SlideShare a Scribd company logo
1 of 28
14A-1
Basic Security Concepts
• What is a threats?
– Anything that can harm a computer
– Vulnerabilities are weaknesses in security
– Security attempts to neutralize threats
14A-2
Basic Security Concepts
• Degrees of harm
– Level of potential damage
– Include all parts of system
• Potential data loss
• Loss of privacy
• Inability to use hardware
• Inability to use software
14A-3
Basic Security Concepts
• Countermeasures
– Steps taken to block a threat
– Protect the data from theft
– Protect the system from theft
14A-4
Threats To Users
• 1. Loss of privacy
– Personal information is stored electronically
– Purchases are stored in a database
• Data is sold to other companies
– Public records on the Internet
– Internet use is monitored and logged
– None of these techniques are illegal
14A-5
Threats to Users
• 2. Cookies
– A cookie is information that a Web site puts
on your hard disk so that it can remember
something about you at a later time.
– Cookies now track history and passwords
– Browsers include cookie blocking tools
14A-6
Threats to Users
• 3. Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
14A-7
Threats to Users
• 4. Web bugs
– Small programs embedded in gif images
– A Web bug, also known as a Web beacon,
is a file object (usually a graphic image
such as a transparent GIF) that is placed
on a Web page or in an e-mail message to
monitor user behavior.
– Gets around cookie blocking tools
– Companies use to track usage
14A-8
Threats to Users
• 5. Spam
– Unsolicited commercial email
– Irrelevant or unsolicited messages sent
over the Internet, typically to large numbers
of users, for the purposes of advertising,
phishing, spreading malware, etc.
– Networks and PCs need a spam blocker
• Stop spam before reaching the inbox
– Spammers acquire addresses using many
methods
14A-9
Threats to Data
• The most serious threat
– Data is the reason for computers
– Data is very difficult to replace
– Protection is difficult
• Data is intangible
14A-10
Threats to Data
• Viruses
– Software that distributes and installs itself
– Ranges from annoying to catastrophic
– Countermeasures
• Anti-virus software
• Popup blockers
• Do not open unknown email
14A-11
Threats to Data
• Trojan horses
– Program that poses as beneficial software
– Not an actual virus but a loophole to cause
virus.
– User willingly installs the software
– Countermeasures
• Anti-virus software
• Spyware blocker
14A-12
Threats to Data
• Cybercrime
– Using a computer in an illegal act
– Fraud and theft are common acts
14A-13
Threats to Data
• Internet fraud
– Most common cybercrime
– Fraudulent website
– Have names similar to legitimate sites
14A-14
Threats to Data
• Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
• Recreational hacking
• Financial hackers
• Grudge hacking
– Hacking methods
• Sniffing
• Social engineering
• Spoofing
Computer virus
• Computer viruses are small software
programs that are designed to spread from
one computer to another and to interfere with
computer operation.
• A virus might corrupt or delete data on your
computer, use your e-mail program to spread
itself to other computers, or even erase
everything on your hard disk.
• Computer viruses are often spread by
attachments in e-mail messages or instant
messaging messages
14A-15
Causes of Computer virus
• Virus infection in computers can be
caused through different means. Below
are the commonest causes of Computer
Virus attack.
Through the internet
Through email attachment
Through removable storage devices
Through Bluetooth transfer
14A-16
Most Common Types of Viruses
• 1. Resident Viruses
• This type of virus is a permanent which
resides in the RAM memory. From there
it can overcome and interrupt all of the
operations executed by the system:
corrupting files and programs that are
opened, closed, copied, renamed etc.
14A-17
2. Boot Virus
• This type of virus affects the boot sector of a floppy or
hard disk. This is a crucial part of a disk, in which
information on the disk itself is stored together with a
program that makes it possible to boot (start) the
computer from the disk.
The best way of avoiding boot viruses is to ensure
that floppy disks are write-protected and never start
your computer with an unknown floppy disk in the disk
drive.
14A-18
3. Overwrite Viruses
• Virus of this kind is characterized by the fact that it
deletes the information contained in the files that it
infects, rendering them partially or totally useless
once they have been infected.
The only way to clean a file infected by an overwrite
virus is to delete the file completely, thus losing the
original content.
14A-19
4. Directory Virus
• Directory viruses change the paths that indicate the
location of a file. By executing a program (file with the
extension .EXE or .COM) which has been infected by
a virus, you are unknowingly running the virus
program, while the original file and program have
been previously moved by the virus.
Once infected it becomes impossible to locate the
original files.
14A-20
5. File infectors
•
This type of virus infects programs or executable files
(files with an .EXE or .COM extension). When one of
these programs is run, directly or indirectly, the virus
is activated, producing the damaging effects it is
programmed to carry out. The majority of existing
viruses belongs to this category, and can be classified
depending on the actions that they carry out.
14A-21
Antivirus
• Anti-virus software is a program or set of
programs that are designed to prevent,
search for, detect, and remove software
viruses, and other malicious software
infections like worms, Trojans and more.
• McAfee
• ESET NOD32
• Avast
• Avira
14A-22
Functions of Antivirus
• Scan specific files or directories for any malware or
known malicious patterns
• Allow you to schedule scans to automatically run for
you
• Allow you to initiate a scan of a specific file or of your
computer, or of a CD or flash drive at any time.
• Remove any malicious code detected –sometimes
you will be notified of an infection and asked if you
want to clean the file, other programs will
automatically do this behind the scenes.
• Show you the ‘health’ of your computer
14A-23
PASSWORD
• Password is a secret word that is used to protect a
computer system or program. It may consist of
numbers, alphabets or both. The user has to type the
password to access the computer system.
• Examples:-
Every computer provides an option for setting
password. If the computer is protected with password,
it will ask for that password to login.
Email facility on the internet is also protected with
password. Every user has to give email ID and
password to check emails.
14A-24
Purpose of password
• The purpose of password is to protect
data stored on a computer.
• It protects data from being lost,
misused or deleted by any person.
• The system can be accessed by a
person who knows the password.
14A-25
Tricks for obtaining password
• There are two essential password rules to
consider when creating a password for the
first time
• – length and complexity.
• Your password length should be at least 8
characters long
• Your password should use a combination of
lower case letters, upper case letters,
numbers, and special characters
14A-26
Purpose of password
14A-27
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
Chapter 14A
End of Chapter

More Related Content

What's hot

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 

What's hot (20)

Security Basics
Security BasicsSecurity Basics
Security Basics
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
System security
System securitySystem security
System security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer security and
Computer security andComputer security and
Computer security and
 
Network Security
Network SecurityNetwork Security
Network Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Computer security
Computer securityComputer security
Computer security
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computer security
Computer securityComputer security
Computer security
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Viewers also liked

Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
himeag
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 

Viewers also liked (13)

Computer security 101
Computer security 101Computer security 101
Computer security 101
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Viruses (Lecture) IT Slides # 3

Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 

Similar to Viruses (Lecture) IT Slides # 3 (20)

Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Malicious
MaliciousMalicious
Malicious
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Network security
Network securityNetwork security
Network security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

More from Muhammad Talha Zaroon

More from Muhammad Talha Zaroon (17)

Internet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture SlideInternet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture Slide
 
Conversion (IT) Slide # 3
Conversion (IT) Slide # 3Conversion (IT) Slide # 3
Conversion (IT) Slide # 3
 
Internet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture SlideInternet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture Slide
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide
 
Database (IT) Lecture Slide
Database (IT) Lecture SlideDatabase (IT) Lecture Slide
Database (IT) Lecture Slide
 
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 22nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
 
Derivative and Integeration Formulas
Derivative and Integeration FormulasDerivative and Integeration Formulas
Derivative and Integeration Formulas
 
Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1
 
IT semester 1 course outline
IT semester 1 course outlineIT semester 1 course outline
IT semester 1 course outline
 
Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1
 
Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2
 
Map of UNI TUF
Map of UNI TUFMap of UNI TUF
Map of UNI TUF
 
Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1
 
Front Page
Front PageFront Page
Front Page
 
Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1
 
History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1 History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Viruses (Lecture) IT Slides # 3

