Your SlideShare is downloading. ×
0
Internet and Network Attacks <ul><li>What are  viruses ,  worms , and  Trojan horses ? </li></ul>p. 558 Virus  is a potent...
Internet and Network Attacks <ul><li>How can a virus spread through an e-mail message? </li></ul>p. 559 Fig. 11-2 Step 1. ...
Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
Internet and Network Attacks <ul><li>How can you protect your system from a macro virus? </li></ul>p. 560 Fig. 11-3 <ul><u...
Internet and Network Attacks <ul><li>What is an  antivirus program ? </li></ul>p. 560 - 561 Fig. 11-4 <ul><ul><li>Identifi...
Internet and Network Attacks <ul><li>What is a  virus signature ? </li></ul>p. 561 Fig. 11-5 <ul><ul><li>Specific pattern ...
Internet and Network Attacks <ul><li>How does an antivirus program  inoculate  a program file? </li></ul>p. 561 Keeps file...
Internet and Network Attacks <ul><li>What are some tips for preventing virus, worm, and Trojan horse infections? </li></ul...
Upcoming SlideShare
Loading in...5
×

Wong Pau Tung-special-topic-02-Virus

1,019

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,019
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Wong Pau Tung-special-topic-02-Virus"

  1. 1. Internet and Network Attacks <ul><li>What are viruses , worms , and Trojan horses ? </li></ul>p. 558 Virus is a potentially damaging computer program <ul><li>Worm copies itself repeatedly, using up resources and possibly shutting down computer or network </li></ul>Trojan horse hides within or looks like legitimate program until triggered Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive Can spread and damage files Does not replicate itself on other computers Next
  2. 2. Internet and Network Attacks <ul><li>How can a virus spread through an e-mail message? </li></ul>p. 559 Fig. 11-2 Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message. Step 2. They use the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a. Some users open the attachment and their computers become infected with the virus. Next
  3. 3. Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
  4. 4. Internet and Network Attacks <ul><li>How can you protect your system from a macro virus? </li></ul>p. 560 Fig. 11-3 <ul><ul><li>Set macro security level in applications that allow you to write macros </li></ul></ul><ul><ul><li>Set security level so that warning displays that document contains macro </li></ul></ul><ul><ul><ul><li>Macros are instructions saved in an application, such as word processing or spreadsheet program </li></ul></ul></ul>Next
  5. 5. Internet and Network Attacks <ul><li>What is an antivirus program ? </li></ul>p. 560 - 561 Fig. 11-4 <ul><ul><li>Identifies and removes computer viruses </li></ul></ul><ul><ul><li>Most also protect against worms and Trojan horses </li></ul></ul>Next
  6. 6. Internet and Network Attacks <ul><li>What is a virus signature ? </li></ul>p. 561 Fig. 11-5 <ul><ul><li>Specific pattern of virus code </li></ul></ul><ul><ul><ul><li>Also called virus definition </li></ul></ul></ul><ul><ul><li>Antivirus programs look for virus signatures </li></ul></ul>Next
  7. 7. Internet and Network Attacks <ul><li>How does an antivirus program inoculate a program file? </li></ul>p. 561 Keeps file in separate area of hard disk Next Records information about program such as file size and creation date Attempts to remove any detected virus Uses information to detect if virus tampers with file Quarantines infected files that it cannot remove
  8. 8. Internet and Network Attacks <ul><li>What are some tips for preventing virus, worm, and Trojan horse infections? </li></ul>p. 562 Install a personal firewall program If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately Never start a computer with removable media inserted Never open an e-mail attachment unless you are expecting it and it is from a trusted source Install an antivirus program on all of your computers Check all downloaded programs for viruses, worms, or Trojan horses Next Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Virus Hoaxes below Chapter 11
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×