COMPUTER SAFETY!!! Viruses Hacking Back-up. Contents: Virus’: slide 3 - 10 Hacking: back ups:

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
By Ksenia Primizenkina 8K
The Simple Side of Computer Security for The Brownies That Like To Read!!
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Spyware, Viruses and Malware What the fuss is all about.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
We are here to help you… Fight something like this Brownies !
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
All about viruses, hacking and backups By Harriet Thomas.
Viruses A computer virus is a virus that can copy itself and infect a computer. A Trojan virus called WinFixer coerced users into installing it by telling.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Computer Security Keeping you and your computer safe in the digital world.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
What they are and how to protect against them
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Presentation transcript:

COMPUTER SAFETY!!! Viruses Hacking Back-up

Contents: Virus’: slide Hacking: back ups:

Viruses Hmmmm.. Well what is a virus?? Don’t worry this part of my power point presentation is all about viruses and tells you everything you need to know to understand what a virus is!! It includes; what viruses are, what damage they can make, what are the different types of viruses, how you can stop a virus and are there any drawbacks on using anti-virus software.

What is a computer virus??? A computer virus is a computer program that can infect a computer. The term "virus" is also commonly but incorrectly used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.computer programmalwareadwarespywarecodefloppy diskCDDVDUSB drive

How do viruses spread??? Viruses begin to work and spread when you start up the program or application of which the virus is present. For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run. Once in memory, one of a number of things can happen. The virus may be programmed to attach to other applications, disks or folders. It may infect a network if given the opportunity. Viruses behave in different ways. Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive. Other viruses will operate every time you turn on your computer after infecting a system file or network. How to Prevent a Virus Invasion! 1. Load only software from original disks or CD's. Pirated or copied software is always a risk for a virus. 2. Execute only programs of which you are familiar as to their origin. Programs sent by should always be suspicious. 3. Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed. 4.Check all shareware and free programs downloaded from on-line services with a virus checking program. 5.Purchase a virus program that runs as you boot or work your computer. Up-date it frequently.

What are the different types of viruses??? 1. I love you The three words that can at most motivate you to cross the seven seas - or at least tempt you to open en . This very temptation was the downfall of many computer users when this multipurpose skilled virus hit the web. It had the ability to replicate itself via IRC chat and , transfer and hide itself in different files and folders, and infect the registry keys once you opened an in you inbox declaring � I Love You �. The virus thought to be originated somewhere in the Philippines, caused damage which was estimated to be around $8-10 billion. 2. Melissa The creator of this virus received a 20 month jail sentence and a $5000 fine. Generated over a decade ago, this clever piece of virtual disease operated through Microsoft Outlook. This is how it worked: you receive an titled � Here is the Document you asked for � from an unknown sender, you got infected as soon as you opened the , and the virus would replicate and delivers itself to the top 50 people on your list without you getting a hint of it. Some major US government departments were hit and the damage is thought to be around $1 billion at least. A 20 month jail sentence well deserved.

3. My Doom My Doom was instigated somewhere in mid 2004 and it actually prompted US senator to propose the creation of a � National Virus Response Centre �. The virus attacked in two phases; the first phase infected different Operating Systems, creating inroads and backdoors and making them vulnerable to external users. Once this problem was sorted out, the My Doom struck again after few months, this time targeting the Search Engines like Google, slowing them down considerably, and crashing a few. 4. Nimda Spell it backwards and you will understand its prime targets: yes, the � Admin � and servers. It was basically a worm and has the record of being the fastest ever virus to spread; it took only 22 minutes to break into the list of top ten most deadly viruses of all times. It basically targeted internet servers and websites, creating a mass crater through which thousands of computers were affected at the same time. Once infected, the systems became exposed to open attacks by the outsiders. What are the different types of viruses???

5. Code Red Damages of almost $200 million a day, and affecting the computers inside the White House are the degree of achievements of this virus. It subjugated the Windows by acting as a buffer overflow, sending gigantic amount of information to the computer so that it spilt over, eventually forcing a shut down by overlapping the memory of the computers. The problem wasn’t � t solved until Microsoft issued a revival package to cater for this virus.

