Presentation is loading. Please wait.

Presentation is loading. Please wait.

Viruses, Malicious Code, & Other Nasty Stuff

Similar presentations


Presentation on theme: "Viruses, Malicious Code, & Other Nasty Stuff"— Presentation transcript:

1 Viruses, Malicious Code, & Other Nasty Stuff
Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University

2 Software Security: (Viruses, Trojans, Unwanted Access)
Only install necessary and trusted software. Beware of *free* games, screen savers, and graphics. Keep a hard copy of the copyright release for all “free” products! Run and UPDATE anti-virus software!!

3 Virus Statistics 1988: Less than 10 known viruses
1990: New virus found every day 1993: new viruses per week 1999: 45,000 viruses and variants Source: McAfee

4 Pikachu Worm: A K-12 Nightmare

5 +: Does ask for permission to
This dialog box appears after the PIKACHUPOKEMON.EXE file has been activated. Worm: Accesses Outlook Address Book Embeds code to delete Windows and Windows Subfolders upon Restart. +: Does ask for permission to delete files with a “Y” command.

6 Examples of Nasty Stuff:
Trojan Horse Viruses Worms Logic Bomb Trapdoors

7 Viruses: Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.

8 Worms: Worms: reproducing programs that run independently and travel across network connections. Reproduction Differences: * A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread. * A worm can run completely independently and spread of its own will through network connections.

9 Trojan Horse: Trojan Horse: a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

10 Logic Bomb: Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date.

11 Trapdoor: Trapdoors: allows access to a system by skipping the usual login routine.

12 Virus Information Activity (for students or teachers)
Directions: Choose one of the keywords listed on the next slide. Go to the McAfee virus information library ( and search for information dealing with your selection. Skim through the choices and pick the best one to explore! Explain what the virus is, what it will do, and steps to fix it.

13 Virus Awareness Activity: Debriefing
Pok Snoopy Love Backdoor Bud Frogs Anna Bob Pretty Cobra Sorry Funny Perrin Nim Code Red

14 Bootsector A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer.

15 Macro A virus that hides inside document and spreadsheet files used by popular word processing and spreadsheet

16 Timebomb A virus that is in effect at a certain time or date

17 Virus Prevention Turn on the firewall
Keep the computer operating system up-to-date Use updated antivirus software on the computer Use updated antispyware software on the computer


Download ppt "Viruses, Malicious Code, & Other Nasty Stuff"

Similar presentations


Ads by Google