Viruses and Virus Protection

Slides:



Advertisements
Similar presentations
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
Advertisements

What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Nasca Internet Networking and Security viruses.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware, Viruses and Malware What the fuss is all about.
 a crime committed on a computer network, esp. the Internet.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Viruses & Destructive Programs
Managing Windows Security
An Introduction to Phishing and Viruses
Hacking Computer crime and cyber security.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Malware aka- malicious software By: Ken Fogel
COMPUTER VIRUSES Computer Technology.
Computer Security Std XI– Chapter 8.
Protect Your Computer Against Harmful Attacks!
f
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Call AVG Antivirus Support | Fix Your PC
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Computer Viruses.
Computer Technology Day 21
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Forensics Week 12.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Malware CJ
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
9 ways to avoid viruses and spyware
Chap 10 Malicious Software.
King Saud University- College OF Applied Studies
Malware and how to defend against it
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Viruses and Virus Protection A basic overview by Jacob Benko

Definitions Malware: Virus: A piece of software designed to take over or damage a computer Includes viruses, worms, trojans, backdoors, spyware, key loggers, dialers, browser hijackers, etc Virus: Strictly: “Self replicating code” Technically must reside within some “host” file, and cannot spread to other computer unless a user sends it.

Common Threats Worm: Trojan Horse Backdoor: A specific type of virus that can stand alone without attaching to a process, and spreads itself between computers by some means Trojan Horse A piece of malware that is disguised as a legitimate program Backdoor: A piece of software that allows access to a computer bypassing standard authentication

AIM Viruses Most are links to a webpage where you download the malware Usually place the message in a user profile or relay the message to everyone on a user’s buddy list A type of worm that uses social engineering to spread Use cleverly (and often timely) worded messages to entice the user into clicking the link Ex: on Valentines day: “Valentine’s sexy pix”

Internet Worms Often use network vulnerabilities to automatically spread ALL operating systems contain security flaws, and many worms use these flaws to spread to non-updated computers Famous worms include Nimda, Code Red (2001) Blaster, Sobig (2003) MyDoom, Sasser (2004)

Trojan Horses Must be spread by a user from one computer to another. Common transmittal means: Email Attachments Cracks and Keygens from websites P2P Files Many P2P networks are saturated with files infected by trojan horses These files may appear to work and perform their task, but in the background may install some malware such as a backdoor.

Protection Antivirus software made by McAfee and Norton/Symantec have “on access scans” These scan any file before it runs, to check it for known viruses This list of known viruses will not contain every possible threat, and newer viruses may not be recognized This list is constantly updated by the AV company as they identify threats, and you must update to this list regularly to stay protected

Basic Guidelines If you are not sure about an AIM message or an email attachment either So not open it at all, or Ask the person who sent it if they meant to send it, and scan the file for viruses manually Keep your antivirus up to date Most have auto-update feature, make sure it is on Be wary of any programs you download from an untrusted webpage or P2P networks

Any Questions?

Thanks for not coming More food for us