SlideShare a Scribd company logo
Introduction to
Computer Applications
Lecture # 15
Computer Security Risks
 What is a computer security
risk?
 Event or action that causes loss
of or damage to computer
system
Virus
 A computer virus is a computer program that can
replicate itself and spread from one computer to another.
 The term "virus" is also commonly but misused to refer
to other types of malware, including but not limited to
adware and spyware programs that do not have the
reproductive ability.
 A true virus can spread from one computer to another
(in some form of executable code) when its host is taken
to the target computer; for instance because a user sent
it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or
USB drive.
Types of Virus
 Not all computer viruses behave, replicate, or infect
the same way. There are several different categories
of viruses and malware. Below I list and discuss
some of the most common types of computer
viruses.
 Trojan Horse
 Worms
Trojan Horse
 A Trojan horse program has the appearance of having a useful and
desired function. While it may advertise its activity after launching, this
information is not apparent to the user beforehand. Secretly the
program performs other, undesired functions.
 A Trojan Horse neither replicates nor copies itself, but causes damage
or compromises the security of the computer.
 A Trojan Horse must be sent by someone or carried by another
program and may arrive in the form of a joke program or software of
some sort.
 The malicious functionality of a Trojan Horse may be anything
undesirable for a computer user, including data destruction or
compromising a system by providing a means for another computer to
gain access, thus bypassing normal access controls.
Worms
 A worm is a program that makes and facilitates the
distribution of copies of itself; for example, from one disk
drive to another, or by copying itself using email or another
transport mechanism.
 The worm may do damage and compromise the security of
the computer. It may arrive via exploitation of a system
vulnerability or by clicking on an infected e-mail.
Types of virus continued ……
 Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that
is read by the computer upon bootup. These are normally spread
by floppy disks.
 Macro Virus:
Macro viruses are viruses that use another application's macro
programming language to distribute themselves. They infect
documents such as MS Word or MS Excel and are typically
spread to other similar documents.
 Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory
(RAM). They are initiated from a virus which runs on the
computer and they stay in memory after it's initiating program
closes.
Types of virus continued ……
 Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow
someone to gain control of a computer system. The term rootkit
comes from the linux administrator root user. These viruses are
usually installed by trojans and are normally disguised as
operating system files.
 Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple
files of itself, but it also changes it's digital signature every time it
replicates. This makes it difficult for less sophisticated antivirus
software to detect.
 Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific
date or when a specific event occurs. Some examples are a virus
which deletes your photos on Halloween, or a virus which deletes
a database table if a certain employee gets fired.
Stand-Alone Utility Programs
 What is a virus?
 Potentially damaging computer program
 Affects computer without user’s knowledge
SIGNS OF
VIRUS
INFECTION
• An unusual message or image is displayed on the
computer screen
• An unusual sound or music plays randomly
• The available memory is less than what should be
available
• A program or file suddenly is missing
• An unknown program or file mysteriously appears
• The size of a file changes without explanation
• A file becomes corrupted
• A program or file does not work properly
• System properties change
•The operating system runs much slower than usual
Stand-Alone Utility Programs
 What is an antivirus program?
 Identifies and removes viruses in
memory, storage media, and
incoming files
 Must be updated frequently
 Identifies and removes computer
viruses
 Most also protect against worms
and Trojan horses
 What is an antivirus program?
 What are viruses, worms, and Trojan horses?
Virus is a
potentially
damaging
computer
program
Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network
Trojan horse hides
within
or looks like
legitimate
program until
triggered
Payload
(destructive
event) that is
delivered when
you open file, run
infected program,
or boot computer
with infected disk
in disk drive
Can spread
and
damage
files
Does not
replicate
itself on
other
computers
How can a virus spread through an e-
mail message?
Step 1. Unscrupulous
programmers create a
virus program. They hide
the virus in a Word
document and attach the
Word document to an e-
mail message.
Step 2. They use
the Internet to
send the e-mail
message to
thousands of users
around the world.
Step 3b. Other users do not
recognize the name of the
sender of the e-mail message.
These users do not open the
e-mail message. Instead they
delete the e-mail message.
These users’ computers are
not infected with the virus.
Step 3a. Some
users open the
attachment and
their computers
become infected
with the virus.
Keeps file
in separate
area of hard disk
How does an antivirus program inoculate a
program file?
Records
information
about program such
as file size and
creation
date
Attempts
to remove
any detected
virus
Uses
information
to detect if
virus tampers
with file
Quarantines
infected
files that it
cannot
remove
 What is a firewall?
 Security system consisting of hardware and/or
software that prevents unauthorized intrusion
Unauthorized Access and Use
 What are other ways to protect your
personal computer?
 Disable file and
printer sharing on
Internet
connection
Tips for security
What are some tips for preventing virus, worm, and
Trojan horse infections?
Install a personal
firewall program
If the antivirus
program flags an
e-mail attachment
as infected, delete
the attachment
immediately
Never start a
computer with
removable media
inserted
Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source
Install an antivirus
program on all of
your computers
Check all
downloaded
programs for
viruses, worms,
or Trojan horses
Backing Up — The Ultimate
Safeguard
 What is a backup?
Duplicate of file, program, or disk
Full backup
all files in
computer
Selective backup
select which files
to back up
Three-generation
backup
preserves
three copies of
important files
In case of system failure or corrupted files,
restore files by copying to original location
Information Privacy
 What are spyware, adware, and spam?
 Spyware is program
placed on computer
without user’s
knowledge
 Adware is a program
that displays online
advertisements
 Spam is bogus
e-mail message sent
to many recipients
Information Privacy
 How can you control spam?
Collects spam in
central location
that you can
view any time
Service that
blocks e-mail
messages from
designated
sources
E-mail filtering
Sometimes
removes valid
e-mail messages
Attempts to
remove spam
Anti-spam program
Questions??

