SlideShare a Scribd company logo
1 of 18
Importance of computer
   Computer crime
    computer virus
         BY
Importance of computer in different
                fields
• what are computers?
• Some say that they are simple electronic devices that
  accept inputs, process data and produce outputs.
  Computers may be simple but they can be very
  powerful. Computers have begun to meet the barrier
  imposed by the speed of light in achieving higher
  speeds.
Importance of computer in different
                  fields
•   Education
•   Science
•   Communications
•   Business
•   Government
•   etc
Importance of computer in different
                fields
• Science
    All branches of science, from astronomy to
  zoology, depend on computers to further their
  knowledge on increasing the life span of man. The
  MRI, the PET, and other computer-aided machines
  help doctors and scientists to better understand the
  people’s medical needs.
Importance of computer in different
               fields
• Communications
  Do you know that computers have even transformed how you
 communicate with each other through the advancements in
 technology?
 One of these advancements is the Internet. Who among us
 does not know anything about the Internet? Perhaps, using
 computers will never be complete without using the Internet.
 This global network of networks have swept the lives of many
 people as daily tasks become handier, communications more
 convenient, and most of all, sources of information broader
 and more accessible.
Importance of computer in different
                fields
• Business
  Computer has changed how we do business. Gone are
  the days of labor-intensive and manual way of
  inputting data through ink and paper. Now, with a
  few taps of keys and a few clicks of the mouse, good
  and productive business is on its way.
Importance of computer in different
                fields
• Government
  Government offices also depend on computers for its
  basic needs. From simple letters to the more
  complicated projects are now being produced through
  the use of computers. Government agencies and their
  databases are now interlinked, making it easier for the
  agencies to monitor economic developments.
Computer Crime
Computer Crime
•   Software Piracy

•   Protections from Piracy
Computer Crime - Software Piracy
•   Software piracy – the illegal copying of software programs – is
    the biggest legal issue affecting the computer industry.

•   Piracy is of greatest concern to developers of commercial
    software, or programs that must be purchased before using.

•   Piracy is less of a concern for shareware makers, whose
    programs must be registered but not always purchased.

•   Piracy is not a concern for freeware, which is software that can
    be freely distributed by anyone.
Computer Crime - Protections from Piracy
Various forms of copy protection have been used to discourage
piracy, including:



•    Installation diskettes that record the number of times the
     software is installed.

•    Hardware locks, without which the program cannot
     function.

•    Passwords, serial numbers, or other codes required for
     installation.
Theft - Hardware and Software Theft
•   As PCs become smaller – and as more people use laptop and
    handheld computers – hardware theft is becoming a growing
    problem.

•   Software theft is also a major problem for companies, many of
    which must purchase large quantities of expensive software
    programs.

•   To combat hardware and software theft, many companies are
    locking hardware to desks and securing software in libraries,
    granting access to employees only as needed.
computer virus
Computer Viruses
A virus is a parasitic program that infects another program (the
host). Most viruses fall into the following categories:

Categories of Viruses

Boot sector viruses       Self-encrypting viruses
Cluster viruses           Self-changing viruses
File-infecting viruses    Stealth viruses
Worms                     Macro viruses
Bombs                     Joke programs
Trojan Horses             Bimodal viruses
Polymorphic viruses       Bipartite viruses
Self-garbling viruses     Multipartite viruses
E-mail viruses            Macro viruses
Types of Viruses
• Trojan Horses
  – appears as interesting program file but when installed it
    allows intruders to access and read your files
• Worms
  – virus that copies and multiplies itself by             using
    computer networks and security                 flaws
• E-mail Viruses
  – use e-mail messages to spread which allow it to
    automatically forward itself to thousands of people
Types of Viruses
• Boot Sector Virus
   – Infects the boot or MBR of diskettes and hard drives through the
     sharing of infected disks and pirated software applications
   – Once your hard drive is infected all diskettes that you use in your
     computer will be infected
• Program Virus
   – Becomes active when the program file (usually with extensions
     .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened
   – It then makes copies of itself and will infect other programs on the
     computer
• Multipartite Virus
   – Hybrid of a Boot Sector and Program viruses
   – It infects program files and when the infected program is active it will
     affect the boot record
Types of Viruses
• Stealth Virus
   – Disguises itself to prevent from being detected by antivirus software
   – It alters its file size or conceals itself in memory
• Polymorphic Virus
   – Act like a chameleon, changing its virus signature (binary pattern)
     every time it multiples and infects a new file
• Macro Virus
   – Programmed as a macro embedded in a document, usually found in
     Microsoft Word and Excel
   – Once it gets in to your computer, every document you produce will
     become infected
   – Relatively new type of virus and may slip by your antivirus software if
     you don't have the most recent version installed
Computer Viruses - Preventing Infection
Viruses are spread in several ways. The most common are:


