SlideShare a Scribd company logo
1 of 18
សាកលវិទ្យាល័យប ៀលប្រាយ 
រ ៀបចំរោយ និស្សិតឆ្នំទី៤ ឆមាស្ទី១ ជំនាន់ទី១២បនទប់២០២I LOVE YOU VIRUS 
ណែនាំរោយសាស្ត្សាាចារ្ 
អ ៊ូ ផាន់ណារិទ្យធ 
ឆ្នំស្ិក្សា៖ ២០១៤ -២០១៥ 
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework
សមាជិកប្រកុម ទ្យី១ 
ជួន ភា ៈ 
ក្សឹម ភា ម 
រេង លីរម៉េង 
នុត ស្ស្ីទូច 
ជួន ស្ុីណាត 
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
Contents 
1. Introduction 
2. What is virus? 
3. How many types of virus? 
4. How can they process? 
5. Where the virus come from? 
6. How does it effect to company? 
7. How to protect or prevent virus? 
8. Conclusion
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
Introduction 
-Over a five-hour period, during May 4, 2000, this virus spread across Asia, Europe and the United States via e-mail messages titled "ILOVEYOU." The menace Web servers, overwrote personal files and caused corporate IT managers to shut down e-mail systems. 
-This virus arrives as e-mail with the subject line "I Love You" and an attachment named "Love- Letter-For-You.txt.vbs."
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
What is virus? 
-A virus is a programdesigned by a computer programmer (malicious hacker) to do a certain unwanted function. 
-Though viruses do not damage computer hardwarethere have been attempts to create programs that will do things like run the hard drive until it fails or lodge itself in the computer's clock (which has a rechargeable battery) allowing it to remain active even months after the computer has been unplugged.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How many types of Virus? 
There are many types of computer virus nowadays. 
-Boot viruses : Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk. 
-Program viruses : These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). 
-Multipartite viruses : These computer viruses are hybrids, derived from boot viruses and program viruses.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How many types of Virus?(Con..) 
-Polymorphic viruses : The polymorphic viruses will always change their source code from one infection to another.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How many types of Virus?(Con..) 
-Macro viruses : This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
Where the virus come from? 
Most viruses were originally created to strike against 
large computer systems, and so the average person 
didn't know about them until personal computers began 
to appear in regular households. 
*A challenge -simply to see if they can do it 
* Out of a dislike for Microsoft or some other company 
* For criminal gain and to make a profit 
* For research (that is what they say anyway!)
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How does it spread? 
Well, unlike the viruses which make us sick, 
they do not simply float around in the air or spread 
via sneezes and such! Computer viruses need 
a host file to attach themselves to. The host file 
must be "executable" which means that it must be 
a type of file which is capable of performing 
some action and not simply a text file or an image.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? 
Protecting your computer from viruses and other threats isn't difficult, but you have to be diligent. Here are some actions you can take but not 100% : 
-Install an antivirus program : Installing an antivirus 
program and keeping it up to date can help defend 
your computer against viruses.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? (Con…) 
-Don't open email attachments : 
Many viruses are attached to 
email messages and will spread 
as soon as you open the email 
attachment. It's best not to open any 
attachment unless it's something you're 
expecting.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? (Con…) 
-Keep your computer updated : 
Microsoft releases security updates 
that can help protect your computer. 
Make sure that Windows receives these updates by turning on Windows 
automatic updating.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? (Con…) 
-Use a firewall : 
Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? (Con…) 
-Use your browser's privacy settings: 
Being aware of how websites might use your private information is important to help prevent fraud and identity theft. If you're using InternetExplorer, you can adjust your Privacy settings or restore the default settings whenever you want
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
How to protect or prevent it? (Con…) 
-Turn on User Account Control (UAC) :When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
Conclusion 
Finally, Being Careful with something that you didn’t know as I we have mentioned above.
Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. 
Information Security and Legal Framework 
Questions & Answers

More Related Content

What's hot

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - MalwaresArnav Kumar
 

What's hot (20)

Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Sowmya
SowmyaSowmya
Sowmya
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Software theft
Software theftSoftware theft
Software theft
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ppt123
Ppt123Ppt123
Ppt123
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 

Similar to Understanding Virus

Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 

Similar to Understanding Virus (20)

Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computer security
Computer securityComputer security
Computer security
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Internet security
Internet securityInternet security
Internet security
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
What is malware
What is malwareWhat is malware
What is malware
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
virus
virusvirus
virus
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 