More Related Content

What's hot

Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Computer virus
Computer virusComputer virus
Computer virus
Computer virusComputer virus
Computer virus
Muhammad Umar Farooq
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Aritra Das
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
viruses
virusesviruses
viruses
khadija habib
 
Computer virus
Computer virusComputer virus
Computer virus
Rohit Nayak
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 

What's hot (20)

Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Computer virus
Computer virusComputer virus
Computer virus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus
VirusVirus
Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
viruses
virusesviruses
viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to Itc lec 15 Computer security risks

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Virus
VirusVirus
Virus
dddaou
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Computer virus
Computer virusComputer virus
Computer virus
kiran_a_c
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 

Similar to Itc lec 15 Computer security risks (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus
VirusVirus
Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 

More from AnzaDar3

Impact of Natural Selection .pptx
Impact of Natural Selection .pptxImpact of Natural Selection .pptx
Impact of Natural Selection .pptx
AnzaDar3
 
Brief concepts of chemical equilibrium
Brief concepts  of   chemical  equilibrium Brief concepts  of   chemical  equilibrium
Brief concepts of chemical equilibrium
AnzaDar3
 
Molecular Orbital Theory (MOT)
Molecular  Orbital  Theory   (MOT)Molecular  Orbital  Theory   (MOT)
Molecular Orbital Theory (MOT)
AnzaDar3
 
Valence Bond Theory (VBT)
  Valence  Bond Theory  (VBT)  Valence  Bond Theory  (VBT)
Valence Bond Theory (VBT)
AnzaDar3
 
Chemical Bonding & Its Types Chem 101
 Chemical    Bonding  & Its  Types  Chem 101 Chemical    Bonding  & Its  Types  Chem 101
Chemical Bonding & Its Types Chem 101
AnzaDar3
 
Acid base concepts Acid Base concepts; Arrhenius, Lowery-Bronsted, Lewis. So...
Acid base concepts Acid Base concepts; Arrhenius,  Lowery-Bronsted, Lewis. So...Acid base concepts Acid Base concepts; Arrhenius,  Lowery-Bronsted, Lewis. So...
Acid base concepts Acid Base concepts; Arrhenius, Lowery-Bronsted, Lewis. So...
AnzaDar3
 
Phylum mollusca presentation
Phylum mollusca  presentationPhylum mollusca  presentation
Phylum mollusca presentation
AnzaDar3
 
Phylum mollusca presentation
Phylum mollusca  presentationPhylum mollusca  presentation
Phylum mollusca presentation
AnzaDar3
 
Phylum Arthropoda
Phylum   ArthropodaPhylum   Arthropoda
Phylum Arthropoda
AnzaDar3
 
