Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.

Similar presentations


Presentation on theme: "COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written."— Presentation transcript:

1 COMPUTER VIRUSES Computer Technology

2 What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written intentionally To enter a computer without the user’s permission or knowledge,To enter a computer without the user’s permission or knowledge, With the ability to replicate itself, thus continuing to spread.With the ability to replicate itself, thus continuing to spread.

3 What does a virus do? Deletes files, destroys data Deletes files, destroys data Corrupts files Corrupts files Corrupts your computer system Corrupts your computer system Displays irritating messages Displays irritating messages These days, many viruses are more interested in harvesting information from your computer to be used for illegal purposes

4 Viruses Spread Themselves It’s like spreading a virus in the human population – we get sick when we are exposed to a virus and our defenses are down It’s like spreading a virus in the human population – we get sick when we are exposed to a virus and our defenses are down Your computer gets exposed to a virus when its defenses are down Your computer gets exposed to a virus when its defenses are down

5 Spreading Viruses Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading documents from the Internet. Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading documents from the Internet. When you open the infected file, the virus may open and waits to infect the next program you run or disk you use When you open the infected file, the virus may open and waits to infect the next program you run or disk you use

6 Spreading Viruses (continued) Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves You may not even know your computer has a virus, thus making it easier to spread the virus You may not even know your computer has a virus, thus making it easier to spread the virus

7 Trigger Events An event that activates a task often associated with a computer virus An event that activates a task often associated with a computer virus Time Bomb Time Bomb Watches for the PC clock to reach a certain date to activate the virusWatches for the PC clock to reach a certain date to activate the virus Example Example Michelangelo virusMichelangelo virus Damages files on March 6 the artist’s birthday Damages files on March 6 the artist’s birthday Logic Bomb Logic Bomb Watches for a specific set of input to activate the virusWatches for a specific set of input to activate the virus

8 Classification of Viruses

9 Malware Malicious software Malicious software Intended to damage computers or disrupt computer systemsIntended to damage computers or disrupt computer systems

10 Adware Automatically displays advertisements in order to generate revenue Automatically displays advertisements in order to generate revenue

11 Spyware Software that enables the user to gain information from a computer without the user’s knowledge Software that enables the user to gain information from a computer without the user’s knowledge

12 File Virus Virus that infects programs or executable files. When the program is run, the virus is activated. Virus that infects programs or executable files. When the program is run, the virus is activated. ExampleExample Chernobyl Chernobyl Notorious for overwriting a section of the hard disk, making it impossible to access dataNotorious for overwriting a section of the hard disk, making it impossible to access data

13 Boot Sector Virus Infects the system files that your computer uses every time it is turned on Infects the system files that your computer uses every time it is turned on Cause widespread damage and recurring problems Cause widespread damage and recurring problems ExampleExample Stoned Virus Stoned Virus Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard diskEvery time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk

14 Trojan Horse Computer program that seems to perform one function while actually doing something else Computer program that seems to perform one function while actually doing something else Different from a virus because it does not make copies of itselfDifferent from a virus because it does not make copies of itself Makes your computer susceptible to malicious intrudersMakes your computer susceptible to malicious intruders Different tasks that can be affected Different tasks that can be affected Stealing passwordsStealing passwords Deleting filesDeleting files

15 Trojan Horse Example

16 Worm Software program designed to enter a computer system usually through a network, through security holes and then replicate itself Software program designed to enter a computer system usually through a network, through security holes and then replicate itself Spreads from computer to computer by copying and multiplying itself thus spreading throughout a network Spreads from computer to computer by copying and multiplying itself thus spreading throughout a network

17 Worm Example

18 Protecting Yourself from Viruses Antivirus software Antivirus software Software that attempts to recognize and destroy viruses before they infect your computerSoftware that attempts to recognize and destroy viruses before they infect your computer

19 Protecting Yourself from Viruses Updating Updating Keep your programs updated. Companies often provide updates to fix vulnerabilities.Keep your programs updated. Companies often provide updates to fix vulnerabilities.

20 Protecting Yourself from Viruses Don’t open any suspicious emails, attachments, or ads. Don’t open any suspicious emails, attachments, or ads. Be careful what you download from the internet. Be careful what you download from the internet.

21 Resources Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002. http://hubpages.com/hub/Types-Of-Computer-Viruses http://www.spamlaws.com/virus-comtypes.html http://www.buzzle.com/articles/different-types-of-computer- viruses.html


Download ppt "COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written."

Similar presentations


Ads by Google