R. Stewart Fayetteville High School 2008- 2009 VIRUSES Computer Technology Day 21.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Unit 6 Digital Literacy Study S3 Obj 2-2
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Crimes Career & Technology Education Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Viruses & Destructive Programs
War between Good and Evil.
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Technology Day 21
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21

R. Stewart Fayetteville High School Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other files It can – Corrupt files – Destroy data – Display irritating messages – Corrupt computer systems

R. Stewart Fayetteville High School Spreading Viruses Viruses spread because people distribute infected files by exchanging disks and CDs, sending attachments, and downloading documents from the Internet. Viruses attach themselves to files with.exe,.com, or.vbs filename extensions When you open the infected file, the virus opens and waits to infect the next program you run or disk you use

R. Stewart Fayetteville High School Spreading Viruses (continued) Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves You may not even know your computer has a virus, thus making it easier to spread the virus

R. Stewart Fayetteville High School Trigger Events An event that activates a task often associated with a computer virus Time Bomb – Watches for the PC clock to reach a certain date to activate the virus Example – Michelangelo virus Damages files on March 6 the artist’s birthday Logic Bomb – Watches for a specific set of input to activate the virus

R. Stewart Fayetteville High School Classification of Viruses

R. Stewart Fayetteville High School File Virus Virus that attaches to an application program – Example Chernobyl – Notorious for overwriting a section of the hard disk, making it impossible to access data

R. Stewart Fayetteville High School Boot Sector Virus Infects the system files that your computer uses every time it is turned on Cause widespread damage and recurring problems – Example Stoned Virus – Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk

R. Stewart Fayetteville High School Macro Virus Macro – A miniature program that usually contains legitimate instructions to automate a document or task This virus infects a macro – Example Melissa Virus – Attaches itself to Microsoft Word documents Codemas Virus – Attaches itself to Microsoft Excel spreadsheets

R. Stewart Fayetteville High School Other Viruses

R. Stewart Fayetteville High School Trojan Horse Computer program that seems to perform one function while actually doing something else – Different from a virus because it does not make copies of itself Different tasks that can be affected – Stealing passwords – Deleting files

R. Stewart Fayetteville High School Trojan Horse Example

R. Stewart Fayetteville High School Worm Software program designed to enter a computer system usually through a network, through security holes and then replicate itself Spreads from computer to computer

R. Stewart Fayetteville High School Worm Example

R. Stewart Fayetteville High School Protecting yourself from viruses Antivirus software – Set of utility programs that looks for and eradicates a wide spectrum of problems, including viruses, Trojan horses, and worms – Example McAfee Virus Scan Don’t open s attachments that have strange names or are from people you don’t recognize

R. Stewart Fayetteville High School Resource Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002.