More from Phannarith Ou, G-CISO

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computerPhannarith Ou, G-CISO
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your informationPhannarith Ou, G-CISO
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Phannarith Ou, G-CISO
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006Phannarith Ou, G-CISO
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterprisePhannarith Ou, G-CISO
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU StudentPhannarith Ou, G-CISO
 

More from Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Understanding Virus

  • 1. សាកលវិទ្យាល័យប ៀលប្រាយ រ ៀបចំរោយ និស្សិតឆ្នំទី៤ ឆមាស្ទី១ ជំនាន់ទី១២បនទប់២០២I LOVE YOU VIRUS ណែនាំរោយសាស្ត្សាាចារ្ អ ៊ូ ផាន់ណារិទ្យធ ឆ្នំស្ិក្សា៖ ២០១៤ -២០១៥ Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework
  • 2. សមាជិកប្រកុម ទ្យី១ ជួន ភា ៈ ក្សឹម ភា ម រេង លីរម៉េង នុត ស្ស្ីទូច ជួន ស្ុីណាត Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework
  • 3. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework Contents 1. Introduction 2. What is virus? 3. How many types of virus? 4. How can they process? 5. Where the virus come from? 6. How does it effect to company? 7. How to protect or prevent virus? 8. Conclusion
  • 4. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework Introduction -Over a five-hour period, during May 4, 2000, this virus spread across Asia, Europe and the United States via e-mail messages titled "ILOVEYOU." The menace Web servers, overwrote personal files and caused corporate IT managers to shut down e-mail systems. -This virus arrives as e-mail with the subject line "I Love You" and an attachment named "Love- Letter-For-You.txt.vbs."
  • 5. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework What is virus? -A virus is a programdesigned by a computer programmer (malicious hacker) to do a certain unwanted function. -Though viruses do not damage computer hardwarethere have been attempts to create programs that will do things like run the hard drive until it fails or lodge itself in the computer's clock (which has a rechargeable battery) allowing it to remain active even months after the computer has been unplugged.
  • 6. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How many types of Virus? There are many types of computer virus nowadays. -Boot viruses : Since nobody uses floppy disks anymore, these types of computer virus are left to infect only the master boot records of the hard disk. -Program viruses : These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). -Multipartite viruses : These computer viruses are hybrids, derived from boot viruses and program viruses.
  • 7. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How many types of Virus?(Con..) -Polymorphic viruses : The polymorphic viruses will always change their source code from one infection to another.
  • 8. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How many types of Virus?(Con..) -Macro viruses : This virus is relatively new and it infects macros within a template or document. When you open a word processing document, it activates the virus.
  • 9. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework Where the virus come from? Most viruses were originally created to strike against large computer systems, and so the average person didn't know about them until personal computers began to appear in regular households. *A challenge -simply to see if they can do it * Out of a dislike for Microsoft or some other company * For criminal gain and to make a profit * For research (that is what they say anyway!)
  • 10. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How does it spread? Well, unlike the viruses which make us sick, they do not simply float around in the air or spread via sneezes and such! Computer viruses need a host file to attach themselves to. The host file must be "executable" which means that it must be a type of file which is capable of performing some action and not simply a text file or an image.
  • 11. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? Protecting your computer from viruses and other threats isn't difficult, but you have to be diligent. Here are some actions you can take but not 100% : -Install an antivirus program : Installing an antivirus program and keeping it up to date can help defend your computer against viruses.
  • 12. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? (Con…) -Don't open email attachments : Many viruses are attached to email messages and will spread as soon as you open the email attachment. It's best not to open any attachment unless it's something you're expecting.
  • 13. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? (Con…) -Keep your computer updated : Microsoft releases security updates that can help protect your computer. Make sure that Windows receives these updates by turning on Windows automatic updating.
  • 14. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? (Con…) -Use a firewall : Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • 15. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? (Con…) -Use your browser's privacy settings: Being aware of how websites might use your private information is important to help prevent fraud and identity theft. If you're using InternetExplorer, you can adjust your Privacy settings or restore the default settings whenever you want
  • 16. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework How to protect or prevent it? (Con…) -Turn on User Account Control (UAC) :When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes.
  • 17. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework Conclusion Finally, Being Careful with something that you didn’t know as I we have mentioned above.
  • 18. Copyright ® 2014 Mr. Chuon Phearak. All rights reserved. Information Security and Legal Framework Questions & Answers