ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Unit 19 INTERNET SECURITY
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
STAY SAFE!! Don’t fall for the same old tricks !!.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer security By Shreya Houji. VirusesViruses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
THIS powerPOINT Is ABOUT virus’s AND OTHER Harmful RISKS.
Viruses for brownies Brownies Meet... viruses. So, what are viruses? Trouble makers. They will ruin your computer. They usually arrive to you by ,
Computer security By Isabelle Cooper.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Viruses. Learning Objectives: At the end of this lesson you should be able to:
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Writing an message Finish off your slide on recommendations of how to write an .
1 3 Computing System Fundamentals 3.7 Utility Software.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
For more information on Rouge, visit:
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Viruses, worms and trojans.
How to build a good reputation online
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Internet Safety- Part II
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
What devices use the internet?
Presentation transcript:

ICT Functional Skills Viruses and other malware

What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses, Worms, Trojans The type of damage is called the payload Malware can make things stop working, delete files, slow the computer down or steal information

How does it infect the computer? Viruses and other malware enter a computer through files, s and the internet e.g. – Sharing a file via a memory stick – Opening an attachment – Installing dodgy software from the Internet

How to avoid viruses / malware! 1 The best way to reduce the risk of viruses and malware is to use anti-virus software – This can stop viruses entering and get rid of viruses that are on a computer – But you must keep it up to date – And run a frequent scan of your computer to make sure nothing nasty has arrived on it

How to avoid viruses / malware! 2 If you don’t know they’re safe: – Don’t open files from someone else – Don’t open attachments – Don’t download anything from the internet You can run a virus scan on files before you open them – then you can remove them if they’re infected

Sample exam question on viruses Viruses can be a problem when using the internet. Give two ways to minimise the risk of computer viruses. (2) Feb 2012

Model answer Any two suitable methods from these: Do not open attachments from unknown sources Do not download files from untrustworthy sources Install virus checker / anti virus software Keep virus checker updated Feb 2012

Another sample exam question on viruses Tom has received a message with an attachment from an unknown sender. What should Tom do with the message and why? (2) Jun2012

Model answer One mark for any of the following: Delete the message Send it to Spam/Junk (folder) Do not open attachment Scan the attachment with anti-virus software Another mark for explanation: …because it may contain a virus/malware Jun 2012