Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Unit 2 - Hardware Computer Security.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
1 Higher Computing Topic 8: Supporting Software Updated
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Crimes Career & Technology Education Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Viruses Author: Alyse Allen.
Computer Viruses Standard A-4 (Safety Unit)
Computer Basics Technology’s Impact.
Internet Safety.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Viruses.
Computer Viruses Standard A-4 (Safety Unit)
Technology Mrs. Huddleston
Presentation transcript:

Computer Viruses Standard A-4 (Safety Unit)

Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer viruses and biological viruses are similar 6.Prevention Methods 7.Anti-Virus Software

What are Computer Crimes? ______________committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

Types of Computer Crimes ____________ –Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. ______________ –Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.

Other Computer Crimes __________________ –An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. _______________ –Changing data before it is entered into the computer or after is has been entered into the computer.

Computer Viruses A ________ is a program which reproduces itself, hides in other computer code without permission and does nasty or undesirable things, not intended by its victim. Computer viruses are called viruses because they share some of the traits of biological viruses. Computer viruses pass from computer to computer like a biological virus passes from person to person.

Types of Infection ____________—small piece of software that piggybacks on real programs ___________—an virus moves around in e- mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim’s address book ____________—a small piece of software that uses computer networks and security holes to replicate itself ____________—a computer program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard drive)

Types of Infections ____________________ –Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. __________________ –Virus triggered by the appearance or disappearance of specified data.

An Ounce of Prevention 1.Don’t share storage devices with anyone. 2.Don’t download anything from the Internet 3.Install anti-virus prevention software on your computer. 4.Never recycle storage devices that you know once contained a virus. 5.Don’t download an attachment file from the Internet because it could be infected with a virus.

An Ounce of Prevention (continued) 6.Never double-click on an attachment that contains an executable that arrives as an e- mail attachment. –(Attachments that come in as Word Files (.DOC), spreadsheets (.XLS), images (.GIF AND.JPG), etc., are data files and they can do no damage. –A file with an extension like EXE, COM, or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything of your computer.

Popular Anti-Virus Software Program Norton (Symantec Company) McAfee (Network Associates Company) Command Software Systems, Inc.

Discussion Questions 1.Why do you think someone would want to create a virus, knowing that it would harm others and their computers? 2.How can we prevent ourselves from becoming a victim of a computer virus?

Debate/Discussion Suppose a person’s medical records were corrupted by a computer virus, and that person died because of faulty (or missing) medical information. If you were the judge, what would you decide for the hacker who created the computer virus? How did you come to this conclusion?

Sources (numerous resources on computer viruses, hoaxes, antivirus software, etc.) (virus template for PowerPoint)

Brainstorming Activities 1.Give examples of ways in which the computer has become important to our everyday lives. 2.Discuss viruses as they pertain to the human body (illnesses), and why it is important to contain them. 3.Discuss computer viruses and why they are important to the health of our computers. 4.Name computer viruses.