SlideShare a Scribd company logo
1 of 22
Computer Security Risks
What is a computer security risk?
p. 556 - 558 Fig. 11-1 Next
 Event or action that causes loss of or damage to
computer system
Virus
A computer virus is a computer program that can replicate
itself and spread from one computer to another. The term
"virus" is also commonly but misused to refer to other types
of malware, including but not limited to adware and
spyware programs that do not have the reproductive ability.
A true virus can spread from one computer to another (in
some form of executable code) when its host is taken to the
target computer; for instance because a user sent it over a
network or the Internet, or carried it on a removable
medium such as a floppy disk, CD, DVD, or USB drive.
Types of Virus
Not all computer viruses behave, replicate,
or infect the same way. There are several
different categories of viruses and malware.
Below I list and discuss some of the most
common types of computer viruses.
Trojan Horse
Trojan Horse:
A Trojan horse program has the appearance of having a useful and desired
function. While it may advertise its activity after launching, this information
is not apparent to the user beforehand. Secretly the program performs other,
undesired functions. A Trojan Horse neither replicates nor copies itself, but
causes damage or compromises the security of the computer. A Trojan
Horse must be sent by someone or carried by another program and may
arrive in the form of a joke program or software of some sort. The malicious
functionality of a Trojan Horse may be anything undesirable for a computer
user, including data destruction or compromising a system by providing a
means for another computer to gain access, thus bypassing normal access
controls.
Worms
Worms:
A worm is a program that makes and facilitates the distribution
of copies of itself; for example, from one disk drive to another,
or by copying itself using email or another transport
mechanism. The worm may do damage and compromise the
security of the computer. It may arrive via exploitation of a
system vulnerability or by clicking on an infected e-mail.
Types of virus continued ……
Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by
the computer upon bootup. These are normally spread by floppy disks.
Macro Virus:
Macro viruses are viruses that use another application's macro
programming language to distribute themselves. They infect documents
such as MS Word or MS Excel and are typically spread to other similar
documents.
Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory (RAM).
They are initiated from a virus which runs on the computer and they stay in
memory after it's initiating program closes.
Types of virus continued ……
Root kit Virus:
A root kit virus is an undetectable virus which attempts to allow someone to
gain control of a computer system. The term root kit comes from the Linux
administrator root user. These viruses are usually installed by Trojans and are
normally disguised as operating system files.
Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of itself,
but it also changes it's digital signature every time it replicates. This makes it
difficult or less sophisticated antivirus software to detect.
Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or when a
specific event occurs. Some examples are a virus which deletes your photos on
Halloween, or a virus which deletes a database table if a certain employee gets
fired.
Stand-Alone Utility Programs
What is a virus?
p. 425 - 426 Fig. 8-36
 Potentially damaging computer program
 Affects computer without user’s knowledge
SIGNS OFSIGNS OF
VIRUSVIRUS
INFECTIONINFECTION
• An unusual message or image is displayed on the
computer screen
• An unusual sound or music plays randomly
• The available memory is less than what should be
available
• A program or file suddenly is missing
• An unknown program or file mysteriously appears
• The size of a file changes without explanation
• A file becomes corrupted
• A program or file does not work properly
• System properties change
•The operating system runs much slower than usual
Stand-Alone Utility Programs
What is an antivirus program?
p. 426 Fig. 8-37
 Identifies and removes viruses in memory, storage
media, and incoming files
 Must be updated frequently
Internet and Network Attacks
What is an antivirus program?
p. 560 - 561 Fig. 11-4 Next
 Identifies and removes
computer viruses
 Most also protect against
worms and Trojan
horses
