信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 4: File Management, Virus Protection, and Backup
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
BUSINESS B1 Information Security.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
Course ILT Routine maintenance Unit objectives Discuss the necessity of applying software patches and fixes Discuss viruses and anti-virus strategy.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Information Systems Design and Development Security Precautions Computing Science.
Chapter Objectives In this chapter, you will learn:
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Technology Day 21
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.

信息处理技术 CH11 Security

Virus Protection, and Backup Computer Viruses 计算机病毒

A program that attaches itself to a file, reproduces itself, and spreads to other files A virus can perform a trigger event: –Corrupt and/or destroy data –Display an irritating message Key characteristic is their ability to “lurk” in a computer for days or months quietly replicating themselves What is a computer virus?

File virus - a virus that attaches itself to an application program. Boot sector virus - infects the system files that your computer uses every time you turn it on. Macro virus - infects a set of instructions called a “macro” What is a computer virus?

Appears to perform one function while actually doing something else –Not a virus, but may carry a virus –Does not replicate itself Another type of Trojan horse looks like a log- in screen PictureNote Trojan – arrives as named picture.exe and then tries to steal login and e- mail passwords How is a Trojan horse different from a virus?

7 A program designed to enter a computer system through security holes –Usually through a network from computer to computer –Does not need to be attached to a document to reproduce Mass-mailing worms –Klez, Netsky, MyDoom, and Bagle –Spoofed addresses 地址欺骗 What’s a worm?

What are the symptoms of a malicious code attack? Network traffic jam Denial of Service Browser reconfiguration Delete and modify files Access confidential information Performance degradation Disable antivirus and firewall software

Antivirus software is a set of utility programs that looks for and eradicates viruses, Trojan horses, and worms Antivirus Software: How can I avoid viruses and worms?

Hackers have created viruses that can insert themselves into unused portions of a program To counterattack the work of hackers, antivirus software designers created software with a checksum - a number calculated by combining binary values of all bytes in a file –Compares checksum each time you run a program How does antivirus software work?

Checks for a virus signature –A unique series of bytes used to identify a known virus How does antivirus software work?

“All the time” Most antivirus software allows you to specify what to check and when to check it When should I use antivirus software?

New viruses and variations of old viruses are unleashed just about everyday Check Web site of antivirus software publisher for periodic updates Some software periodically reminds you to check for updates How often should I get an update?

Antivirus software is pretty reliable, but viruses try to get around detection –Multi-partite viruses –Polymorphic viruses –Stealth viruses Antivirus software is not 100% reliable, but protection is worth the risk How reliable is antivirus software?

Some viruses don’t really exists A virus hoax arrives as an message containing dire warnings about a supposedly new virus that is on the loose –Recommends a strategy –Recommends forwarding the –Says no one has a fix for it yet Many cases it is a fake Virus Hoaxes: What’s a virus hoax?

What’s a virus hoax?

Don’t panic You can ignore a virus hoax You can validate the hoax by going to a reliable Web site that lists hoaxes and viruses What should I do about virus hoaxes?

You should now be able to: –Create valid names for files and folders –Use file management features –Describe how a computer physically stores files –Explain viruses, boot sector viruses, macro viruses, Trojan horses, worms, and Denial of Service attacks –Describe how antivirus software is used –Understand backup and restore plans –Compare backup devices Conclusion