What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Nasca Internet Networking and Security viruses.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Return to the PC Security web page Lesson 5: Dealing with Malware.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
How to remove Ransomware on windows 10 ?
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
Malware aka- malicious software By: Ken Fogel
Cyber Security By: Pratik Gandhi.
Computer Applications Unit B
Spyware. By: Katheryn L. Gaston.
Computer Virus S a F E T y.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable program. However, a worm is self- contained and does not need to be part of another program to promote itself. They are often designed to good use of the file transmission capabilities found on computers. The name 'worm' was taken from “The Shockwave Rider”, a 1970s science fiction novel by John Brunner. Researchers writing an early paper noted the similarities between their software and the program described by Brunner. That’s why they adopted the name.

Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit, and generally screw things up. Malware programs make your computer unbearably slow and unstable. Many of them will reinstall themselves even after you think you have removed them. They hide deep within Windows, making them very difficult to clean. You can get infected by malware in several ways. Malware often comes bundled with other programs like Kazaa and iMesh. Most notably some of the Cool Web Search variants, install themselves through holes in Internet Explorer, requiring you to do nothing but visit the wrong web page to get infected.

A Spyware ia any software that coverly gathers user information through the user’s Internet connection without his or her knowledge. Spyware applications are typically bundled as a hidden component of free- or shareware programs that can be downloaded from the Internet. However, it should be noted that the majority of share- and freeware applications do not come with Spyware. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of Spyware is to download certain peer-to-peer file swapping products that are available today.

Adware, also known as Adbot, can do a number of things from profile your online surfing and spending habits to popping up annoying ad windows as you surf. Adware has been bundled with other software without the user’s knowledge. Not all Adware is bad. However, most users are annoyed by Adware’s intrusive behavior. Adware can be obnoxious in that it performs “drive-by-downloads.” These are accomplished by providing a misleading dialogue box or other methods of stealth installation. Many times users have no idea they have installed the application.

Hijackers are applications that attempt to control the user’s homepage and reset it with one of the hijackers choosing. They are a low security threat, but obnoxious. Most hijackers use stealth techniques or trick dialogue boxes to perform installation.