Unit 6 Digital Literacy Study S3 Obj 2-2

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Quiz Review.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
1 Higher Computing Topic 8: Supporting Software Updated
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
We are here to help you… Fight something like this Brownies !
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Viruses & Destructive Programs
3.6 Fundamentals of cyber security
COMPUTER VIRUSES Computer Technology.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Unit 6 Digital Literacy Study S3 Obj 2-2
HOW DO I KEEP MY COMPUTER SAFE?
Unit 6 Digital Literacy Study S3 Obj 2-2
Presentation transcript:

Unit 6 Digital Literacy Study S3 Obj 2-2 Viruses & Destructive Programs Unit 6 Digital Literacy Study S3 Obj 2-2

Computer Virus A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user. Viruses can either be considered a Nuisance or Destructive. They can Corrupt files Destroy data Display irritating messages Corrupt computer systems Some viruses replicate themselves which means that they copy themselves over and over.

Types of Viruses Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Trojan Horse Worms Bootsector Virus Macro Virus Memory Resident Viruses Rootkit Virus Polymorphic Viruses Logic Bombs/Time Bombs

Types of viruses Trojan Horse: Worms: Has the appearance of having a useful and desired function. Program performs undesired functions secretly. Does not replicate itself. Worms: A program that replicates itself in order to spread from one computer to another.

Types of viruses Bootsector Virus: Macro Virus: Attaches itself to the first part of the hard disk that is read by the computer during the bootup process. Macro Virus: Uses another application’s macro programming language to distribute themselves. They infect documents such as MS Word, Excel, etc.

Types of viruses Memory Resident Viruses: Rootkit Virus: Viruses that reside in a computer’s RAM. They stay in the memory after the initiating program closes. Rootkit Virus: An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.

Types of viruses Polymorphic Viruses: Logic Bombs/Time Bombs: Copies itself by creating multiple files of itself. It changes its signature making it hard for antivirus software to detect. Logic Bombs/Time Bombs: Programmed to initiate at a specific date or when a specific event occurs.

Spreading Viruses Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading files from the Internet. Viruses attach themselves to files with .exe, .com, or .vbs filename extensions When you open the infected file, the virus opens and waits to infect the next program you run or disk you use. Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves. You may not even know your computer has a virus, thus making it easier to spread the virus.

How Viruses Spread Email Attachments Rogue Websites Networks Infected Boot Disks Phishing Schemes Infected Software Hackers Instant Messaging Fake Anti-Virus Software Mobile Devices Friends and Relatives

How viruses spread Email Attachments: Rogue Websites: Viruses may be carried in attachments to email messages. Rogue Websites: Viruses may lurk on untrustworthy websites. Clicking on them may infect your computer.

How viruses spread Networks: Infected Boot Disks: A computer may be infected through a network which spreads from another computer connected to that same network. Keeping anti-virus software updated can help the situation. Infected Boot Disks: A virus can spread if an infected disk is in the hard drive and you try to restart. Know the origin of any media you use with your computer system.

How viruses spread Phishing Schemes: Infected Software: These schemes try to get your personal information through email messages pretending to be legitimate sites. When you visit these sites, spyware, adware, and viruses are automatically installed on your computer. Infected Software: Freeware or shareware may infect your computer system. Only download from trusted sites.

How viruses spread Hackers: Instant Messaging: The best way to protect yourself is to have a firewall and up- to-date anti-virus software installed. Instant Messaging: Hackers see it as an easy target to get people to click on links. Only chat with people you know. Don’t follow links you don’t recognize.

How viruses spread Fake Anti-Virus Software: Mobile Devices: Only download anti-virus programs from trusted sites . Mobile Devices: Before you plug peripheral devices into your computer for the first time, be sure your anti-virus software is up to date. Friends and Relatives: Viruses may come from family and friends’ email attachments or from social media sites. DO NOT open an attachment with a .exe or .dll extension.

Protecting your Computer Just as you protect yourself from illness and disease, there are ways you can cut the chances of your computer systems being infected. Install trusted anti-virus program Install anti-spyware and malware programs Avoid suspicious websites Never open email attachments without scanning them first Set up automatic scans Watch your downloads

Protecting your Computer Install updates coming from your operating system software programs Know what to look for Stay away from Cracked Software Install a Firewall Be prepared to lock down

Computer Theft & Privacy The most popular tech item to steal are Laptops which are then most often sold. Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations. Use passwords to keep your files and information safe and to keep most people out of your files. View the 5 minute video on the importance of using strong passwords to help protect your privacy. Record at least three things you learned.

FIND OUT HOW SECURE YOUR PASSWORD IS BY CLICKING THE IMAGE BELOW

Computer Theft & Privacy Tips on Using Passwords from the Video: Never write down your password; use unique passwords Use at least seven characters; use letters from a phrase Include punctuation or symbols; use upper and lower case letters

Hacking Hacking The Penalty Hacking means finding out weaknesses in a computer or computer network. The term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. Their objective is to do damage or steal personal information. The Penalty The federal punishment for hacking into computers ranges from a fine or imprisonment depending upon the seriousness of the criminal activity and what damage the hacker has done. Hackers cost businesses money because of downtime and loss of data

Internet Controls Types of controls for internet safety Firewalls: Form a barrier between two networks Filters: Control what can be viewed on Internet Parental Controls: Software that allows parental control over what kids do on the Internet

Freeware & Shareware Freeware Shareware Software Copyrighted computer software which is made available for use free of charge for an unlimited time. Shareware Software Is typically obtained free of charge, either by downloading from the Internet or other source. A user may try it out for a certain period of time without charge. There is an eventual charge for this use of the program.

Please complete the attached assignment: viruses & destructive programs

Computer Virus A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Trojan Horse A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

Worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself.

Dictionary Attack A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary to find out passwords on a computer system.

File Virus A type of computer virus that inserts its malicious code into executable files on a system.

Malware Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

Adware Adware is the common name used to describe software that is given to the user with advertisements embedded in the application.

Spyware Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

Freeware vs. Shareware Freeware is software downloaded at no charge to the user. There may be a charge for Shareware after a trial period.

Phishing & Spoofing Attacks The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

Social Engineering In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful.

War Driving The act of driving around in a vehicle with a laptop computer, an antenna, and an 802.11 wireless LAN adapter to exploit existing wireless networks.

STUDY YOUR NOTES TEST NEXT CLASS PERIOD!