Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.

Similar presentations


Presentation on theme: "Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans."— Presentation transcript:

1 Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans

2

3

4

5

6

7

8

9

10 VIRUSES

11 What is a computer virus?  A computer program that can copy itself and infect the computer.  It can only spread from one computer to another when it’s host is taken to the target computer.

12 Dangers/Symptoms COMPUTER:  Corrupts and deletes data files  can make computer a “slave”  slow down or shuts down computer fully APPLICATIONS/PROGRAMS:  Applications won’t work properly  Programs disappear EXTRAS:  unusual error messages  New icons  Strange sounds/music

13 Preventions  Keep firewall on.  Keep the computer operating system up-to-date  Use updated antivirus and anti- spy ware software on the computer

14 Example Of Virus  The “Nimda” virus was one of the most complicated viruses, since it had up to 5 different methods of infecting  Its methods include: email, open network shares, browsing of websites, back doors left behind, and exploitation of Microsoft  The e-mail message has a file called README.EXE which unleashes this virus.

15 Virus Protection Norton Antivirus  Scans emails, and IM’s for infections  Detects, and stop new threats  Prevents bots from taking control of your PC  Finds and removes root kits  Prevents Internet worms NOD32 Antivirus  protect you from viruses and spy ware  smart and fast, while adding removable media security, new diagnostic and recovery tools, and more advanced heuristics. Kaspersky Antivirus  Protects from viruses and spy ware, Infected Websites, Hacker attacks, Spam and phasing, Identity theft $79.99 $58. 99 $79.95

16 WORMS

17 What is a Worm?  It’s a software program which can duplicate itself automatically without human interference from one computer to another. They spread within a network and can also spread through USB’s.

18 What does it do?  A worm takes advantage of files or any other features used to transport information on your system to travel unaided.  Worms consume a lot of system memory and can slow down your computer.

19 Who do they affect?  Worms affect networked environments (Computers that are connected with one another)

20 Protect yourself!  1. Keep firewall on  2. Keep operating system up-to-date with security updates.  3. Used updated antivirus soft wares from a trusted source

21 Blaster Worm  Affected computers with Windows XP and Windows 2000.  Spread by spamming itself on to a large amounts of random IP addresses.  The worm contained two messages. The first : I just want to say LOVE YOU SAN!!  And: billy gates why do you make this possible ? Stop making money and fix your software!!  If worm detects a connection to the internet, it can lead to the system restarting every 60 seconds.

22

23 Trojan

24 What’s a Trojan?  It’s a worm imbedded in a file that appears safe or a software from a trusted source  Tricks users into opening it or downloading it.

25 Types of Trojans 1. Data Sending Trojans 2. Destructive Trojans 3. Proxy Trojans 4. FTP Trojans

26 How do you get it?  Software downloads  Email attachments  Applications  Downloading or uploading of files

27

28 Removal  Antivirus software detects and deletes Trojans  By erasing all data from the hard disk and reinstalling the operating system and required software  Firewall program  Anti Trojan Elite

29 How do I prevent Trojans?  DO NOT download files from people or sites which you aren’t sure about.  Watch out for hidden file extensions!  DO NOT think you are completely safe just because you run anti-virus programs.  DO NOT follow unsolicited links or open attachments in e-mail messages that you did not ask for.  Use an Internet firewall.

30 ILOVEYOU or LOVELETTER  Attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. It arrived in email inboxes with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER- FOR-YOU.TXT.vbs".

31 Black Hat Hackerr

32 Shawn “Napster” Fanning

33

34 Quiz Time :]

35 Some of the Dangers and Affects of A computer virus include:  A. The Computer will do the Chicken Dance and then morph into a flu vaccine.  B. It will corrupt and delete files as well as show some unusual messages.  C. You computer will blow up and turn into ashes.

36 Some of the Dangers and Affects of A computer virus include:  A. The Computer will do the Chicken Dance and then morph into a flu vaccine.  B. It will corrupt and delete files as well as show some unusual messages.  C. You computer will blow up and turn into ashes.

37 Worms usually affect…  A. Muddy creatures.  B. People who step on worms.  C. Networks enviroments.

38 Worms usually affect…  A. Muddy creatures.  B. People who step on worms.  C. Networks enviroments.

39 A Black Hat Hacker is..  Someone who coughs a lot when he smokes.  Someone who is shy and so they always wear a hat.  Someone who hacks his way into a system.

40 A Black Hat Hacker is..  Someone who coughs a lot when he smokes.  Someone who is shy and so they always wear a hat.  Someone who hacks his way into a system.

41 Thank you for listening to our presentation.


Download ppt "Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans."

Similar presentations


Ads by Google