SlideShare a Scribd company logo
1 of 9
Viruses, Worms, and Trojan Horses By: Laurie Madison
“Computer Gremlin 2” by Larry Wentzel
Definition:
A virus is a piece of self-
replicating code embedded
within another program
called the host.
2
How does my computer
catch a virus?
Definition:
A Trojan horse is a program
with a benign capability
that conceals another,
sinister purpose.
How does my computer get a
Trojan horse?
What kind of malicious tasks
will a Trojan horse do?
Some examples of malicious tasks Trojan horse
programs have done are:
 opening an Internet connection that allows an
outsider to gain access to files
 logging the keystrokes of the user and storing
them in a file that the attacker can see
 looking for passwords stored on the computer
and emailing them to the attacker
 destroying files
 launching a denial-of-service attack on a
website
 turning the computer into a proxy server that
can be used to launch spam or stash
information from illegal activities.
How does my computer get
a worm?Definition:
A worm is a self-contained
program that spreads through
a computer network by
exploiting security holes in the
computers connected to the
network. Oh no, a Worm Hole!
• Infiltrate networks spreading all by
itself through holes in your operating
system security.
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
computer
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
There’s an overwhelming
list of products available.
• Trend Micro
• McAfee
• Norton
• Bitfender
• And on and on…
References
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson
Education, Inc.
• Wentzel, L. Computer Gremlin 2. Retrieved from
http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570
Thank you!
Microsoft Office Clip Art,
audiomicro.com/free-sound-effects, and
pixabay.com for the free audio and clip art

More Related Content

What's hot

Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks revetonMumbere Joab
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threatspcsafe
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 

What's hot (20)

Malwares
MalwaresMalwares
Malwares
 
Internet security
Internet securityInternet security
Internet security
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Virus
VirusVirus
Virus
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
internet security
internet securityinternet security
internet security
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Security
SecuritySecurity
Security
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Hacker !
Hacker !Hacker !
Hacker !
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 

Viewers also liked

Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมChainarong Maharak
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Gopalfacultyphdthesys
GopalfacultyphdthesysGopalfacultyphdthesys
GopalfacultyphdthesysGopal Anchuri
 
Materi of mini seminar (Speaking 4)
Materi of mini seminar (Speaking 4)Materi of mini seminar (Speaking 4)
Materi of mini seminar (Speaking 4)Riva Warid
 
What’s the first rule of Computer Club - talk about Computer Club!
What’s the first rule of Computer Club - talk about Computer Club! What’s the first rule of Computer Club - talk about Computer Club!
What’s the first rule of Computer Club - talk about Computer Club! Carolyn Royston
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 

Viewers also liked (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Virus
VirusVirus
Virus
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Gopalfacultyphdthesys
GopalfacultyphdthesysGopalfacultyphdthesys
Gopalfacultyphdthesys
 
Materi of mini seminar (Speaking 4)
Materi of mini seminar (Speaking 4)Materi of mini seminar (Speaking 4)
Materi of mini seminar (Speaking 4)
 
History Of P C
History Of P CHistory Of P C
History Of P C
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
What’s the first rule of Computer Club - talk about Computer Club!
What’s the first rule of Computer Club - talk about Computer Club! What’s the first rule of Computer Club - talk about Computer Club!
What’s the first rule of Computer Club - talk about Computer Club!
 
6 Infographics About Presentations
6 Infographics About Presentations6 Infographics About Presentations
6 Infographics About Presentations
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 

Similar to What’s in your computer

Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 

Similar to What’s in your computer (20)

Malware
MalwareMalware
Malware
 
Presentation
PresentationPresentation
Presentation
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Information security
Information securityInformation security
Information security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Security threats
Security threatsSecurity threats
Security threats
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

What’s in your computer

  • 1. Viruses, Worms, and Trojan Horses By: Laurie Madison
  • 2. “Computer Gremlin 2” by Larry Wentzel Definition: A virus is a piece of self- replicating code embedded within another program called the host. 2 How does my computer catch a virus?
  • 3.
  • 4. Definition: A Trojan horse is a program with a benign capability that conceals another, sinister purpose. How does my computer get a Trojan horse?
  • 5. What kind of malicious tasks will a Trojan horse do? Some examples of malicious tasks Trojan horse programs have done are:  opening an Internet connection that allows an outsider to gain access to files  logging the keystrokes of the user and storing them in a file that the attacker can see  looking for passwords stored on the computer and emailing them to the attacker  destroying files  launching a denial-of-service attack on a website  turning the computer into a proxy server that can be used to launch spam or stash information from illegal activities.
  • 6. How does my computer get a worm?Definition: A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!
  • 7. • Infiltrate networks spreading all by itself through holes in your operating system security. • Use up your bandwidth • Slow computer processing down • Open a “back door” to infiltrate your computer • Can cause denial-of-service attacks interrupting web services • Deleting subscribers from Web hosts • May be used to control your computer or steal information
  • 8. There’s an overwhelming list of products available. • Trend Micro • McAfee • Norton • Bitfender • And on and on…
  • 9. References • Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc. • Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570 Thank you! Microsoft Office Clip Art, audiomicro.com/free-sound-effects, and pixabay.com for the free audio and clip art

Editor's Notes

  1. What is a Virus? No, it’s not the kind we as humans are apt to acquire. According to Quinn, a virus is a piece of self-replicating code embedded within another program called the host. A virus can be on any device that has an executable program such as a flash drive, your hard disk, a CD or DVD, email attachments, but the biggest culprit is in your downloads. When you execute the program the virus also executes and does what ever it is programmed to do.
  2. These days most viruses are programmed to replicate occupying disk space and consuming your computers CPU time. Others are programmed to do damage to your file system or uses your email’s address book to spread the virus ridden message to your contacts.
  3. Don’t look a gift horse in the mouth.
  4. We’re not talking about those fat juicy night crawlers you bait your hook with in order to catch a trout; no, we are talking about those sneaky programs that squirm into your computer from the network through security holes in your software. According to Quinn, A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. This could be hard wire or WiFi. Is your computer hooked up to a network? Then your computer is vulnerable.
  5. Worms are different from viruses in the way that they replicate. Worms do not need a host program to execute itself. It comes through the network by way of holes in your operating system security. It’s replication of itself may slow your computer and any network traffic. Some are designed to open a back door to your computer in order for other malware to access your information. Worms have been used to delete subscribers from web hosts and cause denial-of-service attacks.
  6. If you are hooked up to a network, or use storage devices to load things to your computer, use protection.