What damage can a virus do??? ComputerComputer viruses can do varying amounts of damage to your computer, ranging from rendering it wholly unusable to doing nothing at all. Viruses have many methods of damaging your computer, which have evolved over time along with computers themselves. computers

How can you stop yourself from getting a virus on your computer??? To stop your computer from getting viruses you should install an anti-virus software, for your computer. Here is the list of the top 10 anti-virus software’s you can buy Kaspersky Anti-Virus Kaspersky Antivirus often treated as the best available Antivirus application and has a special version for file servers. It covers almost all sections needed for a top class security. Kaspersky provides hourly virus definition update to keep you up-to-date.Kaspersky Anti-Virus 02. Bit Defender AntivirusBit Defender is one of the best antivirus with top class defending ability. It provides hourly definition updates for latest threats. Bit Defender comes with P2P File Sharing and Registry Start-up Protection but lacks scanning.Bit Defender Antivirus 03. Trend MicroTrend Micro is a well known and popular antivirus with Spyware and Adware Protection. It has some great features including Remote File Lock that safeguards your private files in case your laptop is lost or stolen. But lacks P2P File Sharing and Registry Start-up Scanning.Trend Micro 04. Norton Antivirus/ Internet SecurityNorton Antivirus is one of the most popular and well known antivirus application. The latest version has the ability to map your wireless home network and safeguards your wifi networks. Recently Norton has introduced a special version for gaming PCs known as Norton 2009 Gaming Edition. It comes with daily virus definition update but no support for P2P File Sharing and Registry Start-up Protection.Norton Antivirus/ Internet Security 05. McAfee AntivirusMcAfee is one of the leading anti viruses in security industry. McAfee introduced 2 features Script Stopper and Worm Stopper. But it has no support for P2P File Sharing, Instant Messenger and Registry Start-up. The inbuilt up dater updates virus definitions on a regular basis to keep your up-to-date.McAfee Antivirus

06. Panda Antivirus Pro 2009Panda Antivirus comes with a new feature call UltraFast scan engine that scan almost 30% faster compared to other antivirus applications. It has few unique features as follows *Identity protection through Anti-Phishing Filter and Anti-Banking Trojans Engine *Panda Antivirus has an advanced heuristic scan which maximum possible identity theft *Inbuilt Personal FirewallPanda Antivirus Pro ZoneAlarm Anti-virus 2009The latest version of Zone Alarm antivirus comes with strong removal ability of most dangerous viruses and multilayer security for your PC. But it is not certified by any of the three major independent testing labs Virus Bulletic, Checkmark, or ICSA. Zone Alarm scans uses lesser possible system resources.ZoneAlarm Anti-virus ESET NOD32 AntivirusNOD32 is one of the leading antivirus applications with feature like *Blocking all attempts to collect and forward your personal and confidential data *Provides best protection against zero day threat and attacks *Virus definition updates comes in very small size compared to others *Multi layered protection including real time scanningESET NOD32 Antivirus 09. AVG AntivirusAVG is one of oldest and widely used antivirus. Latest version of AVG comes with a clean interface and the core scanning engine changed for better performance with multi-core processors. Now the AVG Antivirus comes with two separate stand alone applications AVG Antispyware and AVG Antirootkit to give your best possible security.AVG Antivirus 10. F-Secure Antivirus 2009F-Secure Antivirus is quite easy to use and comes with pre-defined options for known threats. F-Secure heuristic scanner is considered as one of fastest. It provides new definition update on every two hours to provide you best possible security from most latest threats. It supports s scanning for both Outlook and Thunderbird.F-Secure Antivirus 2009 How can you stop yourself from getting a virus on your computer???

Are there any draw backs to using anti- virus software??? Every virus cannot be detected by a signature-based antivirus largely for the following reasons:  If an attacker has changed the signature of a virus, any signature-based antivirus will not be able to find the virus.  Any new virus will not be captured by the antivirus, as it will not be on the list in the antivirus database.  If the virus is not in the database of a signature-based antivirus, it will be virtually impossible for the antivirus to detect that virus.  If the mutation engine of a polymorphic virus is generating a new encrypted code, this changes the signature of the virus. Therefore, polymorphic viruses cannot be detected by a signature-based antivirus.

Hacking This part of my power point presentation is all about hacking and hackers. It includes many questions, they are: what is hacking?, what damage can hackers do? And how can you stop hackers getting into your computer? It will give you loads of information and will tell you each answer in detail! :)

What is Hacking??? Hacking is when people go on your computer with unauthorised access. They can steal and copy any information that is on your computer and use it against you. Hackers can send s to your computer and they can have viruses attached to them and they can ruin your computer/laptop!

What damage can hackers do? Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might do any of the following activities:  Vandalism—Destruction or digital defacement of a computer or its data for destruction’s sake. Sometimes this is ego-driven. They break in and leave their mark to show they’ve been there.  Hacktivism—A form of vandalism or electronic civil disobedience with a political agenda. Usually hacktivists have altruistic motives.  Theft—Gaining access to intellectual or proprietary technology or information, sometimes for resale.  Hijacking—Many of the financially motivated hackers are interested in using viruses and Trojan horses to hijack your computer so they can remotely control it for their own purposes.  Identity theft—Electronic theft of personal information that can be used to steal financial resources from an individual or corporation.  Terrorism—Some experts believe that terrorists will eventually launch an attack using hacking techniques.

How can you stop hackers being able to get on your computer???