UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Let’s Talk About Cyber Security
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Issues, Ethics, & Emerging Technologies in Education
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
All about viruses, hacking and backups By Harriet Thomas.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Computer Security Keeping you and your computer safe in the digital world.
Viruses & Destructive Programs
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
Unit 6 Digital Literacy Study S3 Obj 2-2
Viruses.
Unit 6 Digital Literacy Study S3 Obj 2-2
Chap 10 Malicious Software.
Presentation transcript:

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS

COMPUTER VIRUS  A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user.  Viruses can either be considered a Nuisance or Destructive.  They can  Corrupt files  Destroy data  Display irritating messages  Corrupt computer systems  Some viruses replicate themselves which means that they copy themselves over and over.

TYPES OF VIRUSES  Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Read the information and give a brief description in your own words of each type on your study guide.

TROJAN HORSE  A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

WORM  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself.

BOOT SECTOR VIRUS  Attaches itself to the first part of the hard disk that is read by the computer during the boot up process.

MACRO VIRUS  Uses another application’s macro programming language to distribute themselves. They infect documents such as MS Word, Excel, etc.

MEMORY RESIDENT VIRUS  Viruses that reside in a computers RAM. They stay in memory after its initiating program closes.

ROOTKIT VIRUS  An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.

POLYMORPHIC VIRUS  Copies itself by creating multiple files of itself. It changes its signature making it hard for antivirus software to detect.

LOGIC BOMBS/TIME BOMBS  Programmed to initiate at a specific date or when a specific event occurs.

SPREADING VIRUSES  Viruses spread because people distribute infected files by exchanging disks and CDs, sending attachments, and downloading files from the Internet.  Viruses attach themselves to files with.exe,.com, or.vbs filename extensions  When you open the infected file, the virus opens and waits to infect the next program you run or disk you use.  Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves.  You may not even know your computer has a virus, thus making it easier to spread the virus.

HOW VIRUSES SPREAD  Click on the clipart below to discover 11 ways viruses are spread in our computer systems.  Using a your own words, write a brief description of each on your study guide.

PROTECTING YOUR COMPUTER  Just as you protect yourself from illness and disease, there are ways you can cut the chances of your computer systems being infected.  Click on the clipart below to discover 11 suggestions for protecting your computer. List them on your study guide.

COMPUTER THEFT & PRIVACY  The most popular tech item to steal are Laptops which are then most often sold.  Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations.

PASSWORDS  Use passwords to keep your files and information safe and to keep most people out of your files.  Minimum of 8 characters  Combination of uppercase letters, lowercase letters, numbers, and symbols  No dictionary words – spelled backwards or forwards  No personal information  Use a different password for each system you access  Change your passwords regularly

HACKING  Hacking  Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. Their objective is to do damage or steal personal information.  The Penalty  The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.  Hackers cost business money because of downtime and loss of data

INTERNET CONTROLS  Types of controls for internet safety  Firewalls: forms a barrier between two networks  Filters: controls what can be viewed on Internet  Parental Control: Software allows parental control over what kids do on the Internet Firewall LAN WAN

FREEWARE & SHAREWARE  Freeware  is copyrighted computer software which is made available for use free of charge for an unlimited time  Shareware Software  Is typically obtained free of charge, either by downloading from the Internet or other source. A user tries out the program, and thus shareware has also been known as "try before you buy". A shareware program is accompanied by a request for payment, and the software's distribution license often requires such a payment.

PLEASE COMPLETE THE ATTACHED ACTIVITY AS A HOMEWORK ASSIGNMENT. The end! Look for the Extra Credit Opportunity!