SlideShare a Scribd company logo
1 of 6
Northland
Security Systems
Computer Viruses
Types of Viruses
 Nuisance viruses
 Data-destructive viruses
 Espionage viruses
 Hardware-destructive viruses
Methods of Operation
 Email viruses
 Macro viruses
 Boot sector viruses
 Trojan horse viruses
 Stealth viruses
 Polymorphic viruses
 Logic (time) bombs
Virus Symptoms
 Files become corrupt
 Program does not operate
properly
 Programs or files vanish
 Strange messages appear on
monitor
 Less memory space available
 A volume name has changed
 Email message appears repeatedly
Security Strategies
 Data backup
 Disaster recovery plan
 Data encryption
 User IDs and passwords
 Biometric authentication
 Network sniffers
 Mini webcams
 Firewalls

More Related Content

What's hot

Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
UltraUploader
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
Santhosh Sundar
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Technology flash cards
Technology flash cardsTechnology flash cards
Technology flash cards
mikek1975
 

What's hot (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cryptovirology - by Malathi
Cryptovirology - by MalathiCryptovirology - by Malathi
Cryptovirology - by Malathi
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Security threats and trends-topic 2
Security threats and trends-topic 2Security threats and trends-topic 2
Security threats and trends-topic 2
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Eecs441 5min-10week
Eecs441 5min-10weekEecs441 5min-10week
Eecs441 5min-10week
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security
Computer securityComputer security
Computer security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Technology flash cards
Technology flash cardsTechnology flash cards
Technology flash cards
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013
 

Viewers also liked

150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
"Crista" B.M.
 
CORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMACORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMA
ajay sharma
 
CORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMACORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMA
ajay sharma
 
StoneHill_OutsourcedIT
StoneHill_OutsourcedITStoneHill_OutsourcedIT
StoneHill_OutsourcedIT
David Bryden
 
PartagerWinter2015
PartagerWinter2015PartagerWinter2015
PartagerWinter2015
Anita Hung
 

Viewers also liked (17)

150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
150420 TIME SENSITIVE CORRESPONDENCE TO AYATOLLAH KHAMENEI, PRINCESS AMEERA A...
 
CORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMACORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMA
 
CORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMACORPORATE CV_ADV AJAY SHARMA
CORPORATE CV_ADV AJAY SHARMA
 
kamal cert 1
kamal cert 1kamal cert 1
kamal cert 1
 
Lectura del apartado 1
Lectura del apartado 1Lectura del apartado 1
Lectura del apartado 1
 
1171
11711171
1171
 
Conference fillers activities by tangram events
Conference fillers activities by tangram eventsConference fillers activities by tangram events
Conference fillers activities by tangram events
 
StoneHill_OutsourcedIT
StoneHill_OutsourcedITStoneHill_OutsourcedIT
StoneHill_OutsourcedIT
 
Supplements. Are They Even That Important?
Supplements. Are They Even That Important?Supplements. Are They Even That Important?
Supplements. Are They Even That Important?
 
Правила поведінки з вибухонебезпечними приладами
Правила поведінки з вибухонебезпечними приладамиПравила поведінки з вибухонебезпечними приладами
Правила поведінки з вибухонебезпечними приладами
 
էդվարդ գրիգ
էդվարդ գրիգէդվարդ գրիգ
էդվարդ գրիգ
 
Inovação e Design - Estética ou Funcionalidade CPBR9
Inovação e Design - Estética ou Funcionalidade CPBR9Inovação e Design - Estética ou Funcionalidade CPBR9
Inovação e Design - Estética ou Funcionalidade CPBR9
 
Anafilaxia inmunoalergo
Anafilaxia  inmunoalergoAnafilaxia  inmunoalergo
Anafilaxia inmunoalergo
 
Flerchinger Resume 3-25
Flerchinger Resume 3-25Flerchinger Resume 3-25
Flerchinger Resume 3-25
 
Ahmedabad Real Estate Presentation
Ahmedabad Real Estate PresentationAhmedabad Real Estate Presentation
Ahmedabad Real Estate Presentation
 
PartagerWinter2015
PartagerWinter2015PartagerWinter2015
PartagerWinter2015
 
Propiedad intelectual en Colombia
Propiedad intelectual en Colombia Propiedad intelectual en Colombia
Propiedad intelectual en Colombia
 

PowerPoint Sample

  • 3. Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses
  • 4. Methods of Operation  Email viruses  Macro viruses  Boot sector viruses  Trojan horse viruses  Stealth viruses  Polymorphic viruses  Logic (time) bombs
  • 5. Virus Symptoms  Files become corrupt  Program does not operate properly  Programs or files vanish  Strange messages appear on monitor  Less memory space available  A volume name has changed  Email message appears repeatedly
  • 6. Security Strategies  Data backup  Disaster recovery plan  Data encryption  User IDs and passwords  Biometric authentication  Network sniffers  Mini webcams  Firewalls