Download presentation
Presentation is loading. Please wait.
Published byJudith Johnson Modified over 8 years ago
1
Travis DeBona COSC 101-009
2
What is Malicious Code Types of Malicious Code Who’s Behind It How To Secure My Computer
3
Malicious Code is undesired effects on the computer, or security breaches. Often called Malware Ex. Viruses, Trojan Horses, Worms, and Backdoors
4
Viruses can travel computer to computer through a host and replicate Viruses very in severity Viruses are often picked up on the internet
5
Trojan Horses need to be ran or installed onto a computer They appear to be the normal download until installed When installed they steal or harm your computer information
6
Uses a computer network to send copies to other computers on the network A user does not need to have intervention Different from a virus because it does not need to attach to any program
7
Backdooring is a term that describes by- passing regular security Backdoors commonly take the form of programs
8
Many antivirus companies actually are behind some viruses Hackers and virus creators are often after personal information, or are looking to earn money Anyone can really start a virus by transferring computer to computer with a USB, discs, etc.
9
Anti virus programs Keep your operating system up to date Don’t open emails you don’t know Do download just anything off the internet
10
Implement a firewall in your system Do not browse unsecure sites on the internet Do not put foreign USB, discs, or programs on your computer
11
1 in 14 downloads off the internet has some type of virus or malware In the last year 34% of all malware has been classified and created Trojans are the most common type Thailand and China are the most infected countries
12
Malicious Code is a problem all over the computer world There are many different types of malware People can take some action to help secure their computers
13
http://csrc.nist.gov/publications/nistir/threats/section 3_3.html http://csrc.nist.gov/publications/nistir/threats/section 3_3.html http://computer.yourdictionary.com/malicious-code http://computer.yourdictionary.com/malicious-code http://www.techopedia.com/definition/4014/malicious -code http://www.techopedia.com/definition/4014/malicious -code http://www.tech-faq.com/computer-worm.html http://www.tech-faq.com/computer-worm.html http://www.irchelp.org/irchelp/security/trojan.html http://www.irchelp.org/irchelp/security/trojan.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.