2 Malware Malicious software Programs designed to infiltrate or damage a computer system without the owner's informed consent.Viruses, worms, Trojan horses, adware, spyware
3 VirusA virus is a program that reproduces its own code by attaching itself to other executable filesThe virus code is executed when the infected file is executed.Most viruses do their "job" by placing self-replicating code in other programs
4 The Life Cycle Viruses embed themselves into the code of software They are harmless until the infected program is actually started (executed)
5 Who Writes Viruses- and Why? Viruses can be written by anyoneIt could include researchers for demonstration purposesIn some cases, they can be written by pranksters.These viruses get passed around and can be altered by other people.
6 Are All Computer Viruses Harmful? Every computer virus ever written takes up disk spaceMany of them are able to remain in the computer's memory taking controlSome viruses are written to halt the computerThere are viruses created to deliberately destroy data on the disk
7 What do they do? slower processing decreased memory a disk drive LED lighting up for no apparent reasona screen going blank when you touch a certain letter on your keyboarddelete datacopy password
8 How do you get the virus??Viruses are contracted by downloading files from the InternetClose to 75% of all viruses are contracted through friendly means
9 How do you prevent virus?? Use less popular clients; virus developers don't target these clients.Mac users are less prone to contracting computer viruses (remember virus creators are looking for the highest body count)Anti-virus software is not a ‘cure all’Run a virus scan on any executable (.exe) files or MS Word/Excel Files that are ed to you
10 Common TypesBoot Sector - Stays resident by infecting the boot sector of the computerFAT Virus - infects the File Allocation Table of a hard drive, these usually cause a loss of files that are on a hard driveMemory viruses - execute and stay resident in memory
11 Macro viruses - viruses that attach themselves to documents in the form of macros. Usually in Microsoft Word and Microsoft Excel documentsCMOS viruses - viruses that make themselves resident in the CMOS . These viruses can damage the hardware of the computer
12 Worms - A computer worm is a software program that is designed to copy itself from one computer to another, without human interaction.Unlike a computer virus, a worm can copy itself automatically.You might have heard of specific computer worms, including the Sasser worm, the Blaster worm, and the Conficker worm.
13 Trojan Horse - designed to cause damage or do something malicious to a system, but are disguised as something useful.Unlike viruses, these don't make copies of themselves.Trojan horses are designed to allow a hacker remote access to a target computer system.
14 SpywareSoftware that performs certain behaviors, generally without appropriately obtaining your consent first, such as:AdvertisingCollecting personal informationChanging the configuration of your computer
15 Spam Unsolicited e-mail annoying and time consuming people have lost money to bogus offers
16 Phishing“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”“We are updating all accounts on our mail server. Please click the link below and update your username and password. If you don’t reply within 48 hours your account will be closed”
17 Hackersa hacker is a person who breaks into computers, usually by gaining access to administrative controlsmost hackers are thieves, looking for personal data or bank/ credit card information
18 How do hackers gain access to your account? worms, viruses and Trojan horse programs make your computer vulnerable to remotely controlled exploitsUse ’security holes’ through which they can gain entry without much troubleuse programs that are designed to figure out the passwords to your accountsuse Brute Force password attacks
19 The Bottom LineTo prevent your computer from contracting a virus, use a virus protection program.Keep up-dated on what viruses are going around.Don't open that is suspicious or that you don't recognize the senders name.Activate firewallAlways back up your files!If your computer does contract a virus, be prepared to reformat and start all over again!
20 Hopefully, you will not be the victim of a virus or hacker!