SlideShare a Scribd company logo
1 of 11
What is computer virus?
- Attached to a small pieces of computer
code, software, or documents.
- A virus executes when the software is
run on a computer. If the virus spreads
to other computers. Those computers
could continue to spread the virus.
- A virus is transferred to another
through e-mail, file transfers, and
instant messaging.
- A virus has a potential to corrupt or even delete files on your computer, use e-mail to
spread itself to other computers, or even erase your hard drive.
What is Worm?
- Is a self-replicating program that is
harmful to networks.
- Worm uses the network to duplicate
its code to the hosts on a network, often
without any user intervention.
- Different from the virus because the
worm does not need to attach to a
program to infect the host.
- It harms networks because it
consumes bandwidth.
BANDWIDTH - describes the maximum data
transfer rate of a network or
Internet connection.
- measures how much data can be
sent over a specific connection in
a given amount of time.
What is Trojan Horse?
- Technically is a worm.
- Does not need to attached to other software
instead Trojan threat is hidden in software that
appears to do one thing, and yet behind the
scenes it does another.
Security Procedures
• Use a security plan to determine what will be done
in critical situation.
• Security plan should be constantly updated to
reflect the latest threats to a network.
• To be reviewed every year.
• Conduct tests to determine areas where security is
weak.
Most commonly known anti-virus
software
Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect
a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent updates.
SECURITY POLICY - most organizations established this
policy stating that employees are not permitted to install
any software that is not provided by the company.
Data Encryption
• Encrypting data involves using codes and ciphers.
• Can help prevent attackers from monitoring or
recording traffic between resources & computers
VPN – Virtual Private Network is any encryption
system that protects data as though it resides on a
private network.
Port Protection
• Firewall – is a way of protecting a computer from
intrusion through the ports.
• With port connection, the user can control the type
of data sent to a computer by selecting which ports
will be open & which will be secured.
• Traffic – the data being transported on a network.
Enabling Windows 7 Firewall
1. Open Windows 7 Firewall by clicking the Start button, and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you
want help protect, and then click OK.

More Related Content

What's hot

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
joycruiser
 

What's hot (20)

Ransomware
RansomwareRansomware
Ransomware
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explained
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Malware
MalwareMalware
Malware
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Wannacry
WannacryWannacry
Wannacry
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
hacking
hackinghacking
hacking
 

Viewers also liked

30 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete11130 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete111
Renée Bukay
 

Viewers also liked (18)

Romeo a Julie
Romeo a JulieRomeo a Julie
Romeo a Julie
 
3Com 10005321 REV AF
3Com 10005321 REV AF3Com 10005321 REV AF
3Com 10005321 REV AF
 
30 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete11130 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete111
 
Ppt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of CurriculumPpt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of Curriculum
 
Chatbots and AI
Chatbots and AIChatbots and AI
Chatbots and AI
 
Revizor
RevizorRevizor
Revizor
 
Utrpení mladého Werthera
Utrpení mladého WertheraUtrpení mladého Werthera
Utrpení mladého Werthera
 
Stařec a moře
Stařec a mořeStařec a moře
Stařec a moře
 
Tyrolské elegie
Tyrolské elegieTyrolské elegie
Tyrolské elegie
 
Rcs1 -chapter6-SLS
Rcs1 -chapter6-SLSRcs1 -chapter6-SLS
Rcs1 -chapter6-SLS
 
Внешний Совет Директоров
Внешний Совет ДиректоровВнешний Совет Директоров
Внешний Совет Директоров
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A Jumpstart
 
Proměna
ProměnaProměna
Proměna
 
Petr a Lucie
Petr a LuciePetr a Lucie
Petr a Lucie
 
Benefits of Technology
Benefits of TechnologyBenefits of Technology
Benefits of Technology
 
Resharper 使用經驗分享
Resharper 使用經驗分享Resharper 使用經驗分享
Resharper 使用經驗分享
 
Relevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detectionRelevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detection
 
Miss la sen hand drawing 6
Miss la sen hand drawing 6Miss la sen hand drawing 6
Miss la sen hand drawing 6
 

Similar to Viruses, worms, and trojan horses

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 

Similar to Viruses, worms, and trojan horses (20)

Firewall
FirewallFirewall
Firewall
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Mitppt
MitpptMitppt
Mitppt
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Firewall
FirewallFirewall
Firewall
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer networking
Computer networking Computer networking
Computer networking
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Network security
Network securityNetwork security
Network security
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 

More from EILLEN IVY PORTUGUEZ

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 

Viruses, worms, and trojan horses

  • 1.
  • 2. What is computer virus? - Attached to a small pieces of computer code, software, or documents. - A virus executes when the software is run on a computer. If the virus spreads to other computers. Those computers could continue to spread the virus. - A virus is transferred to another through e-mail, file transfers, and instant messaging. - A virus has a potential to corrupt or even delete files on your computer, use e-mail to spread itself to other computers, or even erase your hard drive.
  • 3. What is Worm? - Is a self-replicating program that is harmful to networks. - Worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. - Different from the virus because the worm does not need to attach to a program to infect the host. - It harms networks because it consumes bandwidth.
  • 4. BANDWIDTH - describes the maximum data transfer rate of a network or Internet connection. - measures how much data can be sent over a specific connection in a given amount of time.
  • 5. What is Trojan Horse? - Technically is a worm. - Does not need to attached to other software instead Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another.
  • 6. Security Procedures • Use a security plan to determine what will be done in critical situation. • Security plan should be constantly updated to reflect the latest threats to a network. • To be reviewed every year. • Conduct tests to determine areas where security is weak.
  • 7. Most commonly known anti-virus software
  • 8. Virus Protection Software • Known as Antivirus Software • Antivirus software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. • Becomes outdated quickly, the technician is responsible for applying the most recent updates. SECURITY POLICY - most organizations established this policy stating that employees are not permitted to install any software that is not provided by the company.
  • 9. Data Encryption • Encrypting data involves using codes and ciphers. • Can help prevent attackers from monitoring or recording traffic between resources & computers VPN – Virtual Private Network is any encryption system that protects data as though it resides on a private network.
  • 10. Port Protection • Firewall – is a way of protecting a computer from intrusion through the ports. • With port connection, the user can control the type of data sent to a computer by selecting which ports will be open & which will be secured. • Traffic – the data being transported on a network.
  • 11. Enabling Windows 7 Firewall 1. Open Windows 7 Firewall by clicking the Start button, and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want help protect, and then click OK.