What’s in your computer
Upcoming SlideShare
Loading in...5
×
 

What’s in your computer

on

  • 199 views

 

Statistics

Views

Total Views
199
Views on SlideShare
199
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • What is a Virus? No, it’s not the kind we as humans are apt to acquire. According to Quinn, a virus is a piece of self-replicating code embedded within another program called the host. A virus can be on any device that has an executable program such as a flash drive, your hard disk, a CD or DVD, email attachments, but the biggest culprit is in your downloads. When you execute the program the virus also executes and does what ever it is programmed to do.
  • These days most viruses are programmed to replicate occupying disk space and consuming your computers CPU time. Others are programmed to do damage to your file system or uses your email’s address book to spread the virus ridden message to your contacts.
  • Don’t look a gift horse in the mouth.
  • We’re not talking about those fat juicy night crawlers you bait your hook with in order to catch a trout; no, we are talking about those sneaky programs that squirm into your computer from the network through security holes in your software. According to Quinn, A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. This could be hard wire or WiFi. Is your computer hooked up to a network? Then your computer is vulnerable.
  • Worms are different from viruses in the way that they replicate. Worms do not need a host program to execute itself. It comes through the network by way of holes in your operating system security. It’s replication of itself may slow your computer and any network traffic. Some are designed to open a back door to your computer in order for other malware to access your information. Worms have been used to delete subscribers from web hosts and cause denial-of-service attacks.
  • If you are hooked up to a network, or use storage devices to load things to your computer, use protection.

What’s in your computer What’s in your computer Presentation Transcript

  • Viruses, Worms, and Trojan Horses By: Laurie Madison
  • “Computer Gremlin 2” by Larry Wentzel Definition: A virus is a piece of self- replicating code embedded within another program called the host. 2 How does my computer catch a virus?
  • Definition: A Trojan horse is a program with a benign capability that conceals another, sinister purpose. How does my computer get a Trojan horse?
  • What kind of malicious tasks will a Trojan horse do? Some examples of malicious tasks Trojan horse programs have done are:  opening an Internet connection that allows an outsider to gain access to files  logging the keystrokes of the user and storing them in a file that the attacker can see  looking for passwords stored on the computer and emailing them to the attacker  destroying files  launching a denial-of-service attack on a website  turning the computer into a proxy server that can be used to launch spam or stash information from illegal activities.
  • How does my computer get a worm?Definition: A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!
  • • Infiltrate networks spreading all by itself through holes in your operating system security. • Use up your bandwidth • Slow computer processing down • Open a “back door” to infiltrate your computer • Can cause denial-of-service attacks interrupting web services • Deleting subscribers from Web hosts • May be used to control your computer or steal information
  • There’s an overwhelming list of products available. • Trend Micro • McAfee • Norton • Bitfender • And on and on…
  • References • Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc. • Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570 Thank you! Microsoft Office Clip Art, audiomicro.com/free-sound-effects, and pixabay.com for the free audio and clip art