Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Chapter 9: Privacy, Crime, and Security
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security+ Guide to Network Security Fundamentals
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Video Following is a video of what can happen if you don’t update your security settings! security.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Chapter 13 Security Strategies and Systems. Security Issues The Internet has opened up many new frontiers for everyone, including con artists and computer.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
BUSINESS B1 Information Security.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Security Issues, Ethics, & Emerging Technologies in Education
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
COMPUTER SECURITY: INFORMATION AND ACCOUNT By: Jack Denman.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
Chapter 15: Security.
Presentation on Computer Virus
War between Good and Evil.
Lecture 8. Cyber Security, Ethics and Trust
Computing Issues that Affect Us All
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Ethics.
مرکز فناوری اطلاعات دانشگاه رازی
Malicious Software Network security Master:Mr jangjou
Chapter 22: Malicious Logic
Technology Mrs. Huddleston
Malicious Program and Protection
Computer Security (Summary)
Presentation transcript:

Northland Security Systems

Computer Viruses

Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses

Methods of Operation  viruses  Macro viruses  Boot sector viruses  Trojan horse viruses  Stealth viruses  Polymorphic viruses  Logic (time) bombs  viruses  Macro viruses  Boot sector viruses  Trojan horse viruses  Stealth viruses  Polymorphic viruses  Logic (time) bombs

Virus Symptoms  Files become corrupt  Program does not operate properly  Programs or files vanish  Strange messages appear on monitor  Less memory space available  A volume name has changed  message appears repeatedly  Files become corrupt  Program does not operate properly  Programs or files vanish  Strange messages appear on monitor  Less memory space available  A volume name has changed  message appears repeatedly

Security Strategies  Data backup  Disaster recovery plan  Data encryption  User IDs and passwords  Biometric authentication  Network sniffers  Mini webcams  Firewalls  Data backup  Disaster recovery plan  Data encryption  User IDs and passwords  Biometric authentication  Network sniffers  Mini webcams  Firewalls