Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

4 a module virus and spyware


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

4 a module virus and spyware

  1. 1. Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10
  2. 2. Malware <ul><li>Viruses and spyware are often referred to as malware, short for malicious software. </li></ul><ul><li>Malicious = vicious or mischievous </li></ul><ul><li>A virus uses your computer as it likes. It can interfere with your computer use. It can damage files or software. </li></ul><ul><li>Spyware uses your information. It can interfere with your computer use. It can steal your personal information. </li></ul>
  3. 3. Purpose <ul><li>Why would someone create a computer virus or spyware? </li></ul><ul><ul><li>Vandalism </li></ul></ul><ul><ul><li>Money </li></ul></ul>
  4. 4. Bogus Link Example <ul><li>Why should you not trust a message such as the one below, even if it comes from a friend? </li></ul>
  5. 5. Bogus Chat Message <ul><li>This one is trickier. Why not trust these chat messages? </li></ul>
  6. 6. How Computer Viruses Work <ul><li>A virus can spell doom for your computer. </li></ul><ul><li>Viruses- A small piece of software that piggy backs on real programs. </li></ul><ul><li>E-Mail Viruses- an email virus travels as an attachment to email messages. </li></ul><ul><li>Trojan horses- A Trojan Horse is simply a computer program . </li></ul><ul><li>Worms- a worm is a small piece of software that uses computer networks and security holes to replicate itself. </li></ul>
  7. 7. How Viruses & Spyware Spread <ul><li>User clicks on an email attachment that downloads a virus or spyware. </li></ul><ul><li>User clicks on downloadable file on a website that downloads a virus or spyware. </li></ul><ul><li>User clicks on link in an email, on a website or on a social network. The link takes user to a website that attacks browser and forces virus or spyware download. </li></ul>
  8. 8. How Spyware works on your Computer
  9. 9. Symptoms <ul><li>Homepage changes (and you did not change it!) </li></ul><ul><li>A lot of pop-up windows you cannot stop. </li></ul><ul><li>Unexpected toolbars show up. </li></ul><ul><li>Redirected to sites you did not request. </li></ul><ul><li>Search results are provided by a different search engine than you used. </li></ul><ul><li>Browser continues to crash inexplicably. </li></ul><ul><li>Files disappear (because they have been erased.) </li></ul><ul><li>Computer shuts down inexplicably. </li></ul><ul><li>Computer extremely slow. </li></ul><ul><li>A lot more junk email being received. </li></ul>
  10. 10. Prevention Tips <ul><li>Keep all your operating system and all software updated. Most virus and spyware attacks occur through security holes in popular software applications. </li></ul><ul><li>For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, virus and spyware creators target security holes in IE. </li></ul><ul><li>Don’t click on any pop ups or ads offering you anything for free. </li></ul>
  11. 11. Free Anti-Virus & Spyware Software <ul><li>Use an anti-virus software that scans as files are downloaded. Do not use more than one anti-virus software that runs in real time. Recommended - AVG Free Anti-Virus </li></ul><ul><li>Use a spyware software that scans periodically. Recommended - Spybot Search & Destroy and Malwarebytes </li></ul>
  12. 12. Creative Commons License <ul><li>This module was created by Connect Your Community, a project of OneCommunity , funded by the federal Broadband Technology Opportunities Program . </li></ul><ul><li>This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit </li></ul>