Computer Viruses. – A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 18 Data Security 1.
Computer Viruses.
Introduction To Computer System. Introduction What is the Computer ? The Computer is a set of independent physical components and devices (Hardware),
1 Hardware - devices for Input. 2 Hardware - devices for Input Processing.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Computer Ethics – The Ten Commandments
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
VIRUSES and DESTRUCTIVE PROGRAMS
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
COMPUTER ETHICS Do you know the difference between right and wrong?
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
1 Higher Computing Topic 8: Supporting Software Updated
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Crimes Career & Technology Education Department.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Incident Security & Confidentiality Integrity Availability.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
Incident Security & Confidentiality Integrity Availability.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
For more information on Rouge, visit:
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
COMPUTER VIRUSES Computer Technology.
Virus And Malware Causes And Troubleshoot By I FIX PC
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Presentation transcript:

Computer Viruses

– A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself to other programs  Copy itself (it looks as if it repeats itself)

Examples of Viruses n Monkes n ABC n Crabs n CIH

Viruses and Virus Protection A virus program – Infects programs, documents, databases and more … – It is man-made – It can hide and reproduce – It can lay dormant (inactive) and then activate help Anti-virus programs can help

A variety of highly contagious “viruses” can spread from computer to computer, much the way biological viruses do among human beings.  Just as a virus can infect human organs, a computer virus can infect programs and databases. It can also hide duplicates of itself within legitimate programs. Viruses and Virus Protection (2)

Viruses and Virus Protection(3) These viruses, which are programs, reside on and are passed between magnetic disks. Most people who write and circulate virus programs fall into two groups. 1.The first group uses viruses to show off for their peers. 2.The second, and far more dangerous group, creates viruses with malicious intent.

Sources of Computer Viruses Three primary sources – The Internet Via downloads and exchanges – Diskettes Exchanging disks – Computer networks Can spread from one network to another

How do you know if you have a virus? Lack of storage capability Decrease in the speed of executing programs Unexpected error messages Halting the system

Virus Protection The software package distributed with new PCs always includes an antiviral program. The best way to cope with viruses is to recognize their existence and use an antiviral, or antivirus program.

1.Delete s from unknown or suspicious, untrustworthy (unreliable) sources, especially those with files attached to an . 2.Never open a file attached to an unless you know what it is, even if it appears to come from a friend. 3.Download files from the Internet only from legitimate and reputable sources. 4.Update your antivirus software at least every two weeks as over 200 viruses are discovered each month. 5.Backup your files periodically 6.Traditionally virus protection has been at the PC or client level. However, this may change as companies look to network and Internet service providers for more services. Some tips that will help minimize your vulnerability to viruses:

Computer Ethics You shall not use a computer to harm other people. You shall not snoop around in other people's computer files. You shall not use a computer to steal. You shall not use other people's computer resources without authorization or proper compensation. You shall always use a computer in ways that show consideration and respect for your fellow humans.

Computer Uses 1- Supermarkets: Use a bar code reader. 2- Libraries: Use computers to search for books; to record books lending and return …. 3- Banks: Enable customers to access their accounts via ATM. 4- Plastic Cards: Used in computer system to facilitate customers life (mobile, telephone and credit cards) 5- Electronic Commerce: Uses Internet in business for purchasing, payment, or reservations. 6- Touch Screens: Allow unskilled customers to access information easily. 7- Hospitals: Use computers to store records of patients and to help in the diagnosis and analysis of the treatment. 8- Cars: Computers are used to display maps and give instructions to the driver.