•    Receiving an infected disk.
•    Downloading an infected executable file from a network or the
     Internet.
•    Copying a document file that is infected with a macro virus.




To avoid viruses, you should:

•     Treat all disks as though they are infected.
•     Install an antivirus program and keep its virus definitions (database of
      virus information) up to date.
•     Run your antivirus program regularly.

More Related Content

What's hot

Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
xtin101
 

What's hot (20)

Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
COMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and YouCOMPED9 Module 1 Information Technology, the Internet, and You
COMPED9 Module 1 Information Technology, the Internet, and You
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
Unit 1 introduction to computers
Unit 1  introduction to computersUnit 1  introduction to computers
Unit 1 introduction to computers
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Osdc presentation (15 cs175)
Osdc presentation (15 cs175)
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Information security
Information securityInformation security
Information security
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Societal Impact of Information Technology
Societal Impact of Information TechnologySocietal Impact of Information Technology
Societal Impact of Information Technology
 

Viewers also liked (20)

Resume Powerpoint
Resume PowerpointResume Powerpoint
Resume Powerpoint
 
音乐直达心灵
音乐直达心灵音乐直达心灵
音乐直达心灵
 
万物化成的化学之道
万物化成的化学之道万物化成的化学之道
万物化成的化学之道
 
5 Things I Have Learned
5 Things I Have Learned5 Things I Have Learned
5 Things I Have Learned
 
学美术
学美术学美术
学美术
 
Applications
ApplicationsApplications
Applications
 
BICI
BICIBICI
BICI
 
Being good while being bad social responsabilty
Being good while being bad social responsabiltyBeing good while being bad social responsabilty
Being good while being bad social responsabilty
 
为什么学习地理
为什么学习地理为什么学习地理
为什么学习地理
 
SlideShare
SlideShareSlideShare
SlideShare
 
Religionooooo
ReligionoooooReligionooooo
Religionooooo
 
Ninkasi: Ritual Brewmaking
Ninkasi: Ritual BrewmakingNinkasi: Ritual Brewmaking
Ninkasi: Ritual Brewmaking
 
TU FIESTA TEMÁTICA
TU FIESTA TEMÁTICATU FIESTA TEMÁTICA
TU FIESTA TEMÁTICA
 
为什么学习历史
为什么学习历史为什么学习历史
为什么学习历史
 
Computer virus
Computer virusComputer virus
Computer virus
 
Barisan aritmetika
Barisan aritmetikaBarisan aritmetika
Barisan aritmetika
 
一个普通人的幸福框架
一个普通人的幸福框架一个普通人的幸福框架
一个普通人的幸福框架
 
Resultados partidos 2012
Resultados partidos 2012Resultados partidos 2012
Resultados partidos 2012
 
World Religions Project: Westernization Of Yoga
World Religions Project: Westernization Of YogaWorld Religions Project: Westernization Of Yoga
World Religions Project: Westernization Of Yoga
 
为什么学习数学
为什么学习数学为什么学习数学
为什么学习数学
 

Similar to Computer virus

Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
wargames12
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
Pranjal Mishra
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 

Similar to Computer virus (20)

Lecture 19
Lecture 19Lecture 19
Lecture 19
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
anti_virus
anti_virusanti_virus
anti_virus
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Pc viruses
Pc virusesPc viruses
Pc viruses
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
information about virus
information about virusinformation about virus
information about virus
 

