Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 4: File Management, Virus Protection, and Backup
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Format Scandisk Defragmentation Antivirus Compression Software
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 7 Working with Files.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GCSE Information Technology Storing data Data storage devices can be divided into 2 main categories: Backing storage is used to store programs and data.
Windows XP: Continue Files and Folders. Files & Directories n We store programs and data on secondary storage devices using a file system. n These are.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
IT253: Computer Organization
For any query mail to or BITS Pilani Lecture # 1.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Running Windows Securely and Efficiently By Gary Esworthy.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Tonga Institute of Higher Education IT 141: Information Systems
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
File Managements.
Tonga Institute of Higher Education IT 141: Information Systems
Microsoft Office Illustrated Fundamentals
Presentation transcript:

Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems

Files  A file – the name we give to a single grouping of data that can be saved on any media (example, CD- ROM, hard disk, floppy disk)  A file is a way to indicate where bits for one file end and another start on media

Filenames  Because there are many files, there is a need for naming them.  There are special rules to follow to correctly name files.  These rules change based on what operating system you use.

File name rules  Follow these rules to have a happy and successful computer life 1. Don’t put space in files (use “_” called the underscore) 2. Don’t use the following characters  (* : ; / \ | ] [ { } + = $ ) 3. Sometimes if you use an uppercase letter it will make a difference. Be careful

File name extensions  File name extensions are the part of the filename that comes after the regular name. It identifies what kind of file it is. Example. Paint.exe (it is a program (Executable)) Example. MyLetter.doc (it is a word document)  The extension will tell what kind of format the file is. Maybe it's a word document, excel spreadsheet, or a movie file

File Size and File Date  A file will save other information besides the name.  File size – how big the file is. How many bytes it contains. For example, a 1KB file 1KB equals 1 kilobyte (1000 bytes = 8000 bits). Very small. A file might be much bigger:  Example 60 MB (60 Million bytes)  File Date – when the file was created. Helpful if you are looking for something you just created

Directories  When computers were first made, scientists thought it would be easy for users if files were stored in folders (also known as directories), just like a real filing system  Directories allow us to organize files  The first directory is called the “root” directory. On Windows this is “C:\” On Linux it is just “/”

File Management  A file management programs allows you to organize data on your computer so that is it easier to use and find  You can “manage” files using utility programs like windows explorer or sometimes application software will allow you to manage files  These “file managers” let you copy, rename, delete and move files

File Management  For example, suppose you write a letter As you type the document is held in the memory (RAM), because the processor is using the document When you want to save, you click on “Save” or “Save as” Now you specify the name and location of the file. You have essentially managed the file

Save and Save as  If you have never saved your file before, and your file needs a name, you will use Save As.  If you have already saved once, just use Save.

File Management Metaphors  A metaphor is a way to describe something by using a different idea.  File management uses the metaphor of a filing cabinet. Directories are like drawers for saving documents.  Another metaphor is the “tree structure” where the branches represent directories, the root folder are the roots and the files are the leaves.

Tree structure

Windows Explorer  Windows Explorer is the most common file management tool.  It allows users to view directories, find and organize files.  It is divided into two “window” panes.  The pane on the left shows devices, hard disks, and folders  The pane on the right will show icons for files

Windows Explorer

What can I do in Explorer  In Explorer, you're able to copy, rename, delete, and move  You can work with more than one file by pressing the Ctrl button and then clicking on the files you want to select  You can select many by holding the shift key while clicking on different items  You can move between panes with the tab key

How is data stored?  Explorer and file management utilities allow you to see the “logical storage model.”  The logical storage model is the view of the file system that makes it easy for users to understand and manage  The real way data is stored on storage media is called the “physical storage model”

Physical Storage Model  To save data, you must first format the storage media (ex. Floppy disk, CD, DVD).  That means you must get it ready for data to be saved on it  Formatting will organize the media into “tracks” which can then be divided into “sectors.”  These sectors each have an address where data can then be saved on it

Sectors

File Systems  How does the computer know where data is saved on a hard disk?  It uses a “file system” that keeps track of what data is saved in what sector.  The name for the new Microsoft Windows file system is NTFS – New Technology File System

File Systems  To make transferring data from the hard disk easier, computers will group sectors into clusters or blocks.  A file system’s job is to maintain a list of clusters and to know what is empty and what is full  This data is stored in a special file called the “file allocation table.”  If the “file allocation table” file becomes broken then your computer will not know where anything is saved and your hard drive will not be very useful

File Allocation Table  When you save a file, the operating system looks at the file allocation table to see what cluster is free.  Then it will update the allocation table to indicate that the file is saved in that cluster  If the file is too big to fit in one cluster, it will use more clusters that are next to it

File Allocation  When you open a file, The OS looks up the filename in the File Allocation Table It finds the correct cluster and sector on the hard drive Then it moves the read-write head on the hard disk to that spot. The read-write head will read that data The data is sent back to the RAM for the OS to use

