Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life.

Similar presentations


Presentation on theme: "Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life."— Presentation transcript:

1 Computer Viruses

2 Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image.” “ I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image.” Stephen Hawking, Author & Scientist Stephen Hawking, Author & Scientist

3 What are Computer Viruses? A computer program written intentionally to enter a computer without the user’s permission or knowledge. A virus attaches itself to files or boot sectors and copies itself, thus continuing to spread. Some viruses do little other than replicate, however others can cause serious damage or severely effect program and system performance.

4 Overview of Viruses Viruses cost billions of dollars each year. They can be classified into three main categories that describe the part of the computer they infect: 1. boot-sector 2. file 3. macro Viruses can also be classified according to the type of infection they cause.

5 Where Do Viruses Come From? Created by computer programmers, typically males between age 14-34. Viruses are usually executable files or macros that attach themselves to applications. A virus may be spread by a user, without the knowledge of that user.

6 Common Places Viruses Where Spread: Internet Chat lines Email Floppy drives/DVDs, CD-ROMs Pirated Software People

7 Common Virus Types Boot Sector Virus Macro Virus Worms Virus Hoaxes E-mail Virus – Refers to method of delivery Trojan Horses

8 Group Activity JIGSAW

9 Group Names Group 1 – “Stoned” (Boot Sector) Group 2 – “Melissa” (Macro) Group 3 – “I Love You” (Worms) Group 4 – “Good Times” (Hoax) Group 5 – “Klez” (E-mail Delivery) Group 6 – “Trojan” (Trojan)

10 Group Assignment 1. Describe your virus type? 2. How does the virus break into the computer? 3. Your group is named after a computer virus; what did your virus do?

11 Anti-Virus Software

12 How Anti-Virus Software Works Step 1: Scans the memory When you first boot up your computer, the anti-virus software will check the memory to ensure that no virus is present before the computer starts opening more files. Step 2: Checks for a signature Every virus has a signature; the software searches for these signature. If found, the software can identify the virus and apply the appropriate measure to fix/delete the file.

13 How Anti-Virus Software Works (con’t) Step 3: Scans before opening files Anti-virus software allows you to specify which types of files will be checked before opening them. The software usually defaults to checking executable files, since these are the most common types of files to be infected. Step 4: Notification of a Detected Virus If a virus is found during any of these processes, the software will notify you. You are given the option of how to proceed. It is best to follow what the software advises. It will usually destroy the virus and then try to repair the file. However, if the file cannot be repaired, the file will be deleted.

14 Protecting Your Computer From Viruses Install Virus Protection Software with a subscription service Avoid programs from unknown sources (e.g. pirated software, internet files) Disable floppy disk booting – this eliminates the risk of a boot sector virus

15 Protect Your Computer From Viruses (con’t) Enable Macro Protection

16 Protect Your Computer From Viruses (con’t) Never double-click on an attachment that contains an executable file that arrives as an e-mail attachment.

17 Glossary Boot Sector - the first portion of a hard disk or floppy disk that controls the start-up sequence of the computer. Boot Sector Virus – a virus that executes when the computer boots up. Email Virus – a virus that is spread through email; in most cases the virus will sent itself to others without the user’s knowledge. Macro- a single computer instruction that results in a series of instructions in machine language. Macro Virus - a virus that uses the same machine language as a Macro; the virus ‘hides’ within the code. Payload - the eventual effect and magnitude of a computer virus. Trojan Horse - a malicious program that hides within a legitimate program. Virus - a computer program written intentionally to enter a computer without the user’s permission or knowledge Virus Hoax - a false warning about a computer virus. Worms – similar to virus, however they exist as separate entities. They can infect both computers and computer networks.

18 Privacy Privacy is a person’s ability to restrict or stop the collection, use, and sale of her or his personal information.

19 Identity Theft Identity theft is a consequence of online privacy invasion. It occurs when someone steals personal information about someone else for the purposes of impersonating him or her. The signs of identity theft include 1. bills or bank statements that do not arrive when they should 2. phone calls from collection agencies or creditors from whom you have not borrowed 3. withdrawals or transfers appear that you did not make 4. approval or denial for credit you have not applied for 5. you are turned down for a loan despite having a good credit rating

20 Personal Information Is Valuable A number of groups want information about you: –corporations –government –individuals with criminal intentions –employers –schools Why do they want your information?

21 Corporations Corporations gather demographic information to market products more effectively. Bill C-6 lays out guidelines for the collection and use of personal information. Cookies are small text files place on your computer’s hard drive by websites. –Cookies provide a footprint of websites visited. –They can be used to track online habits by corporations.

22 Government All three levels of government collect information about individuals: –federal –provincial –municipal Each government agency you interact with holds information about –your income –your job –taxes you’ve paid –government services you have used There is potential for both good and bad uses for this information.

23 Criminals Identity thieves use the Internet to access information electronically and impersonate their victims. Stalkers use the Internet to harm and harass their victims. Pedophiles use the Internet to lure young people to meet in person. Hackers use the Internet to steal passwords.

24 Employers and Schools Employers and schools monitor computer use, including email. There are few laws to protect employees and students from monitoring. Employers and schools can block certain website on the Internet.

25 Ten Steps to Protect Your Privacy 1. Use common sense. 2. Check for privacy policies. 3. Keep separate e-mail accounts for business and pleasure. 4. Clear your cache after browsing. 5. Encrypt whenever possible. 6. Use anonymous remailers. 7. Use anonymous web-surfing programs. 8. Check your system for leaks. 9. Say no to information sharing. 10. Use personal Internet security programs.

26 Cybercrimes and Online Scams phishingvishingpharminghacking salami shaving cyberstalking sexual predators evil twins online auction fraud

27 Spam Spam is unsolicited e-mail. Usually it is sent to thousands of recipients. Online scams often rely on spam.

28 Protecting Yourself From Cyberscams Be skeptical. Give out as little information about yourself as possible. Research the organizations you are dealing with. Call organizations from which you have received e-mails to confirm they are legitimate. Read the news and be aware of cyberscams. Report all cybercrimes to authorities.

29 LITERACY TOOLBOX Making Sense of TV Journalism –Media literacy is the ability to interpret and create personal meaning from visual images by analyzing their structure and function. –Challenge and question what you see, hear, and read in the media.

30 Registration of Domain Names You must register a domain name when setting up a website. Cybersquatters register domain names and then demand millions of dollars for the sale of the name to organizations. World Intellectual Property Organization (WIPO) determines if the cybersquatter has a legitimate claim to the name.


Download ppt "Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life."

Similar presentations


Ads by Google