Download presentation
Presentation is loading. Please wait.
Published byBraulio Rutty Modified over 9 years ago
2
Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT
3
MOST COMMON THINGS THAT WOULD MAKE YOUR COMPUTER SICK VIRUSES TROJANSSPYWARE Click on any of the categories above to find out
4
Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?
5
Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?
6
Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?
7
In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?
8
Computer Virus is: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)Man made software b)Violent convict from the movie “Conair” c)Cause for widespread stomach flu among networked computers d)Computer word processor Go to the second quiz
9
YOU GOT IT!!!
10
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
11
Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?
12
Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?
13
Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?
14
In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?
15
The “I Love You” Virus: QUIZ#2 QUIZ#2 Are you ready? Here is another QUIZ… a)Occurs on Valentine’s Day b)Is in love with computers c)Caused $1 Billion in damages d)It was first featured in a romantic comedy starring Hugh Grant
16
YOU GOT IT!!!
17
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
18
Human-made software programs Created specifically to wreak havoc on personal computers and networks The chance of contracting one of these computer viruses very high WHAT ARE COMPUTER VIRUSES?
19
Some viruses are relatively harmless to individuals They just e-mail themselves to all the contacts listed in your address book (which makes them harmless but annoying) ARE ALL VIRUSES BAD?
20
Unfortunately many viruses are very destructive Some lie dormant until a certain date then they spring to life to do their dirty deeds The viruses start on one computer, then replicate quickly, infecting computers around the world HOW ABOUT THE BAD VIRUSES?
21
In 1988 a student at Cornell University sent out a virus infecting more than 6,000 computers in minutes, nearly bringing the Internet to its knees. More recently, the "I Love You" virus caused over $1 billion in lost productivity Last year 10,000 new viruses, worms and Trojan horses were unleashed WHAT ARE SOME OF THESE BAD VIRUSES? WHAT ARE SOME OF THESE BAD VIRUSES?
22
The viruses hardly ever replicate themselves to other computers: QUIZ#3 QUIZ#3 Are you ready? Here is another QUIZ… TRUE FALSE
23
YOU GOT IT!!!
24
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
25
ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU
26
It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?
27
There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE
28
There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS
29
What is Trojan Horse: QUIZ#1 QUIZ#1 It’s a quiz time!!!! a)USC Football MascotUSC Football Mascot b)It’s a program that contains or installs a malicious programIt’s a program that contains or installs a malicious program c)Computer VirusComputer Virus
30
YOU GOT IT!!!
31
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
32
It’s a program that contains or installs a malicious program Trojan horses may appear to be useful or interesting programs to an unsuspecting user Trojans are very harmful when executed WHAT IS TROJAN HORSE?
33
There are two common types of Trojan horses Useful software that has been corrupted by a hacker inserting malicious code Standalone program that masquerades as something else, like a game or image file TYPES OF TROJAN HORSE
34
There are two more types of Trojan horses Time bombs - activate on particular dates and/or times. Logic bombs - activate on certain conditions met by the computer MORE TYPES OF TROJANS
35
Which is NOT a type of Trojan QUIZ#2 QUIZ#2 ANOTHER QUIZ a)Time BombTime Bomb b)Logic BombLogic Bomb c)Water BombWater Bomb
36
YOU GOT IT!!!
37
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
38
Erasing or overwriting data on a computer Encrypting files Corrupting files in a subtle way Upload and download files Allowing remote access to the victim's computer Opening and closing CD-ROM tray Harvest e-mail addresses and use them for spam WHAT CAN THE TROJANS DO?
39
You can be infected by visiting a rogue website Using email Infection through open ports HOW CAN YOU GET INFECTED?
40
How can you get infected by a Trojan Horse? a)Visiting TroyVisiting Troy b)Visiting rogue websitesVisiting rogue websites a)Visiting a horse farmVisiting a horse farm QUIZ#3 QUIZ#3 ANOTHER QUIZ
41
YOU GOT IT!!!
42
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
43
ALWAYS RUN YOUR ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU
44
Spyware is computer software that collects personal information about users without their informed consent It’s a process where personal information is secretly recorded with a variety of techniques such as: logging keystrokes recording Internet web browsing history scanning documents on the computer's hard disk WHAT IS SPYWARE?
45
Spyware does not directly spread in the manner of a computer virus or worm The spyware stays in the infected computer where it collects information Spyware can be bundled with FREEWARE applications as well The users could be tricked by thinking they are installing useful software HOW IS SPYWARE SPREAD?
46
What is Spyware a)James Bond’s latest toyJames Bond’s latest toy b)Software that collects personal infoSoftware that collects personal info c)Cold War relicCold War relic QUIZ#1 QUIZ#1 Here comes the quiz
47
YOU GOT IT!!!
48
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
49
Anti-spyware programs can combat spyware in two ways: They can provide real time protection against the installation of spyware software Anti-spyware software programs can be used solely for detection and removal of spyware Such programs inspect the contents of Windows registry Operating system file Installed programs BEST SPYWARE PROGRAMS
50
SPYBOT Spy sweeper Spyware Doctor AVG Anti Spyware BEST ANTI SPYWARE SOFTWARE
51
Which software package doesn’t belong to the group of anti software a)Windows VistaWindows Vista b)SPYBOTSPYBOT a)Spy SweeperSpy Sweeper QUIZ#2 QUIZ#2 Here comes the quiz
52
YOU GOT IT!!!
53
OH NOOOOOOO!!!! CLICK HERE SO YOU CAN REVIEW AGAIN
54
ALWAYS RUN YOUR ANTI-SPYWARE SOFTWARE AND KEEP IT UPDATED!!! BACK TO THE MAIN MENU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.