What happens when you delete?  If you want to delete a file, you might think that it is erased from the hard disk  Instead the file allocation table is updated to say that cluster is now empty and can be used for new data  There are programs that allow users to recover deleted items, because they are not really deleted  To really delete a file, you must have a “file shredder” program, that will write random data where the old file was in the hard disk

Fragmentation  If you have used your computer for awhile, your hard disk might become “fragmented”  Fragmentation means that big files that need more than one cluster are not stored next to each other.  The big files are in different clusters on the hard disk and it will take longer to open those files because the read-write head will have to travel a lot to get the whole file

Computer Viruses  Computer viruses cause big problems for people and businesses. A lot of time is wasted trying to fix these problems  In 1986 the first virus appeared. Now there are 50,000 or more viruses and 10 to 15 new ones appear every day  A virus is any software which damages your computer in anyway

Viruses  A computer virus is a set of program instructions that attaches itself to a file, reproduces and spreads to other files.  It can damage, delete or corrupt files and operating systems  Viruses spread between computers because people spread them through floppy disks and attachments

Viruses  Viruses will often attach to executable programs and wait to be run  They may often “lurk” or hide for weeks or months before actually doing anything to your computer

Different kinds of viruses  File virus – attaches to a program and will infect the computer when that program is run  Boot Sector – Infects your computer as soon as it is turned on. It lives in the memory where the computer saves the data it needs to start the computer (the BIOS)  Macro virus – a set of instructions that is run by a program. Microsoft word allows you to write macros to do some tasks. A bad macro can destroy data or cause harm. That is a called a macro virus

Trojan Horses  A Trojan Horse is a piece of software which appears to perform a certain action but in fact performs another  A Trojan horse might pretend to show pictures, but really steal your password.  They are not called viruses, because they do not replicate or copy themselves  The term is derived from the classical story of the Trojan Horse.Trojan Horse

Worms and DoS  A worm is a virus that is designed to spread from one computer to another computer over a network (unlike a virus which just spreads to files)  DoS stands for Denial of Service attack. It is a program that tries to make computer networks really slow by sending useless data. It can make websites or servers unavailable for people who want to use them  Sometimes DoS attacks are organized and come from many computers at the same time. These are called Distributed Denial of Service attacks

Malware: Spyware and Adware  Malware is a word used to describe many categories of "bad" software  This bad software is usually installed onto a computer without the user knowing about it.  The software installed will then do something that may not be legal  For example, Spyware is software that monitors what the user does, like websites that are visited, time spent on the Internet, passwords that are entered and then reports the data to a company  Adware is software that will display advertisements on computers all the time and even get new ads from the Internet  Most Windows computers that are connected to the Internet suffer from Malware

How are viruses spread?  Usually on CDs, floppy disks, from websites, downloads or attachments.  If you download something from a website, you should make sure that it is from a good source.  If you get an attachment and the file extension on the attachment is.exe it is probably a virus

How viruses are spread  If you get an attachment, it cannot spread to the computer if you do not open it.  DO NOT OPEN IT  Sometimes a file will only be a Word document, but a virus can still be inside, because it will be a macro virus.  Don’t open files from people you don’t know

What are the symptoms of a virus?  Computer displays strange messages  There are strange visual and audio effects  Computer works very slowly  Your computer reboots suddenly  Your computer sends by itself  Your network or Internet access is very slow  Sometimes there will be no symptoms

Antivirus software  Anti-virus software protects your computer from viruses.  It works by examining all the files and programs on a computers. If any of the files match a list of already known viruses, the anti-virus tries to remove it.  To match a file, it looks for the "virus signature" within the file.  If it cannot get rid of the file, it will try to isolate it at least.

Anti-virus Software  Because anti-virus software can only detect viruses it knows about, it must always be updated  You should always be using anti-virus software because viruses can come from many sources and it is better to be prepared.  The anti-virus will automatically scan your computer whenever changes are made to make sure that no viruses have entered your computer

More types of viruses  It is hard for anti-virus programs to detect all viruses because there are so many, and some of them are very smart  Multi-partite viruses – will infect different targets (like files and boot sector)  Polymorphic – they change so that their virus signature changes  Stealth viruses – they hide when the anti- virus program checks for viruses  Retro virus – these viruses attack the anti-virus program itself!!

Data Backup  It is often important to save your data in two places, in case one place goes bad.  Maybe your hard disk will break, your file system will break or your CD-ROM will get scratched  If you have important data, save it in another place, because you never know what will happen

Data Backups  You can make a backup of your entire computer (called full backup), but often it’s not worth it.  You can always re-install the operating system and get the applications you had before  The things you cannot replace are documents and files that you create. Those should be saved.

Summary  File Management  Data Storage  Viruses  Data backups