Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
By Ksenia Primizenkina 8K
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
By Demi Gardiner 8P Who’s been on your computer??
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
We are here to help you… Fight something like this Brownies !
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
For more information on Rouge, visit:
Technical Implementation: Security Risks
Presentation transcript:

Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans

VIRUSES

What is a computer virus?  A computer program that can copy itself and infect the computer.  It can only spread from one computer to another when it’s host is taken to the target computer.

Dangers/Symptoms COMPUTER:  Corrupts and deletes data files  can make computer a “slave”  slow down or shuts down computer fully APPLICATIONS/PROGRAMS:  Applications won’t work properly  Programs disappear EXTRAS:  unusual error messages  New icons  Strange sounds/music

Preventions  Keep firewall on.  Keep the computer operating system up-to-date  Use updated antivirus and anti- spy ware software on the computer

Example Of Virus  The “Nimda” virus was one of the most complicated viruses, since it had up to 5 different methods of infecting  Its methods include: , open network shares, browsing of websites, back doors left behind, and exploitation of Microsoft  The message has a file called README.EXE which unleashes this virus.

Virus Protection Norton Antivirus  Scans s, and IM’s for infections  Detects, and stop new threats  Prevents bots from taking control of your PC  Finds and removes root kits  Prevents Internet worms NOD32 Antivirus  protect you from viruses and spy ware  smart and fast, while adding removable media security, new diagnostic and recovery tools, and more advanced heuristics. Kaspersky Antivirus  Protects from viruses and spy ware, Infected Websites, Hacker attacks, Spam and phasing, Identity theft $79.99 $ $79.95

WORMS

What is a Worm?  It’s a software program which can duplicate itself automatically without human interference from one computer to another. They spread within a network and can also spread through USB’s.

What does it do?  A worm takes advantage of files or any other features used to transport information on your system to travel unaided.  Worms consume a lot of system memory and can slow down your computer.

Who do they affect?  Worms affect networked environments (Computers that are connected with one another)

Protect yourself!  1. Keep firewall on  2. Keep operating system up-to-date with security updates.  3. Used updated antivirus soft wares from a trusted source

Blaster Worm  Affected computers with Windows XP and Windows  Spread by spamming itself on to a large amounts of random IP addresses.  The worm contained two messages. The first : I just want to say LOVE YOU SAN!!  And: billy gates why do you make this possible ? Stop making money and fix your software!!  If worm detects a connection to the internet, it can lead to the system restarting every 60 seconds.

Trojan

What’s a Trojan?  It’s a worm imbedded in a file that appears safe or a software from a trusted source  Tricks users into opening it or downloading it.

Types of Trojans 1. Data Sending Trojans 2. Destructive Trojans 3. Proxy Trojans 4. FTP Trojans

How do you get it?  Software downloads  attachments  Applications  Downloading or uploading of files

Removal  Antivirus software detects and deletes Trojans  By erasing all data from the hard disk and reinstalling the operating system and required software  Firewall program  Anti Trojan Elite

How do I prevent Trojans?  DO NOT download files from people or sites which you aren’t sure about.  Watch out for hidden file extensions!  DO NOT think you are completely safe just because you run anti-virus programs.  DO NOT follow unsolicited links or open attachments in messages that you did not ask for.  Use an Internet firewall.

ILOVEYOU or LOVELETTER  Attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an message with the text "ILOVEYOU" in the subject line. It arrived in inboxes with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER- FOR-YOU.TXT.vbs".

Black Hat Hackerr

Shawn “Napster” Fanning

Quiz Time :]

Some of the Dangers and Affects of A computer virus include:  A. The Computer will do the Chicken Dance and then morph into a flu vaccine.  B. It will corrupt and delete files as well as show some unusual messages.  C. You computer will blow up and turn into ashes.

Some of the Dangers and Affects of A computer virus include:  A. The Computer will do the Chicken Dance and then morph into a flu vaccine.  B. It will corrupt and delete files as well as show some unusual messages.  C. You computer will blow up and turn into ashes.

Worms usually affect…  A. Muddy creatures.  B. People who step on worms.  C. Networks enviroments.

Worms usually affect…  A. Muddy creatures.  B. People who step on worms.  C. Networks enviroments.

A Black Hat Hacker is..  Someone who coughs a lot when he smokes.  Someone who is shy and so they always wear a hat.  Someone who hacks his way into a system.

A Black Hat Hacker is..  Someone who coughs a lot when he smokes.  Someone who is shy and so they always wear a hat.  Someone who hacks his way into a system.

Thank you for listening to our presentation.