Download presentation
Presentation is loading. Please wait.
Published byLilian Bryan Modified over 9 years ago
1
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans
10
VIRUSES
11
What is a computer virus? A computer program that can copy itself and infect the computer. It can only spread from one computer to another when it’s host is taken to the target computer.
12
Dangers/Symptoms COMPUTER: Corrupts and deletes data files can make computer a “slave” slow down or shuts down computer fully APPLICATIONS/PROGRAMS: Applications won’t work properly Programs disappear EXTRAS: unusual error messages New icons Strange sounds/music
13
Preventions Keep firewall on. Keep the computer operating system up-to-date Use updated antivirus and anti- spy ware software on the computer
14
Example Of Virus The “Nimda” virus was one of the most complicated viruses, since it had up to 5 different methods of infecting Its methods include: email, open network shares, browsing of websites, back doors left behind, and exploitation of Microsoft The e-mail message has a file called README.EXE which unleashes this virus.
15
Virus Protection Norton Antivirus Scans emails, and IM’s for infections Detects, and stop new threats Prevents bots from taking control of your PC Finds and removes root kits Prevents Internet worms NOD32 Antivirus protect you from viruses and spy ware smart and fast, while adding removable media security, new diagnostic and recovery tools, and more advanced heuristics. Kaspersky Antivirus Protects from viruses and spy ware, Infected Websites, Hacker attacks, Spam and phasing, Identity theft $79.99 $58. 99 $79.95
16
WORMS
17
What is a Worm? It’s a software program which can duplicate itself automatically without human interference from one computer to another. They spread within a network and can also spread through USB’s.
18
What does it do? A worm takes advantage of files or any other features used to transport information on your system to travel unaided. Worms consume a lot of system memory and can slow down your computer.
19
Who do they affect? Worms affect networked environments (Computers that are connected with one another)
20
Protect yourself! 1. Keep firewall on 2. Keep operating system up-to-date with security updates. 3. Used updated antivirus soft wares from a trusted source
21
Blaster Worm Affected computers with Windows XP and Windows 2000. Spread by spamming itself on to a large amounts of random IP addresses. The worm contained two messages. The first : I just want to say LOVE YOU SAN!! And: billy gates why do you make this possible ? Stop making money and fix your software!! If worm detects a connection to the internet, it can lead to the system restarting every 60 seconds.
23
Trojan
24
What’s a Trojan? It’s a worm imbedded in a file that appears safe or a software from a trusted source Tricks users into opening it or downloading it.
25
Types of Trojans 1. Data Sending Trojans 2. Destructive Trojans 3. Proxy Trojans 4. FTP Trojans
26
How do you get it? Software downloads Email attachments Applications Downloading or uploading of files
28
Removal Antivirus software detects and deletes Trojans By erasing all data from the hard disk and reinstalling the operating system and required software Firewall program Anti Trojan Elite
29
How do I prevent Trojans? DO NOT download files from people or sites which you aren’t sure about. Watch out for hidden file extensions! DO NOT think you are completely safe just because you run anti-virus programs. DO NOT follow unsolicited links or open attachments in e-mail messages that you did not ask for. Use an Internet firewall.
30
ILOVEYOU or LOVELETTER Attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text "ILOVEYOU" in the subject line. It arrived in email inboxes with the simple subject of "ILOVEYOU" and an attachment "LOVE-LETTER- FOR-YOU.TXT.vbs".
31
Black Hat Hackerr
32
Shawn “Napster” Fanning
34
Quiz Time :]
35
Some of the Dangers and Affects of A computer virus include: A. The Computer will do the Chicken Dance and then morph into a flu vaccine. B. It will corrupt and delete files as well as show some unusual messages. C. You computer will blow up and turn into ashes.
36
Some of the Dangers and Affects of A computer virus include: A. The Computer will do the Chicken Dance and then morph into a flu vaccine. B. It will corrupt and delete files as well as show some unusual messages. C. You computer will blow up and turn into ashes.
37
Worms usually affect… A. Muddy creatures. B. People who step on worms. C. Networks enviroments.
38
Worms usually affect… A. Muddy creatures. B. People who step on worms. C. Networks enviroments.
39
A Black Hat Hacker is.. Someone who coughs a lot when he smokes. Someone who is shy and so they always wear a hat. Someone who hacks his way into a system.
40
A Black Hat Hacker is.. Someone who coughs a lot when he smokes. Someone who is shy and so they always wear a hat. Someone who hacks his way into a system.
41
Thank you for listening to our presentation.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.