Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
IT security By Tilly Gerlack.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Technology Competency Computer Infestations Mr. Locke.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
What they are and how to protect against them
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Presentation transcript:

Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT

MOST COMMON THINGS THAT WOULD MAKE YOUR COMPUTER SICK VIRUSES TROJANSSPYWARE Click on any of the categories above to find out

Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

Some viruses are relatively harmless to individuals They just themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

Computer Virus is: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)Man made software b)Violent convict from the movie “Conair” c)Cause for widespread stomach flu among networked computers d)Computer word processor Go to the second quiz

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

Some viruses are relatively harmless to individuals They just themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

The “I Love You” Virus: QUIZ#2 QUIZ#2 Are you ready? Here is another QUIZ… a)Occurs on Valentine’s Day b)Is in love with computers c)Caused $1 Billion in damages d)It was first featured in a romantic comedy starring Hugh Grant

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?

Some viruses are relatively harmless to individuals They just themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?

Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?

In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?

The viruses hardly ever replicate themselves to other computers: QUIZ#3 QUIZ#3 Are you ready? Here is another QUIZ… TRUE FALSE

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU

It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?

There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE

There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS

What is Trojan Horse: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)USC Football MascotUSC Football Mascot b)It’s a program that contains or installs a malicious programIt’s a program that contains or installs a malicious program c)Computer VirusComputer Virus

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?

There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE

There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS

Which is NOT a type of Trojan QUIZ#2 QUIZ#2 ANOTHER QUIZ a)Time BombTime Bomb b)Logic BombLogic Bomb c)Water BombWater Bomb

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

Erasing or overwriting data on a computer Encrypting files Corrupting files in a subtle way Upload and download files Allowing remote access to the victim's computer Opening and closing CD-ROM tray Harvest addresses and use them for spam WHAT CAN THE TROJANS DO?

You can be infected by visiting a rogue website Using Infection through open ports HOW CAN YOU GET INFECTED?

How can you get infected by a Trojan Horse? a)Visiting TroyVisiting Troy b)Visiting rogue websitesVisiting rogue websites a)Visiting a horse farmVisiting a horse farm QUIZ#3 QUIZ#3 ANOTHER QUIZ

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU

Spyware is computer software that collects personal information about users without their informed consent It’s a process where personal information is secretly recorded with a variety of techniques such as: logging keystrokes recording Internet web browsing history scanning documents on the computer's hard disk WHAT IS SPYWARE?

Spyware does not directly spread in the manner of a computer virus or worm The spyware stays in the infected computer where it collects information Spyware can be bundled with FREEWARE applications as well The users could be tricked by thinking they are installing useful software HOW IS SPYWARE SPREAD?

What is Spyware a)James Bond’s latest toyJames Bond’s latest toy b)Software that collects personal infoSoftware that collects personal info c)Cold War relicCold War relic QUIZ#1 QUIZ#1 Here comes the quiz

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

Anti-spyware programs can combat spyware in two ways: They can provide real time protection against the installation of spyware software Anti-spyware software programs can be used solely for detection and removal of spyware Such programs inspect the contents of Windows registry Operating system file Installed programs BEST SPYWARE PROGRAMS

SPYBOT Spy sweeper Spyware Doctor AVG Anti Spyware BEST ANTI SPYWARE SOFTWARE

Which software package doesn’t belong to the group of anti software a)Windows VistaWindows Vista b)SPYBOTSPYBOT a)Spy SweeperSpy Sweeper QUIZ#2 QUIZ#2 Here comes the quiz

YOU GOT IT!!!

OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN

ALWAYS RUN YOUR ANTI-SPYWARE SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU