Stepes of a computer infection. An infected.EXE file arrives as an email attachment.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Internet Safety Tips: Viruses. Computer Virus When you have a virus, you feel sick, tired, and yucky. You dont feel like working or playing.
Are You Smarter Than a 5 th Grader? 1,000,000 Blog Online Search Kindle? Documents? Backup Virus click here! Downloading Music Expiration Date?
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Cormas Installation Guide June  cormas.zip is already downloaded somewhere on your computer  VisualWorks is already installed somewhere (VisualWorks.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Kurtis Worthington.  A computer virus is a software program that is designed to copy itself over and over again and attach itself to other program.
Computer Viruses.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Information Technology Software. SYSTEM SOFTWARE.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Ben Obrien 10N ICT homework 6 6th November. The ‘Yaha.K’ Virus The spread of the Windows worm, called Yaha.K, has led anti-virus firms to.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Return to the PC Security web page Lesson 5: Dealing with Malware.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Technology Competency Computer Infestations Mr. Locke.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
By Alyssa Sedlak. This worm arrived by on May 4, 2000 The subject was simply “ILOVEYOU” and held an attachment named “LOVE-LETTER-FOR-YOU” LOVE.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
Computers & Society Computers long ago entered our social world … they can be used crudely or skillfully © 2004 Lawrence Snyder.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Computer virus Done: Aaesha Mohammed ID: H
Install CB 1.8 on Ubuntu. Steps Followed Install Ubuntu (Ubuntu LTS) on Virtual machine – (VMware Workstation) (
Writing an message Finish off your slide on recommendations of how to write an .
Programming Software for the oBot: Included in the attached zip-file is the software required to program the oBot, as used in the Robotic's Club. Copy.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Computer Virus’s.
Computer Viruses Latifah alabdulkarim
GCSE ICT – REVISION QUESTIONS
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Computer Worms & Viruses
Computer Viruses.
Announcements Project 3a due Friday -- use eTurnin by clicking on link, following instructions Upcoming lectures: Friday, Grace Whiteaker, on Privacy Monday,
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Stepes of a computer infection

An infected.EXE file arrives as an attachment.

The infected.exe file is opened.

Your machine is infected.

Virus spreads in the Windows system.

Virus is copied when the system starts. This copy is infected.

This copy infects other 35 bit.EXE files in the windows directory and subdirectories when run.

Five minute after the file is opened the worm it creates a.DAT file hidden somewhere on the hard disc.

Machine is infecting others as the message will be returned to sender.

Prace wykonała: Magdalena Sitek