW MANY NUMERIC SYMBOLS ARE USED IN BINARY NUMBERS ?

W RONG ! Sorry, that answer is incorrect. Hint: Think about it, bi nary. Try Again

C ORRECT ! That is the right answer! You have earned $100! Back to Game board

W HAT ARE THE NUMERALS USED IN BINARY CODE ? 0 and 1 1 and 2 2 and 3 0 and 3

W RONG ! That is not the right answer! Hint: Try to think simpler (i.e. smaller) Try Again

C ORRECT ! That is the right answer! You have won $200! Back to Game Board

W HAT IS THE BASE NUMBER OF BINARY CODE ?

W RONG ! That is an incorrect answer. Hint: Remember bi nary. Try Again

C ORRECT ! That is the right answer! You have won $300! Back to Game Board

T RANSLATE 495 INTO BINARY CODE

W RONG ! That is not the right answer. Hint: Remember what 1 and 0 mean. Try again

C ORRECT ! That is right! You have won $400! Back to Game Board

W HAT IS IN “ NORMAL ” NUMBERS ?

W RONG ! That is not right. Hint: Remember, exponents of two. Try Again

C ORRECT ! That is right! You have won $500! Back to Game Board

W HAT IS A VIRUS ? A small piece of software that piggybacks on real programs A small piece of software that uses computer networks and security holes to replicate itself. An attachment to messages, but does not replicate itself by automatically mailing itself to dozens of people in the victim's address book. The program claims to do one thing, but instead does damage when you run it.

C ONGRATULATIONS ! Go back to the game board

S ORRY ! Try again

W HAT IS A W ORM ? The program claims to do one thing, but instead does damage when you run it. A small piece of software that uses computer networks and security holes to replicate itself. A program that can infect other programs or documents. A silly message.

C ONGRATULATIONS ! Go back to the game board

SORRY Try again

A RE VIRUS CREATORS BECOMING MORE SOPHISTICATED ? True False

C ONGRATULATIONS ! Go back to the game board

SORRY Try again

D OES A WORM USUALLY EXPLOIT SOME SORT OF SECURITY HOLE IN A PIECE OF SOFTWARE OR THE OPERATING SYSTEM ? True False

C ONGRATULATIONS ! Go back to the game board

SORRY Try again

W HY ARE COMPUTER VIRUSES ARE CALLED VIRUSES Computer viruses are called viruses because they share some of the traits of biological viruses. A person has to write the code, test it to make sure it spreads properly and then release it. They just are. It has the ability to load viruses into memory so they could keep running in the background as long as the computer remained on.

S ORRY Try again

C ONGRATULATIONS ! Go back to the game board

B IBLIOGRAPHY 96/binary.html