2 Computer VirusSmall software programs that are designed to spread from one computer to another and to interfere with computer operation; they usually perform some type of harmful activity.Viruses can either be considered a nuisance or destructive.A virus canCorrupt filesDestroy dataDisplay irritating messagesCorrupt computer systemsSome viruses replicate themselves, which means that they copy themselves over and over.
3 Types of VirusesNot all computer viruses behave, replicate, or infect the same way. Viruses and malware have several different categories.
4 Virus Types/Classification Description1. Trojan HorseHas the appearance of having a useful and desired function. Secretly the program performs undesired functions. Does not replicate itself.2. WormA program that makes copies of itself through disk to disk or through .3. Bootsector VirusAttaches itself to the first part of the hard disk that is read by the computer during the boot up process.4. Macro VirusUses another application’s macro programming language to distribute themselves. They infect documents such as MS Word, Excel, etc.
5 Virus Types/Classification Description5. Memory Resident VirusA virus that resides in a computer’s RAM. They stay in memory after its initiating program closes.6. Rootkit VirusAn undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.7. Polymorphic VirusCopies itself by creating multiple files of itself. It changes its signature making it hard for antivirus software to detect.8. Logic Bombs/Time BombsProgrammed to initiate at a specific date or when a specific event occurs.
6 Spreading VirusesViruses spread because people distribute infected files by exchanging disks and CDs, sending attachments, and downloading files from the Internet.Viruses attach themselves to files with .exe, .com, or .vbs filename extensions.When you open the infected file, the virus opens and waits to infect the next program you run or disk you use.Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves.You may not even know your computer has a virus, thus making it easier to spread the virus.
8 The How Brief Description 1. Attachmentsattachments may carry viruses.2. Rogue WebsitesA virus may be lurking on untrustworthy websites. Just clicking on them may infect your computer.3. NetworksYour computer may be infected through a network, which spreads from another computer connected to that same network.Keeping the network’s anti-virus software updated can help the situation.4. Infected Boot DisksA virus can be spread if an infected disk is in your hard drive and you attempt to restart. Always know the origin of any media you use with your computer system.5. Phishing SchemesSchemes to get your personal information from you through messages pretending to be legitimate sites. When you visit these sites, spyware, adware, and viruses are automatically installed on your computer.
9 The How Brief Description 6. Infected SoftwareFreeware or shareware may infect your computer system. Only download from trusted sites.7. HackersThe best way to protect yourself from hackers is to have a firewall and up-to-date antivirus software installed at all times.8. Instant MessagingInstant Messaging is a target for hackers who see it as an easy way to get people to click on links. Only chat with people you know, and don’t follow links you don’t recognize.9. Fake Antivirus SoftwareOnly download antivirus programs from trusted sites or from websites that you know are complete legit.10. Mobile DevicesWhen plugging in peripheral devices into your computer, be sure that your antivirus software is up to date to remove any virus that may be installed when you plug in your device for the first time.11. Friends and RelativesViruses may come from family and friends, attachments, or using social media sites. If you get an attachment with a .exe or .dll extension. DO NOT OPEN IT!
10 Protecting your Computer Just as you protect yourself from illness and disease, you can cut the chances of your computer systems being infected by protecting your computer.
11 Ways to Protect your computer 1. Install trusted anti-virus program and run it!5. Set up automatic scans2. Install anti-spyware and anti-malware programs6. Install updates coming from your operating system software programs3. Avoid suspicious websites7. Watch your downloads4. Never open attachments without scanning them first8. Install a firewall
12 Computer Theft & Privacy The most popular tech item to steal are Laptops which are then most often sold.Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations.Use passwords to keep your files and information safe and to keep most people out of your files.View the 5 minute video on the importance of using strong passwords to help protect your privacy.Record at least three things you learned.
13 Hacking The Penalty Hacking Hacking is finding a weakness in a computer or computer network with the objective of doing damage or stealing personal information. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.The PenaltyFine or imprisonment depending on the seriousnessThe federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.Hackers cost businesses money because of downtime and loss of data
14 Internet Controls Types of controls for internet safety Firewalls: forms a barrier between two networksFilters: controls what can be viewed on InternetParental Control: Software allows parental control over what kids do on the Internet
15 Freeware & Shareware Freeware Shareware Software Copyrighted computer software that is made available for use free of charge for an unlimited time.Shareware SoftwareCopyrighted computer software that is typically obtained free of charge either by downloading from the Internet or another source. It is usually available for a trial period, and then payment must be made for permanent use. A user gets to try out the program, and thus shareware has also been known as "try before you buy."
16 Continue to the viruses assignment PowerPoint Look for the Extra Credit Opportunity!