Mohamad Syahrul Riduan bin Mohamad nizam

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Physical Security Logical/Computer Security What other examples?
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Viruses, Worms & Trojan Horses
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Viruses & Destructive Programs
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Information Technology Software. SYSTEM SOFTWARE.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Return to the PC Security web page Lesson 5: Dealing with Malware.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Technology Competency Computer Infestations Mr. Locke.
CONTENTS What is Virus ? Types of computer viruses.
Business Technology Applications What is Malware.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Computer virus Done: Aaesha Mohammed ID: H
1 3 Computing System Fundamentals 3.7 Utility Software.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
Computer safety Filip Hruby.
Managing Windows Security
Intro to Malware Attacks
3.6 Fundamentals of cyber security
CYBER SECURITY...
COMPUTER VIRUSES Computer Technology.
Computer Virus Nick DeFabis.
Why Computer Security Need???
SEMINAR ON PC SECURITY FROM VIRUSES
Protecting Devices The Future Citizen.
COMPUTER SECURITY AND SAFETY ETHICS AND PRIVACY
Protecting Devices The Future Citizen.
Fix to Quick Heal Update Error 1002 Call
Steps to Fix McAfee Error 1336 Call
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
Computer Applications Unit B
VIRUSES and DESTRUCTIVE PROGRAMS
Mohamad Syahrul Riduan bin Mohamad nizam
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
With so many major corporations and people falling victim to cybercrimes and with viruses and malware infecting several computers and networks around.
Computer Viruses.
Computer Ethics.
Computer Virus S a F E T y.
Lab 7 – Defeating MALWARE
Viruses.
Malicious Software Network security Master:Mr jangjou
Networking for Home and Small Businesses – Chapter 8
Protecting Devices The Future Citizen.
Ch9 E-commerce Security
Networking for Home and Small Businesses – Chapter 8
Technology Mrs. Huddleston
Networking for Home and Small Businesses – Chapter 8
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Worms, Viruses and Other Creepy Computer Things:
An overview over Botnets
Presentation transcript:

Mohamad Syahrul Riduan bin Mohamad nizam 2013719269 Mohamad Firdaus bin Fauzi 2013385751 Nurul Adilah Bt sa’ari 2013931345 Siti zuliana Bt Omar 2014437274 Nur Fatehah Bt Roslan 2014474492

Objective Question Which of the following is the strategies for green computing A. Recycling B. Regulating manufacturing process C. Extending the life of computer D. All of the above Malicious software also know as A. Passion software B. Application software C. Systemware D. Malware Select the CORRECT term to describe malware A. Viruses B. Worm C. Trojan horses D. All of the above

An attempt to slow down or stop a Computer System by flooding the system with request for information is called a A. Virus B. Worm C. Trojan horse D. Denial – of – service attack Computer viruses, worm, trojan horses and rookits are classified as A. Malicious software B. Spy software C. Network Software D. Utility Software

Essay Question Define the symptoms of a computer’s having been infected with a virus? The symptoms of a computer having been infected with a virus the operating systems runs much slower than usual, file become corrupted, your screen display unusual message or image, the system properties change and operating system does not start up.