Presentation is loading. Please wait.

Presentation is loading. Please wait.

For more notes and topics visit: www.eITnotes.com eITnotes.com.

Similar presentations


Presentation on theme: "For more notes and topics visit: www.eITnotes.com eITnotes.com."— Presentation transcript:

1 For more notes and topics visit: www.eITnotes.com eITnotes.com

2  A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.  One of the first detected virus was the Creeper virus in the early 70’s  Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk. eITnotes.com

3 Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse Script Virus eITnotes.com

4 Time Bomb A time bomb is a virus program that performs an activity on a particular date eITnotes.com

5 Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred. eITnotes.com

6 Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped eITnotes.com

7 Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk eITnotes.com

8 Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk eITnotes.com

9 Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages eITnotes.com

10 Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. eITnotes.com

11 Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers eITnotes.com

12 Actions to prevent virus infection Always update your anti-virus software at least weekly. Back up your important files and ensure that they can be restored. Change the computer's boot sequence to always start the PC from its hard drive eITnotes.com

13 Actions to prevent virus infection Don't share Drive C: without a password and without read-only restrictions. Empty floppy drives of diskettes before turning on computers, especially laptops. eITnotes.com

14  Functions slower than normal  Responds slowly and freezes often  Restarts itself often  See uncommon error messages, distorted menus, and dialog boxes  Notice applications fail to work correctly  Fail to print correctly eITnotes.com

15  One German newspaper tragically lost 2,000 pictures from its archive.  The perpetrator turned out to be a 23-year-old Filipino computer science student who more or less plagiarized all of his code.  The lack of laws in the Philippines covering computer crimes, he pretty much got away with his crime. eITnotes.com

16 Prevention  Upload and use antivirus software  Be aware of the e-mails and attachments you open  Check for updates on antivirus software regularly  Make sure antivirus software is installed correctly eITnotes.com

17


Download ppt "For more notes and topics visit: www.eITnotes.com eITnotes.com."

Similar presentations


Ads by Google