Internet and Network Attacks
What are viruses, worms, and Trojan horses?
p. 558 Next
VirusVirus is a
potentially
damaging
computer
program
WormWorm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network
Trojan horseTrojan horse
hides within
or looks like
legitimate
program until
triggered
Payload
(destructive
event) that is
delivered when
you open file, run
infected program,
or boot computer
with infected disk
in disk driveCan spread
and
damage
files
Does not
replicate
itself on
other
computers
Internet and Network Attacks
How can a virus spread through an e-mail message?
p. 559 Fig. 11-2 Next
Step 1. Unscrupulous
programmers create a
virus program. They hide
the virus in a Word
document and attach the
Word document to an e-
mail message.
Step 2. They use
the Internet to
send the e-mail
message to
thousands of users
around the world.
Step 3b. Other users do not
recognize the name of the
sender of the e-mail message.
These users do not open the
e-mail message. Instead they
delete the e-mail message.
These users’ computers are
not infected with the virus.
Step 3a. Some
users open the
attachment and
their computers
become infected
with the virus.
Internet and Network Attacks
How can you protect your system from a macro virus?
p. 560 Fig. 11-3 Next
 Set macro security level in applications that allow you to write
macros
 Set security level so that
warning displays that
document contains macro
 Macros are instructions
saved in an application,
such as word processing
or spreadsheet program
Keeps file
in separate
area of hard disk
Internet and Network Attacks
How does an antivirus program inoculate a program
file?
p. 561 Next
RecordsRecords
informationinformation
about program suchabout program such
as file size andas file size and
creationcreation
datedate
AttemptsAttempts
to removeto remove
any detectedany detected
virusvirus
UsesUses
informationinformation
to detect ifto detect if
virus tampersvirus tampers
with filewith file
QuarantinesQuarantines
infectedinfected
files that itfiles that it
cannotcannot
removeremove
Internet and Network Attacks
What is a firewall?
p. 563 Fig. 11-7 Next
 Security system consisting of hardware and/or
software that prevents unauthorized intrusion
Unauthorized Access and Use
What are other ways to protect your personal computer?
p. 565 Fig. 11-9 Next
 Disable file and printer sharing on
Internet connection
User Authentication(login)
What is a user name?
p. 566 Fig. 11-10 Next
 Unique combination of characters that identifies user
 Password is private
combination of
characters associated
with the user name
that allows access
to computer
resources
Tips for security
What are some tips for preventing virus, worm, and
Trojan horse infections?
p. 562 Next
Install a personal
firewall program
If the antivirus
program flags an
e-mail attachment
as infected, delete
the attachment
immediately
Never start a
computer with
removable media
inserted
Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source
Install an antivirus
program on all of
your computers
Check all
downloaded
programs for
viruses, worms,
or Trojan horses
Software Theft
What is a license agreement?
p. 570 Fig. 11-15 Next
 Right to use software
 Single-user license agreement allows user to install software
on one computer, make backup copy, and sell software
after removing from computer
Backing Up — The Ultimate
Safeguard
What is a backup?
p. 576 Next
Duplicate of file, program, or disk
Full backupFull backup
all files in
computer
Full backupFull backup
all files in
computer
Selective backupSelective backup
select which files
to back up
Selective backupSelective backup
select which files
to back up
Three-generationThree-generation
backupbackup
preserves
three copies of
important files
Three-generationThree-generation
backupbackup
preserves
three copies of
important files
In case of system failure or corrupted files,
restorerestore files by copying to original location
Information Privacy
What are spyware, adware, and spam?
p. 583 - 584 Fig. 11-29 Next
 Spyware is program
placed on computer
without user’s
knowledge
 Adware is a program
that displays online
advertisements
 Spam is bogus
e-mail message sent
to many recipients
Information Privacy
How can you control spam?
p. 584 Next
Collects spam in
central location
that you can
view any time
Service that
blocks e-mail
messages from
designated
sources
E-mail filteringE-mail filtering
Sometimes
removes valid
e-mail messages
Attempts to
remove spam
Anti-spam programAnti-spam program

