Malware  Viruses  E-mail Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Viruses & Destructive Programs
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Unit 19 INTERNET SECURITY
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Malicious Software.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
IT Security  .
Instructor Materials Chapter 7 Network Security
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware

Viruses  Segments of programs that attach to other programs  When an “infected” program is run, the virus is run  The virus seeks uninfected software and infects it  Viruses can be spread to other computers through shared media or  Can attach to Word documents, spreadsheets – anything which can have code  Famous “boot-sector” virus on floppy disks

viruses  Programs that are attached to messages  When run attach themselves to programs  May use address book to send messages to others using victim's return address  May look like image files or text documents

Virus Defenses  Anti-virus software  Can check against a list of virus “signatures”  Can look for suspicious activity  Must be updated regularly  Don't run programs from untrusted sources  Digital signatures  Shrink-wrapped software is not immune to viruses  Informed users

Worms  Program that propagate themselves through a network  When a computer is infected, the program runs and seeks out other computes to infect  Often exploits bugs in software, especially network and web applications  May use password attacks  Famous example: Morris worm of 1998

Worm Defenses  Keep software up-to-date, especially with security patches  Firewall  Monitoring software  Use secure passwords  Informed users

Trojan Horse  A program that appears to do one thing, but really does another  May do both – legitimate and illegitimate functions  Often found in games from untrusted sources Defenses:  Don't download from untrusted sources  Use source code

Spyware  Programs that spy on you  May collect personal information  Can be used for identity theft  Keystroke loggers monitor whatever is typed on the keyboard  Information is sent via the internet to hacker's machine

Warheads  Once control is gained of a computer, there are various malicious tasks that can be done:  botnets  steal personal information  change information  shut down virus protection and other safety features  allow remote access to computer  damage hardware