C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Introduction To Computer System. Introduction What is the Computer ? The Computer is a set of independent physical components and devices (Hardware),
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Viruses & Destructive Programs
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Digital Citizenship By: Miranda Scorver.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Computer Viruses. – A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself.
Introduction of Internet security Sui Wang IS300.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Security and Ethics Safeguards and Codes of Conduct.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
MALWARE Autumn Mattis.
Lesson 3 Safe Computing.
COMPUTER VIRUSES Computer Technology.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

C HAPTER 5 General Computer Topics

5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to criminal exploitation of the Internet. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) Crimes that target computers directly; (2) Crimes facilitated by computer networks or devices..

5.1 Computer Crimes Crimes that primarily target computer networks or devices include: A computer virus is a computer program that can replicate itself and spread from one computer to another. Denial-of-service attacks: In computing, a denial- of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.

5.1 Computer Crimes Malware (malicious code) : Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Spam, or the unsolicited sending of bulk for commercial purposes, is unlawful in some jurisdictions. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.

5.2 Computer Viruses It is an application program designed and written to destroy other programs. It has the ability to link itself to other programs and copy itself (it looks as if it repeats itself). Examples: Monkes, ABC, Crabs and CIH Viruses A virus program is man-made and it infects programs, documents, databases and more. It can hide and reproduce. It can lay dormant (inactive) and then activate

5.2.1 Viruses  A variety of highly contagious “viruses” can spread from computer to computer.  It can infect programs and databases.  It can also hide and duplicates itself within legitimate programs.  These program viruses can reside on and pass between magnetic disks.  Most people who write and circulate virus programs fall into one of the following two groups:  the first uses viruses to show off for their peers  the other which is far more dangerous group, creates viruses with malicious intent.

5.2.1 Viruses There are three main computer viruses:  The first is Macro viruses which is written into the program macro and shuts down functions.  The second is Worm, that makes copies of itself and interfere with normal operations.  The third virus is Trojan horse. The three primary sources of computer viruses are: – The Internet :Via downloads and exchanges – Secondary storage: Exchanging disks – Computer networks : Can spread from one network to another How do you know if you have a virus? The answer comes when you notice one of the following symptoms.  Lack of storage capability  Decrease in the speed of executing programs  Unexpected error messages  Halting the system

5.2.2 Virus Protection The software package distributed with new PCs always includes an antiviral program. The best way to cope with viruses is to recognize their existence and use an antiviral or antivirus program. Some tips that will help minimize your vulnerability to viruses: Delete s from unknown or suspicious, untrustworthy (unreliable) sources. Never open a file attached to an unless you know what it is. Download files from the Internet only from legitimate and reputable sources. Update your antivirus software at least every two weeks. Backup your files periodically.

5.3 Computer Ethics You shall not use a computer to harm other people. You shall not snoop around in other people's computer files. You shall not use a computer to steal. You shall not use other people's computer resources without authorization or proper compensation. You shall always use a computer in ways that show consideration and respect for your fellow humans.