Related to data, hardware, and software

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
Chapter 9: Privacy, Crime, and Security
Stole it Straight from Wilkes County. Questions from 1.01.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Nasca Internet Networking and Security viruses.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
VIRUSES and DESTRUCTIVE PROGRAMS
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Technology Competency Computer Infestations Mr. Locke.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Information Systems Design and Development Technical Implications (Software) Computing Science.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter 1 Describe the purpose, components, and use of a computer system.
Chapter Objectives In this chapter, you will learn:
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
3.6 Fundamentals of cyber security
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computing Issues that Affect Us All
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Ethics.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Freeware, Shareware, and Public Domain
Unit 6 Digital Literacy Study S3 Obj 2-2
Part 3.
Viruses.
King Saud University- College OF Applied Studies
Unit 6 Digital Literacy Study S3 Obj 2-2
Chap 10 Malicious Software.
Ch9 E-commerce Security
Computing Issues that Affect Us All
Technology Mrs. Huddleston
Computing Issues that Affect Us All
Worms, Viruses and Other Creepy Computer Things:
Presentation transcript:

Related to data, hardware, and software Security, Confidentiality, and Ethics Related to data, hardware, and software

CLASSIFYING SOFTWARE

Commercial Software Considered to be proprietary software Copyrighted by an individual or business Permission needed in order to copy Software is usually disabled after a specified number of uses if not registered

Shareware Copyright protected Distributed free on a trial basis Payment by the honor system for satisfied users Owner retains the copyright

Freeware Given away free of charge Owner retains the copyright Program cannot be sold or altered without permission Not necessarily free to copy and distribute

Public Domain Software Not copyrighted Donated for public use Free to copy and distribute

Types of Viruses

Bomb Destructive computer code or virus designed to activate at a specific time

A program intended to scare users into thinking they have a virus Hoax A program intended to scare users into thinking they have a virus

Phage A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant

A virus designed as a useful piece of software Trojan Horse A virus designed as a useful piece of software

A computer program designed to cause damage to computer files Virus A computer program designed to cause damage to computer files

Worm Destructive computer program that bores its way through a computer network

Bomb, Hoax, Phage, Trojan Horse, Virus, Worm __________________ 1. The Michelangelo virus was to take effect on infected computers on March 8. ____________________ 2. The Jerusalem virus was one of the earliest found. Its trigger date was Friday the 13th. ____________________ 3. This virus was introduced to a single computer. It infected thousands of computers as it traveled through networks. ____________________ 4. The MacMag virus infected computers that accessed a certain bulletin board. The trigger date was March 2, 1988. ____________________ 5. IBM had a major virus problem outbreak called Christmas Tree which slowly worked its way through the company’s computers. ____________________ 6. The Password virus was disguised as a log-in screen. The virus screen captured and stole the user’s log-in and password.

Bomb, Hoax, Phage, Trojan Horse, Virus, Worm ____________________ 7. A freeware program called Homework Helper was intended to destroy computer systems rather than helping students with homework. ____________________ 8. The screen appears as a dark gray box terminating applications that are running. Once terminated the virus modifies other programs, databases and operating systems. ____________________ 9. A program called Stupid Mack Tricks could fool a user into thinking the computer was infected by a virus. This program is loved by many practical jokers. ____________________ 10. An AIDS information program was distributed on disk to thousands of users. The disk was supposed to provide information, but instead it took over the computer system. ____________________ 11. The “Good Times” E-mail message was widely reported as a virus affecting computers by opening E-mail. Experts agree that viruses cannot be spread through e-mail. ____________________ 12. A program that infects applications downloaded to a PDA by connection to a PC. ____________________ 7. A freeware program called Homework Helper was intended to destroy computer systems rather than helping students with homework. ____________________ 8. The screen appears as a dark gray box terminating applications that are running. Once terminated the virus modifies other programs, databases and operating systems. ____________________ 9. A program called Stupid Mack Tricks could fool a user into thinking the computer was infected by a virus. This program is loved by many practical jokers. ____________________ 10. An AIDS information program was distributed on disk to thousands of users. The disk was supposed to provide information, but instead it took over the computer system. ____________________ 11. The “Good Times” E-mail message was widely reported as a virus affecting computers by opening E-mail. Experts agree that viruses cannot be spread through e-mail. ____________________ 12. A program that infects applications downloaded to a PDA by connection to a PC. Bomb, Hoax, Phage, Trojan Horse, Virus, Worm ____________________ 7. A freeware program called Homework Helper was intended to destroy computer systems rather than helping students with homework. ____________________ 8. The screen appears as a dark gray box terminating applications that are running. Once terminated the virus modifies other programs, databases and operating systems. ____________________ 9. A program called Stupid Mack Tricks could fool a user into thinking the computer was infected by a virus. This program is loved by many practical jokers. ____________________ 10. An AIDS information program was distributed on disk to thousands of users. The disk was supposed to provide information, but instead it took over the computer system. ____________________ 11. The “Good Times” E-mail message was widely reported as a virus affecting computers by opening E-mail. Experts agree that viruses cannot be spread through e-mail. ____________________ 12. A program that infects applications downloaded to a PDA by connection to a PC.