Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Computer Viruses Computer viruses are a type of Malware that can infect other computer operating systems. They can do harmful things to the host it infected.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
MODULE 3 SAFE USE OF COMPUTER. Virus and Antivirus A computer virus is a malware program that, when executed, replicates by inserting copies of itself.
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
computer Viruses Ever MAde To Protect What Matters
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
Ethics How do ethical issues influence business decisions?
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Computer Viruses Author: Alyse Allen.
Computer Virus’s.
3.6 Fundamentals of cyber security
Computer Viruses Latifah alabdulkarim
COMPUTER VIRUSES Computer Technology.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Stay Safe While Using The Internet
Chap 10 Malicious Software.
Presentation transcript:

Dogaong, Charlie L. BSIT

The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others (spreading viruses is an example). The computer as a weapon -

using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). The computer as an accessory – using a computer as a "fancy filing cabinet" to store illegal or stolen information.

malware that, when executed, replicates by inserting copies of itself. possibly modified into other computer programs, data files, or the boot sector of the hard drive self-replicating computer programs which install themselves without the user's consent.

stealing hard disk space or CPU time, accessing private information, corrupting data

Storm Virus, Sasser Virus, Nimda Virus, Melissa Virus, Code Red I and II Computer Viruses, Morris Computer Virus, ILOVEYOU Virus, Brain Computer Virus, Conficker, Elk Cloner

Melissa was a new virus for a new age: the age. Forget floppies, this one was among the first to spread via the dreaded attachment.

It also pioneered the art of breaking into your address book and sending itself to all your contacts. The virus would arrive via an innocent-looking that told you to open a document.

First found on March 26, 1999, Melissa shut down Internet systems that got clogged with infected s propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused problems.

David L. Smith

Eaton Town, New Jersey

Smith was sentenced to 10 years serving 20 months was fined US $5,000