Download presentation
Presentation is loading. Please wait.
Published byBriana Dean Modified over 9 years ago
1
Madison Security Systems
2
Computer Viruses
3
Types of Viruses Nuisance Viruses Data-Destructive Viruses Espionage Viruses Hardware-Destructive Viruses
4
Methods of Operation E-Mail Viruses Macro Viruses Boot Sector Viruses Trojan Horse Viruses Stealth Viruses Polymorphic Viruses Logic (Time) Bombs
5
Virus Symptoms Files become corrupt Program does not operate properly Programs or files vanish Strange messages appear on monitor Less memory or disk space available A disk or volume name has changed E-mail message appears repeatedly
6
Security Strategies Data backup Disaster recovery plan Data encryption User IDs and passwords Biometric authentication Network sniffers Mini Webcams Firewalls
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.