Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 9: Privacy, Crime, and Security
Stole it Straight from Wilkes County. Questions from 1.01.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Human-Computer Interface Course 2. Content The use of IT in everyday life Electronic Commerce Security Computer Viruses Copyright and the Law File Systems.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Unit 19 INTERNET SECURITY
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
D. Beecroft Fremont High School VIRUSES.
Security Issues, Ethics, & Emerging Technologies in Education
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
APPLICATION SOFTWARE. Application Software  Application softwares are those softwares, which have been developed to solve a particular problem, to perform.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter 1 Describe the purpose, components, and use of a computer system.
Chapter 3 Applications Software: Getting the Work Done.
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computing Issues that Affect Us All
Related to data, hardware, and software
Copyright.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Presentation transcript:

Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers

What software can I copy? Software can be classified as: –Public domain - is donated for public use making it free to everyone. It can also be copied freely because it is not copyrighted. –Shareware - is distributed on a trial basis by the author who retains the copyright making it copyright protected. It may expire after the trial period and not allow a reinstall until a small fee is paid and you register the software. –Freeware - is given away free of charge, but the author still retains the copyright. The program cannot be sold or altered without permission and it is not necessarily free to copy and distribute.

What software can I copy? Software can also be classified as: –Copyrighted software - includes programs sold with accompanying documentation, user support and an owner ’ s manual. You cannot copy these, except for backup purposes if that is permissible. –Commercial Software - is considered proprietary software and is copyrighted by an individual or business. It is usually disabled after a specified number of uses and needs permission in order to be copied. Piracy is the illegal copying and distribution of software. Copyright is protection giving the owner the exclusive rights to reproduce or distribute copies of his or her own work.

Major types of Viruses Virus –Software/computer program written to cause damage to or destroy computer files. Example: The Melissa virus was a self-replicating macro virus that reactivated each time the next user opened a Word attachment. It stopped the flow of activity on the Internet due to the volume of it generated but did not damage individual systems. Bomb –Activates on a particular date or specific time. Example: The Michelangelo bomb activated on the artist ’ s birthday, March 6, in It was spread by infected floppy disks.

Major Types of Viruses Trojan Horse –A program disguised to perform a useful function but instead performs undisclosed malicious functions. They infiltrate a computer and often enter a network illegally. Worm –A program designed to enter a network (like a worm boring into an apple), reproduce and spread. Example: The Internet Worm created by Robert Morris Jr. in 1988 did not change or delete any files but did bring down over 6000 systems.

Major Types of Viruses Hoax –is a program intended to scare users into thinking they have a virus. Phage –is a program that modifies other programs, operating systems, and databases.

Computer Threats Viruses can be transmitted through a bulletin board or on-line service. You can infect your computer without knowing it by downloading a file containing a virus. Diskettes can copy a virus from the diskette to the hard drive and every other diskette used in that machine. A hacker which is a person who secretly gains access to computers and files without permission. File Sharing on a local network (LAN) may also expose your files to a virus.

Security Measures Protect your data with current anti-virus software. –These programs detect viruses and repair files. Backup your data regularly and store on a separate storage media. Password protect your computer files and do not use common names. Instead use a combination of text, numbers, and symbols for passwords. Use encryption for confidential material. –Encryption is a process that converts data into an indecipherable code to protect sensitive information from transferring; only the sender and receiver can read it. Restrict access to networks by requiring a user name and password, limiting number of log-in retries, force a log-off and require frequent password changes.