Phylum Gastropoda
       Phylum     Gastropoda       Phylum     Gastropoda
Phylum Gastropoda
AnzaDar3
 
Classification , Phylogeny Pattern of Organization
Classification ,  Phylogeny Pattern of Organization Classification ,  Phylogeny Pattern of Organization
Classification , Phylogeny Pattern of Organization
AnzaDar3
 
Animal Diversity ........ Introduction
        Animal Diversity ........ Introduction         Animal Diversity ........ Introduction
Animal Diversity ........ Introduction
AnzaDar3
 
Nematode .......parasites of human and further phylogenetic consideration
Nematode .......parasites of human and further phylogenetic considerationNematode .......parasites of human and further phylogenetic consideration
Nematode .......parasites of human and further phylogenetic consideration
AnzaDar3
 
Phylum nematoda & phylum kinorhyncha
Phylum   nematoda &  phylum kinorhynchaPhylum   nematoda &  phylum kinorhyncha
Phylum nematoda & phylum kinorhyncha
AnzaDar3
 
Class Bivalvia , cephalopoda , Gastropoda
                  Class Bivalvia  ,  cephalopoda  ,  Gastropoda                  Class Bivalvia  ,  cephalopoda  ,  Gastropoda
Class Bivalvia , cephalopoda , Gastropoda
AnzaDar3
 
Class bivalvia
           Class    bivalvia           Class    bivalvia
Class bivalvia
AnzaDar3
 
PHYLUM ROTIFERA
            PHYLUM    ROTIFERA            PHYLUM    ROTIFERA
PHYLUM ROTIFERA
AnzaDar3
 
Protozoan Taxonomy
      Protozoan    Taxonomy      Protozoan    Taxonomy
Protozoan Taxonomy
AnzaDar3
 
Phylum Platyhelminthes
       Phylum    Platyhelminthes       Phylum    Platyhelminthes
Phylum Platyhelminthes
AnzaDar3
 
Phylum Nemertea
                Phylum    Nemertea                Phylum    Nemertea
Phylum Nemertea
AnzaDar3
 

More from AnzaDar3 (20)

Impact of Natural Selection .pptx
Impact of Natural Selection .pptxImpact of Natural Selection .pptx
Impact of Natural Selection .pptx
 
Brief concepts of chemical equilibrium
Brief concepts  of   chemical  equilibrium Brief concepts  of   chemical  equilibrium
Brief concepts of chemical equilibrium
 
Molecular Orbital Theory (MOT)
Molecular  Orbital  Theory   (MOT)Molecular  Orbital  Theory   (MOT)
Molecular Orbital Theory (MOT)
 
Valence Bond Theory (VBT)
  Valence  Bond Theory  (VBT)  Valence  Bond Theory  (VBT)
Valence Bond Theory (VBT)
 
Chemical Bonding & Its Types Chem 101
 Chemical    Bonding  & Its  Types  Chem 101 Chemical    Bonding  & Its  Types  Chem 101
Chemical Bonding & Its Types Chem 101
 
Acid base concepts Acid Base concepts; Arrhenius, Lowery-Bronsted, Lewis. So...
Acid base concepts Acid Base concepts; Arrhenius,  Lowery-Bronsted, Lewis. So...Acid base concepts Acid Base concepts; Arrhenius,  Lowery-Bronsted, Lewis. So...
Acid base concepts Acid Base concepts; Arrhenius, Lowery-Bronsted, Lewis. So...
 
Phylum mollusca presentation
Phylum mollusca  presentationPhylum mollusca  presentation
Phylum mollusca presentation
 
Phylum mollusca presentation
Phylum mollusca  presentationPhylum mollusca  presentation
Phylum mollusca presentation
 
Phylum Arthropoda
Phylum   ArthropodaPhylum   Arthropoda
Phylum Arthropoda
 
Phylum Gastropoda
       Phylum     Gastropoda       Phylum     Gastropoda
Phylum Gastropoda
 
Classification , Phylogeny Pattern of Organization
Classification ,  Phylogeny Pattern of Organization Classification ,  Phylogeny Pattern of Organization
Classification , Phylogeny Pattern of Organization
 
Animal Diversity ........ Introduction
        Animal Diversity ........ Introduction         Animal Diversity ........ Introduction
Animal Diversity ........ Introduction
 
