Viruses & Destructive Programs

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 6 Digital Literacy Study S3 Obj 2-2
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Viruses & Destructive Programs
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
1 Higher Computing Topic 8: Supporting Software Updated
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Tonga Institute of Higher Education IT 141: Information Systems
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
Unit 4 IT Security.
War between Good and Evil.
Lesson 3 Safe Computing.
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Information Security 101 Richard Davis, Rob Laltrello.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Risk of the Internet At Home
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Stay Safe While Using The Internet
Unit 6 Digital Literacy Study S3 Obj 2-2
Viruses.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 6 Digital Literacy Study S3 Obj 2-2
Chap 10 Malicious Software.
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Viruses & Destructive Programs Unit 4

Computer Virus Small software programs that are designed to spread from one computer to another and to interfere with computer operation; they usually perform some type of harmful activity. Viruses can either be considered a nuisance or destructive. A virus can Corrupt files Destroy data Display irritating messages Corrupt computer systems Some viruses replicate themselves, which means that they copy themselves over and over.

Types of Viruses Not all computer viruses behave, replicate, or infect the same way. Viruses and malware have several different categories.

Virus Types/Classification Description 1. Trojan Horse   Has the appearance of having a useful and desired function. Secretly the program performs undesired functions. Does not replicate itself. 2. Worm A program that makes copies of itself through disk to disk or through email. 3. Bootsector Virus Attaches itself to the first part of the hard disk that is read by the computer during the boot up process. 4. Macro Virus Uses another application’s macro programming language to distribute themselves. They infect documents such as MS Word, Excel, etc.

Virus Types/Classification Description 5. Memory Resident Virus   A virus that resides in a computer’s RAM. They stay in memory after its initiating program closes. 6. Rootkit Virus An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files. 7. Polymorphic Virus Copies itself by creating multiple files of itself. It changes its signature making it hard for antivirus software to detect. 8. Logic Bombs/Time Bombs Programmed to initiate at a specific date or when a specific event occurs.

Spreading Viruses Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading files from the Internet. Viruses attach themselves to files with .exe, .com, or .vbs filename extensions. When you open the infected file, the virus opens and waits to infect the next program you run or disk you use. Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves. You may not even know your computer has a virus, thus making it easier to spread the virus.

How Viruses Spread

The How Brief Description 1. Email Attachments   Email attachments may carry viruses. 2. Rogue Websites A virus may be lurking on untrustworthy websites. Just clicking on them may infect your computer. 3. Networks Your computer may be infected through a network, which spreads from another computer connected to that same network. Keeping the network’s anti-virus software updated can help the situation. 4. Infected Boot Disks A virus can be spread if an infected disk is in your hard drive and you attempt to restart. Always know the origin of any media you use with your computer system. 5. Phishing Schemes Schemes to get your personal information from you through email messages pretending to be legitimate sites. When you visit these sites, spyware, adware, and viruses are automatically installed on your computer.

The How Brief Description 6. Infected Software   Freeware or shareware may infect your computer system. Only download from trusted sites. 7. Hackers The best way to protect yourself from hackers is to have a firewall and up-to-date antivirus software installed at all times. 8. Instant Messaging Instant Messaging is a target for hackers who see it as an easy way to get people to click on links. Only chat with people you know, and don’t follow links you don’t recognize. 9. Fake Antivirus Software Only download antivirus programs from trusted sites or from websites that you know are complete legit. 10. Mobile Devices When plugging in peripheral devices into your computer, be sure that your antivirus software is up to date to remove any virus that may be installed when you plug in your device for the first time. 11. Friends and Relatives Viruses may come from family and friends, email attachments, or using social media sites. If you get an attachment with a .exe or .dll extension. DO NOT OPEN IT!

Protecting your Computer Just as you protect yourself from illness and disease, you can cut the chances of your computer systems being infected by protecting your computer.

Ways to Protect your computer 1. Install trusted anti-virus program and run it! 5. Set up automatic scans 2. Install anti-spyware and anti-malware programs 6. Install updates coming from your operating system software programs 3. Avoid suspicious websites 7. Watch your downloads 4. Never open email attachments without scanning them first 8. Install a firewall

Computer Theft & Privacy The most popular tech item to steal are Laptops which are then most often sold. Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations. Use passwords to keep your files and information safe and to keep most people out of your files. View the 5 minute video on the importance of using strong passwords to help protect your privacy. Record at least three things you learned.

Hacking The Penalty Hacking Hacking is finding a weakness in a computer or computer network with the objective of doing damage or stealing personal information. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The Penalty Fine or imprisonment depending on the seriousness The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done. Hackers cost businesses money because of downtime and loss of data

Internet Controls Types of controls for Internet safety Firewall: forms a barrier between two networks Filter: controls what can be viewed on Internet Parental Control: Software allows parental control over what kids do on the Internet.

Freeware & Shareware Freeware Shareware Software Copyrighted computer software that is made available for use free of charge for an unlimited time. Shareware Software Copyrighted computer software that is typically obtained free of charge either by downloading from the Internet or another source. It is usually available for a trial period, and then payment must be made for permanent use. A user gets to try out the program, and thus shareware has also been known as "try before you buy."

Continue to the viruses assignment PowerPoint and complete on Canvas Look for the Extra Credit Opportunity!