By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Computer Viruses.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 2 - Hardware Computer Security.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Safety and Security issues of using ICT Alys brooks.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Take a tour around my slideshow to learn more about viruses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
Malware and Computer Maintenance
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
CYBER SECURITY...
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Viruses and Virus Protection
Presentation transcript:

By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g

VIRUS ?. Viruses are small pieces of software.They attach themselves to programs and stay there.When the program runs the virus runs too.They reproduce and spread to other files.You can send them to other people accidentally.They can steal and/or delete your files/information.Security programs can delete viruses

VIRAL HISTORY IS A MYSTERY 10 most destructive and popular virus : ( ) 1)Stuxnet (Malware) 2)Conficker (Virus) 3)Agent (Malware) 4)Zeus (Malware) 5)PoisonIvy (Malware) 6)Storm (Worm) 7)Sasser (Worm) 8)Nimda virus 9)Morris (worm) 10)Conflicker (Malware)

THE TROJAN HORSE A Trojan horse is a computer virus, that looks like another file or document on your computer. This a evil and 1 of the most popular computer virus. There is a good part about this famous virus it doesn’t duplicate itself There is one and only but just one is destructive enough. This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software. This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.

What Is It?  A malware computer program  Can independently replicate itself  Independently sends copies of itself;  Using a computer network COMPUTER WORMS

How are they Spread?  MS outlook services  Immediate contact to SMTP servers  Through SMTP API of their own  Windows MAPI f unctions

COMPUTER WORMS What are the Different Kinds of Worms?  Instant Messaging worms  Internet worms  IRC worms  File Sharing Network worms

ADWARE ATTACKS. Happen mostly when online.Usually don’t notice until it’s too late.Virus attaches to your hard drive.Attach instantly and go through your files.Often disguised as adware protection

 message sent to a group of people  Same message  Large group  On the internet SPAM: WHAT IS IT?

VIRUS PROTECTION How can you Protect your Computer? 1) Firewall Prevents malware or malicious software from gaining access to it 2) Virus Protection Protects against viruses and other security threats

VIRUS PROTECTION 3) Spyware and other malware protection -antispyware software -Protects against spyware

UPGRADES & PURCHASES Upgrades: -once a week -automatically or manually Where to purchase protection: -purchase at a computer retail store -Ex: Future Shop, Apple, etc.

ROOTKITS Provides a root/path for hackers Allows hackers to access your network Hackers install hidden programs on your computer They can access your data and personal information You usually don’t even notice.Rootkits don’t go away on their own You need to look into security software They will give you helpful options

BIBLIOGRAPHY 8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ 8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ Viruses.html?c=y&page=2 Viruses.html?c=y&page= et_surfing__adware_infection.html et_surfing__adware_infection.html