Nematode .......parasites of human and further phylogenetic consideration
Nematode .......parasites of human and further phylogenetic considerationNematode .......parasites of human and further phylogenetic consideration
Nematode .......parasites of human and further phylogenetic consideration
 
Phylum nematoda & phylum kinorhyncha
Phylum   nematoda &  phylum kinorhynchaPhylum   nematoda &  phylum kinorhyncha
Phylum nematoda & phylum kinorhyncha
 
Class Bivalvia , cephalopoda , Gastropoda
                  Class Bivalvia  ,  cephalopoda  ,  Gastropoda                  Class Bivalvia  ,  cephalopoda  ,  Gastropoda
Class Bivalvia , cephalopoda , Gastropoda
 
Class bivalvia
           Class    bivalvia           Class    bivalvia
Class bivalvia
 
PHYLUM ROTIFERA
            PHYLUM    ROTIFERA            PHYLUM    ROTIFERA
PHYLUM ROTIFERA
 
Protozoan Taxonomy
      Protozoan    Taxonomy      Protozoan    Taxonomy
Protozoan Taxonomy
 
Phylum Platyhelminthes
       Phylum    Platyhelminthes       Phylum    Platyhelminthes
Phylum Platyhelminthes
 
Phylum Nemertea
                Phylum    Nemertea                Phylum    Nemertea
Phylum Nemertea
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Itc lec 15 Computer security risks

  • 2. Computer Security Risks  What is a computer security risk?  Event or action that causes loss of or damage to computer system
  • 3. Virus  A computer virus is a computer program that can replicate itself and spread from one computer to another.  The term "virus" is also commonly but misused to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.  A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • 4. Types of Virus  Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.  Trojan Horse  Worms
  • 5. Trojan Horse  A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions.  A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer.  A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort.  The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
  • 6. Worms  A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism.  The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.
  • 7. Types of virus continued ……  Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.  Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.  Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
  • 8. Types of virus continued ……  Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.  Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.  Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.
  • 9. Stand-Alone Utility Programs  What is a virus?  Potentially damaging computer program  Affects computer without user’s knowledge SIGNS OF VIRUS INFECTION • An unusual message or image is displayed on the computer screen • An unusual sound or music plays randomly • The available memory is less than what should be available • A program or file suddenly is missing • An unknown program or file mysteriously appears • The size of a file changes without explanation • A file becomes corrupted • A program or file does not work properly • System properties change •The operating system runs much slower than usual
  • 10. Stand-Alone Utility Programs  What is an antivirus program?  Identifies and removes viruses in memory, storage media, and incoming files  Must be updated frequently  Identifies and removes computer viruses  Most also protect against worms and Trojan horses
  • 11.  What is an antivirus program?
  • 12.  What are viruses, worms, and Trojan horses? Virus is a potentially damaging computer program Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse hides within or looks like legitimate program until triggered Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive Can spread and damage files Does not replicate itself on other computers
  • 13. How can a virus spread through an e- mail message? Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e- mail message. Step 2. They use the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a. Some users open the attachment and their computers become infected with the virus.
  • 14. Keeps file in separate area of hard disk How does an antivirus program inoculate a program file? Records information about program such as file size and creation date Attempts to remove any detected virus Uses information to detect if virus tampers with file Quarantines infected files that it cannot remove
  • 15.  What is a firewall?  Security system consisting of hardware and/or software that prevents unauthorized intrusion
  • 16. Unauthorized Access and Use  What are other ways to protect your personal computer?  Disable file and printer sharing on Internet connection
  • 17. Tips for security What are some tips for preventing virus, worm, and Trojan horse infections? Install a personal firewall program If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately Never start a computer with removable media inserted Never open an e-mail attachment unless you are expecting it and it is from a trusted source Install an antivirus program on all of your computers Check all downloaded programs for viruses, worms, or Trojan horses
  • 18. Backing Up — The Ultimate Safeguard  What is a backup? Duplicate of file, program, or disk Full backup all files in computer Selective backup select which files to back up Three-generation backup preserves three copies of important files In case of system failure or corrupted files, restore files by copying to original location
  • 19. Information Privacy  What are spyware, adware, and spam?  Spyware is program placed on computer without user’s knowledge  Adware is a program that displays online advertisements  Spam is bogus e-mail message sent to many recipients
  • 20. Information Privacy  How can you control spam? