Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Understanding Virus
1. សាកលវិទ្យាល័យប ៀលប្រាយ
រ ៀបចំរោយ និស្សិតឆ្នំទី៤ ឆមាស្ទី១ ជំនាន់ទី១២បនទប់២០២I LOVE YOU VIRUS
ណែនាំរោយសាស្ត្សាាចារ្
អ ៊ូ ផាន់ណារិទ្យធ
ឆ្នំស្ិក្សា៖ ២០១៤ -២០១៥
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
2. សមាជិកប្រកុម ទ្យី១
ជួន ភា ៈ
ក្សឹម ភា ម
រេង លីរម៉េង
នុត ស្ស្ីទូច
ជួន ស្ុីណាត
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
3. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
Contents
1. Introduction
2. What is virus?
3. How many types of virus?
4. How can they process?
5. Where the virus come from?
6. How does it effect to company?
7. How to protect or prevent virus?
8. Conclusion
4. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
Introduction
-Over a five-hour period, during May 4, 2000, this virus spread across Asia, Europe and the United States via e-mail messages titled "ILOVEYOU." The menace Web servers, overwrote personal files and caused corporate IT managers to shut down e-mail systems.
-This virus arrives as e-mail with the subject line "I Love You" and an attachment named "Love- Letter-For-You.txt.vbs."
5. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
What is virus?
-A virus is a programdesigned by a computer programmer (malicious hacker) to do a certain unwanted function.
-Though viruses do not damage computer hardwarethere have been attempts to create programs that will do things like run the hard drive until it fails or lodge itself in the computer's clock (which has a rechargeable battery) allowing it to remain active even months after the computer has been unplugged.
6. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How many types of Virus?
There are many types of computer virus nowadays.
-Boot viruses : Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk.
-Program viruses : These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS).
-Multipartite viruses : These computer viruses are hybrids, derived from boot viruses and program viruses.
7. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How many types of Virus?(Con..)
-Polymorphic viruses : The polymorphic viruses will always change their source code from one infection to another.
8. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How many types of Virus?(Con..)
-Macro viruses : This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus.
9. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
Where the virus come from?
Most viruses were originally created to strike against
large computer systems, and so the average person
didn't know about them until personal computers began
to appear in regular households.
*A challenge -simply to see if they can do it
* Out of a dislike for Microsoft or some other company
* For criminal gain and to make a profit
* For research (that is what they say anyway!)
10. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How does it spread?
Well, unlike the viruses which make us sick,
they do not simply float around in the air or spread
via sneezes and such! Computer viruses need
a host file to attach themselves to. The host file
must be "executable" which means that it must be
a type of file which is capable of performing
some action and not simply a text file or an image.
11. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it?
Protecting your computer from viruses and other threats isn't difficult, but you have to be diligent. Here are some actions you can take but not 100% :
-Install an antivirus program : Installing an antivirus
program and keeping it up to date can help defend
your computer against viruses.
12. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it? (Con…)
-Don't open email attachments :
Many viruses are attached to
email messages and will spread
as soon as you open the email
attachment. It's best not to open any
attachment unless it's something you're
expecting.
13. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it? (Con…)
-Keep your computer updated :
Microsoft releases security updates
that can help protect your computer.
Make sure that Windows receives these updates by turning on Windows
automatic updating.
14. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it? (Con…)
-Use a firewall :
Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
15. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it? (Con…)
-Use your browser's privacy settings:
Being aware of how websites might use your private information is important to help prevent fraud and identity theft. If you're using InternetExplorer, you can adjust your Privacy settings or restore the default settings whenever you want
16. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
How to protect or prevent it? (Con…)
-Turn on User Account Control (UAC) :When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes.
17. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
Conclusion
Finally, Being Careful with something that you didn’t know as I we have mentioned above.
18. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved.
Information Security and Legal Framework
Questions & Answers