Computer virus

  • 1. Importance of computer Computer crime computer virus BY
  • 2. Importance of computer in different fields • what are computers? • Some say that they are simple electronic devices that accept inputs, process data and produce outputs. Computers may be simple but they can be very powerful. Computers have begun to meet the barrier imposed by the speed of light in achieving higher speeds.
  • 3. Importance of computer in different fields • Education • Science • Communications • Business • Government • etc
  • 4. Importance of computer in different fields • Science All branches of science, from astronomy to zoology, depend on computers to further their knowledge on increasing the life span of man. The MRI, the PET, and other computer-aided machines help doctors and scientists to better understand the people’s medical needs.
  • 5. Importance of computer in different fields • Communications Do you know that computers have even transformed how you communicate with each other through the advancements in technology? One of these advancements is the Internet. Who among us does not know anything about the Internet? Perhaps, using computers will never be complete without using the Internet. This global network of networks have swept the lives of many people as daily tasks become handier, communications more convenient, and most of all, sources of information broader and more accessible.
  • 6. Importance of computer in different fields • Business Computer has changed how we do business. Gone are the days of labor-intensive and manual way of inputting data through ink and paper. Now, with a few taps of keys and a few clicks of the mouse, good and productive business is on its way.
  • 7. Importance of computer in different fields • Government Government offices also depend on computers for its basic needs. From simple letters to the more complicated projects are now being produced through the use of computers. Government agencies and their databases are now interlinked, making it easier for the agencies to monitor economic developments.
  • 9. Computer Crime • Software Piracy • Protections from Piracy
  • 10. Computer Crime - Software Piracy • Software piracy – the illegal copying of software programs – is the biggest legal issue affecting the computer industry. • Piracy is of greatest concern to developers of commercial software, or programs that must be purchased before using. • Piracy is less of a concern for shareware makers, whose programs must be registered but not always purchased. • Piracy is not a concern for freeware, which is software that can be freely distributed by anyone.
  • 11. Computer Crime - Protections from Piracy Various forms of copy protection have been used to discourage piracy, including: • Installation diskettes that record the number of times the software is installed. • Hardware locks, without which the program cannot function. • Passwords, serial numbers, or other codes required for installation.
  • 12. Theft - Hardware and Software Theft • As PCs become smaller – and as more people use laptop and handheld computers – hardware theft is becoming a growing problem. • Software theft is also a major problem for companies, many of which must purchase large quantities of expensive software programs. • To combat hardware and software theft, many companies are locking hardware to desks and securing software in libraries, granting access to employees only as needed.
  • 14. Computer Viruses A virus is a parasitic program that infects another program (the host). Most viruses fall into the following categories: Categories of Viruses Boot sector viruses Self-encrypting viruses Cluster viruses Self-changing viruses File-infecting viruses Stealth viruses Worms Macro viruses Bombs Joke programs Trojan Horses Bimodal viruses Polymorphic viruses Bipartite viruses Self-garbling viruses Multipartite viruses E-mail viruses Macro viruses
  • 15. Types of Viruses • Trojan Horses – appears as interesting program file but when installed it allows intruders to access and read your files • Worms – virus that copies and multiplies itself by using computer networks and security flaws • E-mail Viruses – use e-mail messages to spread which allow it to automatically forward itself to thousands of people
  • 16. Types of Viruses • Boot Sector Virus – Infects the boot or MBR of diskettes and hard drives through the sharing of infected disks and pirated software applications – Once your hard drive is infected all diskettes that you use in your computer will be infected • Program Virus – Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened – It then makes copies of itself and will infect other programs on the computer • Multipartite Virus – Hybrid of a Boot Sector and Program viruses – It infects program files and when the infected program is active it will affect the boot record
  • 17. Types of Viruses • Stealth Virus – Disguises itself to prevent from being detected by antivirus software – It alters its file size or conceals itself in memory • Polymorphic Virus – Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file • Macro Virus – Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel – Once it gets in to your computer, every document you produce will become infected – Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed
  • 18. Computer Viruses - Preventing Infection Viruses are spread in several ways. The most common are: • Receiving an infected disk. • Downloading an infected executable file from a network or the Internet. • Copying a document file that is infected with a macro virus. To avoid viruses, you should: • Treat all disks as though they are infected. • Install an antivirus program and keep its virus definitions (database of virus information) up to date. • Run your antivirus program regularly.