Download presentation
Presentation is loading. Please wait.
Published byNoah Griffith Modified over 9 years ago
1
Northland Security Systems
2
Computer Viruses
3
Types of Viruses Nuisance viruses Data-destructive viruses Espionage viruses Hardware-destructive viruses Nuisance viruses Data-destructive viruses Espionage viruses Hardware-destructive viruses
4
Methods of Operation Email viruses Macro viruses Boot sector viruses Trojan horse viruses Stealth viruses Polymorphic viruses Logic (time) bombs Email viruses Macro viruses Boot sector viruses Trojan horse viruses Stealth viruses Polymorphic viruses Logic (time) bombs
5
Virus Symptoms Files become corrupt Program does not operate properly Programs or files vanish Strange messages appear on monitor Less memory space available A volume name has changed Email message appears repeatedly Files become corrupt Program does not operate properly Programs or files vanish Strange messages appear on monitor Less memory space available A volume name has changed Email message appears repeatedly
6
Security Strategies Data backup Disaster recovery plan Data encryption User IDs and passwords Biometric authentication Network sniffers Mini webcams Firewalls Data backup Disaster recovery plan Data encryption User IDs and passwords Biometric authentication Network sniffers Mini webcams Firewalls
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.