Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.

Slides:



Advertisements
Similar presentations
PREPARED BY RAHUL SHUKLA ASHISH KUMAR
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Format Scandisk Defragmentation Antivirus Compression Software
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
What is it, how does it work, and why is it important?
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Everything you wanted to know about Computer Viruses.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Viruses. Learning Objectives: At the end of this lesson you should be able to:
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
COMPUTER VIRUSES Computer Technology.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi

Computer Virus A Computer virus is a program written for destructive purposes by "mean" people. The virus program is placed into a commonly used program so that the program will run the attached virus program as it boots. The virus "infects" the executable file or program. Viruses work the same ways in Windows or Macintosh machines by infecting zip or exe files. A virus is inactive until you execute an infected program or application. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some Alarming Facts!!! A computer virus can do extensive damage.  It can crash your hard disk.  It can destroy all or some of your data.  Many viruses do weird little things that adversely affect your computer.  The most usual symptom of a computer virus is erratic behavior.  The destruction can happen at any rate of speed and can affect almost any part of the computer.  Viruses can spread quickly through today's intricate cyber world.  If your computer starts to act a little weird, the first thing to do is to check for a virus.

What Virus can do! Some viruses are programmed specifically to damage the data on your computer. They can corrupt programs, delete files, or even erase your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time. Many viruses make a programming event after replicating themselves to be picked up by other users one way or another. Some viruses make your computer's system behave erratically or crash frequently. Many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

What Viruses Don't Do! Computer viruses can not infect write protected disks or infect written documents. Viruses do not infect compressed files, unless the file was infected prior to the compression. Viruses do not infect computer hardware, such as monitors or computer chips; they only infect software. Macintosh viruses do not infect Windows computer software and vice versa. Viruses do not necessarily let you know they are present in your machine, even after being destructive. If your computer is not operating properly, it is a good practice to check for viruses with a current "virus checking" program.

How does a computer get a Virus? A computer virus is passed from computer to computer. A virus can be attached to any file that you copy to your computer. If you download files from the Internet or copy programs or files from friends on flash memory, you are very susceptible to viruses. Many viruses are spread through . A virus normally becomes active when you execute a program that contains the virus.

How do Viruses Spread? Viruses begin to work and spread when you start up the program or application of which the virus is present.  For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run. Once in memory, one of a number of things can happen.  The virus may be programmed to attach to other applications, disks or folders.  It may infect a network if given the opportunity. Viruses behave in different ways.  Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive.  Other viruses will operate every time you turn on your computer after infecting a system file or network.

How to activate a Virus? The trigger that activates the virus can be almost anything.  For instance, the virus can be activated the minute it is installed.  On the other hand, it may initiate its dirty work the next time you start your computer.  In many cases, a virus resides inside your computer in an inactive state, waiting for a certain event to happen.  Like having a physical virus in your body, you can have a virus in your computer system and not even know it. A virus can wait patiently in your system and attack only on a certain date.  Of course, in the time between the moment you contracted the virus and the time it made itself known to you, you may have innocently spread the virus to others.

How to stop virus entering your computer? Be smart enough to stop viruses before they enter your computer. Purchase a good virus protection program. An antivirus program can be set to work in the background. It will check all files before they enter your computer and will alert you if a virus is detected before it contaminates your system. If a virus is detected, your antivirus program will quarantine or eliminate it so that it cannot harm your computer. Be very careful to purchase a virus protection program that matches your operating system. If you use Windows Operating System, select a program that was written specifically for your operating system.

Steps to protect your computer from viruses To protect your computer from viruses, follow the given steps:  Load the software only from original disks or CD's. Pirated or copied software is always a risk for a virus.  Execute only programs of which you are familiar as to their origin. Programs sent by should always be suspicious.  Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed.  Check all shareware and free programs downloaded from on-line services with a virus checking program.  Purchase a virus program that runs as you boot or work your computer. Up-date it frequently.

Suggested Websites