UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
Let’s Talk About Cyber Security
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Unit 6 Digital Literacy Study S3 Obj 2-2
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
Computer Viruses.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses & Destructive Programs
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
WEB 2.0 READ/WRITE WEB Eidson. WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Viruses & Destructive Programs
Spyware, Viruses and Malware What the fuss is all about.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Understand Malware LESSON Security Fundamentals.
Securing A Wireless Home Network. Simple home wired LAN.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Computer safety Filip Hruby.
Viruses & Destructive Programs
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Spyware.
Lecture 8. Cyber Security, Ethics and Trust
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Risk of the Internet At Home
Ch9 E-commerce Security
Presentation transcript:

UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS

FILE VIRUS  A type of computer virus that inserts its malicious code into executable files on a system.

DICTIONARY ATTACK  A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary to find out passwords on a computer system.

MALWARE  Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

ADWARE  Adware is the common name used to describe software that is given to the user with advertisements embedded in the application.

SPYWARE  Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

FREEWARE VS. SHAREWARE  Freeware is software downloaded at no charge to the user. There may be a charge for Shareware after a trial period.

SOCIAL ENGINEERING  In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful.

WAR DRIVING  The act of driving around in a vehicle with a laptop computer, an antenna, and a wireless LAN adapter to exploit existing wireless networks.

Use your study guide for the remaining definitions. Did you do the EXTRA Credit Wordle Assignment?