  • 1. 14A-1 Basic Security Concepts • What is a threats? – Anything that can harm a computer – Vulnerabilities are weaknesses in security – Security attempts to neutralize threats
  • 2. 14A-2 Basic Security Concepts • Degrees of harm – Level of potential damage – Include all parts of system • Potential data loss • Loss of privacy • Inability to use hardware • Inability to use software
  • 3. 14A-3 Basic Security Concepts • Countermeasures – Steps taken to block a threat – Protect the data from theft – Protect the system from theft
  • 4. 14A-4 Threats To Users • 1. Loss of privacy – Personal information is stored electronically – Purchases are stored in a database • Data is sold to other companies – Public records on the Internet – Internet use is monitored and logged – None of these techniques are illegal
  • 5. 14A-5 Threats to Users • 2. Cookies – A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time. – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 6. 14A-6 Threats to Users • 3. Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 7. 14A-7 Threats to Users • 4. Web bugs – Small programs embedded in gif images – A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior. – Gets around cookie blocking tools – Companies use to track usage
  • 8. 14A-8 Threats to Users • 5. Spam – Unsolicited commercial email – Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc. – Networks and PCs need a spam blocker • Stop spam before reaching the inbox – Spammers acquire addresses using many methods
  • 9. 14A-9 Threats to Data • The most serious threat – Data is the reason for computers – Data is very difficult to replace – Protection is difficult • Data is intangible
  • 10. 14A-10 Threats to Data • Viruses – Software that distributes and installs itself – Ranges from annoying to catastrophic – Countermeasures • Anti-virus software • Popup blockers • Do not open unknown email
  • 11. 14A-11 Threats to Data • Trojan horses – Program that poses as beneficial software – Not an actual virus but a loophole to cause virus. – User willingly installs the software – Countermeasures • Anti-virus software • Spyware blocker
  • 12. 14A-12 Threats to Data • Cybercrime – Using a computer in an illegal act – Fraud and theft are common acts
  • 13. 14A-13 Threats to Data • Internet fraud – Most common cybercrime – Fraudulent website – Have names similar to legitimate sites
  • 14. 14A-14 Threats to Data • Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation • Recreational hacking • Financial hackers • Grudge hacking – Hacking methods • Sniffing • Social engineering • Spoofing
  • 15. Computer virus • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. • Computer viruses are often spread by attachments in e-mail messages or instant messaging messages 14A-15
  • 16. Causes of Computer virus • Virus infection in computers can be caused through different means. Below are the commonest causes of Computer Virus attack. Through the internet Through email attachment Through removable storage devices Through Bluetooth transfer 14A-16
  • 17. Most Common Types of Viruses • 1. Resident Viruses • This type of virus is a permanent which resides in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. 14A-17
  • 18. 2. Boot Virus • This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. 14A-18
  • 19. 3. Overwrite Viruses • Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content. 14A-19
  • 20. 4. Directory Virus • Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files. 14A-20
  • 21. 5. File infectors • This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belongs to this category, and can be classified depending on the actions that they carry out. 14A-21
  • 22. Antivirus • Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software infections like worms, Trojans and more. • McAfee • ESET NOD32 • Avast • Avira 14A-22
  • 23. Functions of Antivirus • Scan specific files or directories for any malware or known malicious patterns • Allow you to schedule scans to automatically run for you • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time. • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes. • Show you the ‘health’ of your computer 14A-23
  • 24. PASSWORD • Password is a secret word that is used to protect a computer system or program. It may consist of numbers, alphabets or both. The user has to type the password to access the computer system. • Examples:- Every computer provides an option for setting password. If the computer is protected with password, it will ask for that password to login. Email facility on the internet is also protected with password. Every user has to give email ID and password to check emails. 14A-24
  • 25. Purpose of password • The purpose of password is to protect data stored on a computer. • It protects data from being lost, misused or deleted by any person. • The system can be accessed by a person who knows the password. 14A-25
  • 26. Tricks for obtaining password • There are two essential password rules to consider when creating a password for the first time • – length and complexity. • Your password length should be at least 8 characters long • Your password should use a combination of lower case letters, upper case letters, numbers, and special characters 14A-26
  • 28. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education Chapter 14A End of Chapter

Editor's Notes

  1. Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security.
  2. Teaching tip Cookies are named after the ‘magic cookie’.
  3. Teaching tip More information regarding web bugs can be found at en.wikipedia.org/wiki/Web_bug.
  4. Teaching tip Spam is rumored to be named in honor of the Monty Python skit, Spam!. In the skit, a customer is forced to select spam in his lunch. Much like we are forced to accept a spam message. Visit www.detritus.org/spam/skit.html for the entire spam skit. Discussion point Spam is one topic that nearly everyone in the class can relate to. Have your students think about spam from the other side. Have them consider the point of view of the self proclaimed ‘Spam King’, Scott Richter. For some conversation fodder visit www.pcworld.com/news/article/0,aid,116807,00.asp.
  5. Teaching tip For information on specific viruses visit securityresponse.Symantec.com/. Teaching tip Detailed information regarding the protection from viruses, see the Computing keynote at the end of the chapter.
  6. Teaching tip Ad Aware is sold by LavaSoft. The homepage is www.lavasoftusa.com/software/adaware/. Spybot is a product of Patrick M. Kolla. The true website is www.safer-networking.org/en/index.html.