More Related Content

What's hot

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Security presentation
Security presentationSecurity presentation
Security presentation
 

Viewers also liked

Teknologi maklumat pada masa kini
Teknologi maklumat pada masa kiniTeknologi maklumat pada masa kini
Teknologi maklumat pada masa kini
Megala Silva Raju
 
Pengajian Perniagaan 2 Teknologi Maklumat
Pengajian Perniagaan 2  Teknologi MaklumatPengajian Perniagaan 2  Teknologi Maklumat
Pengajian Perniagaan 2 Teknologi Maklumat
guest44119e2
 
Dskp kssr teknologi maklumat & komunikasi tahun 6
Dskp kssr teknologi maklumat & komunikasi tahun 6Dskp kssr teknologi maklumat & komunikasi tahun 6
Dskp kssr teknologi maklumat & komunikasi tahun 6
Abu Uzair
 
Teknologi dan perkembangannya
Teknologi dan perkembangannyaTeknologi dan perkembangannya
Teknologi dan perkembangannya
antianti
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputer
razak12345
 
Teknik Pengucapan Awam
Teknik Pengucapan AwamTeknik Pengucapan Awam
Teknik Pengucapan Awam
aimm reka
 

Viewers also liked (20)

Classification of pteridophyta
Classification of pteridophytaClassification of pteridophyta
Classification of pteridophyta
 
Bab 1
Bab 1Bab 1
Bab 1
 
Penggunaan ict abad 21
Penggunaan ict abad 21Penggunaan ict abad 21
Penggunaan ict abad 21
 
Evolusi..Mata Kuliah Media Pembelajaran
Evolusi..Mata Kuliah Media PembelajaranEvolusi..Mata Kuliah Media Pembelajaran
Evolusi..Mata Kuliah Media Pembelajaran
 
Teknologi maklumat pada masa kini
Teknologi maklumat pada masa kiniTeknologi maklumat pada masa kini
Teknologi maklumat pada masa kini
 
Slide Materi cloud computing fundamental
Slide Materi cloud computing fundamentalSlide Materi cloud computing fundamental
Slide Materi cloud computing fundamental
 
faham evolusi mahluk hidup pra darwin
faham evolusi mahluk hidup pra darwinfaham evolusi mahluk hidup pra darwin
faham evolusi mahluk hidup pra darwin
 
Pengajian Perniagaan 2 Teknologi Maklumat
Pengajian Perniagaan 2  Teknologi MaklumatPengajian Perniagaan 2  Teknologi Maklumat
Pengajian Perniagaan 2 Teknologi Maklumat
 
Dskp kssr teknologi maklumat & komunikasi tahun 6
Dskp kssr teknologi maklumat & komunikasi tahun 6Dskp kssr teknologi maklumat & komunikasi tahun 6
Dskp kssr teknologi maklumat & komunikasi tahun 6
 
Teknologi Cloud computing ( Teknologi awan)
Teknologi Cloud computing ( Teknologi awan)Teknologi Cloud computing ( Teknologi awan)
Teknologi Cloud computing ( Teknologi awan)
 
RPT Modul TMK tahun 1 2017
RPT  Modul TMK  tahun 1 2017RPT  Modul TMK  tahun 1 2017
RPT Modul TMK tahun 1 2017
 
Application of ICT for Clinical Care Improvement
Application of ICT for Clinical Care ImprovementApplication of ICT for Clinical Care Improvement
Application of ICT for Clinical Care Improvement
 
Teknologi dan perkembangannya
Teknologi dan perkembangannyaTeknologi dan perkembangannya
Teknologi dan perkembangannya
 
ilmu pengetahuan alam dan teknologi bagi kehidupan manusia
ilmu pengetahuan alam dan teknologi bagi kehidupan manusiailmu pengetahuan alam dan teknologi bagi kehidupan manusia
ilmu pengetahuan alam dan teknologi bagi kehidupan manusia
 
ICT: a catalyst for learning & innovation
ICT: a catalyst for learning & innovationICT: a catalyst for learning & innovation
ICT: a catalyst for learning & innovation
 
Ict bab3 rangkaian komputer dan komunikasi
Ict bab3 rangkaian komputer dan komunikasi Ict bab3 rangkaian komputer dan komunikasi
Ict bab3 rangkaian komputer dan komunikasi
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputer
 
ICT Strategic Planning
ICT Strategic PlanningICT Strategic Planning
ICT Strategic Planning
 
Teknik Pengucapan Awam
Teknik Pengucapan AwamTeknik Pengucapan Awam
Teknik Pengucapan Awam
 
Model komunikasi
Model komunikasiModel komunikasi
Model komunikasi
 

Similar to viruses

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

Similar to viruses (20)

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Recently uploaded (20)

WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 

viruses

  • 1. Computer Security Risks What is a computer security risk? p. 556 - 558 Fig. 11-1 Next  Event or action that causes loss of or damage to computer system
  • 2. Virus A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but misused to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • 3. Types of Virus Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.
  • 4. Trojan Horse Trojan Horse: A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
  • 5. Worms Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.
  • 6. Types of virus continued …… Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 7. Types of virus continued …… Root kit Virus: A root kit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term root kit comes from the Linux administrator root user. These viruses are usually installed by Trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult or less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.
  • 8. Stand-Alone Utility Programs What is a virus? p. 425 - 426 Fig. 8-36  Potentially damaging computer program  Affects computer without user’s knowledge SIGNS OFSIGNS OF VIRUSVIRUS INFECTIONINFECTION • An unusual message or image is displayed on the computer screen • An unusual sound or music plays randomly • The available memory is less than what should be available • A program or file suddenly is missing • An unknown program or file mysteriously appears • The size of a file changes without explanation • A file becomes corrupted • A program or file does not work properly • System properties change •The operating system runs much slower than usual
  • 9. Stand-Alone Utility Programs What is an antivirus program? p. 426 Fig. 8-37  Identifies and removes viruses in memory, storage media, and incoming files  Must be updated frequently
  • 10. Internet and Network Attacks What is an antivirus program? p. 560 - 561 Fig. 11-4 Next  Identifies and removes computer viruses  Most also protect against worms and Trojan horses
  • 11. Internet and Network Attacks What are viruses, worms, and Trojan horses? p. 558 Next VirusVirus is a potentially damaging computer program WormWorm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horseTrojan horse hides within or looks like legitimate program until triggered Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk driveCan spread and damage files Does not replicate itself on other computers
  • 12. Internet and Network Attacks How can a virus spread through an e-mail message? p. 559 Fig. 11-2 Next Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e- mail message. Step 2. They use the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a. Some users open the attachment and their computers become infected with the virus.
  • 13. Internet and Network Attacks How can you protect your system from a macro virus? p. 560 Fig. 11-3 Next  Set macro security level in applications that allow you to write macros  Set security level so that warning displays that document contains macro  Macros are instructions saved in an application, such as word processing or spreadsheet program
  • 14. Keeps file in separate area of hard disk Internet and Network Attacks How does an antivirus program inoculate a program file? p. 561 Next RecordsRecords informationinformation about program suchabout program such as file size andas file size and creationcreation datedate AttemptsAttempts to removeto remove any detectedany detected virusvirus UsesUses informationinformation to detect ifto detect if virus tampersvirus tampers with filewith file QuarantinesQuarantines infectedinfected files that itfiles that it cannotcannot removeremove
  • 15. Internet and Network Attacks What is a firewall? p. 563 Fig. 11-7 Next  Security system consisting of hardware and/or software that prevents unauthorized intrusion
  • 16. Unauthorized Access and Use What are other ways to protect your personal computer? p. 565 Fig. 11-9 Next  Disable file and printer sharing on Internet connection
  • 17. User Authentication(login) What is a user name? p. 566 Fig. 11-10 Next  Unique combination of characters that identifies user  Password is private combination of characters associated with the user name that allows access to computer resources
  • 18. Tips for security What are some tips for preventing virus, worm, and Trojan horse infections? p. 562 Next Install a personal firewall program If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately Never start a computer with removable media inserted Never open an e-mail attachment unless you are expecting it and it is from a trusted source Install an antivirus program on all of your computers Check all downloaded programs for viruses, worms, or Trojan horses
  • 19. Software Theft What is a license agreement? p. 570 Fig. 11-15 Next  Right to use software  Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
  • 20. Backing Up — The Ultimate Safeguard What is a backup? p. 576 Next Duplicate of file, program, or disk Full backupFull backup all files in computer Full backupFull backup all files in computer Selective backupSelective backup select which files to back up Selective backupSelective backup select which files to back up Three-generationThree-generation backupbackup preserves three copies of important files Three-generationThree-generation backupbackup preserves three copies of important files In case of system failure or corrupted files, restorerestore files by copying to original location
  • 21. Information Privacy What are spyware, adware, and spam? p. 583 - 584 Fig. 11-29 Next  Spyware is program placed on computer without user’s knowledge  Adware is a program that displays online advertisements  Spam is bogus e-mail message sent to many recipients
  • 22. Information Privacy How can you control spam? p. 584 Next Collects spam in central location that you can view any time Service that blocks e-mail messages from designated sources E-mail filteringE-mail filtering Sometimes removes valid e-mail messages Attempts to remove spam Anti-spam programAnti-spam program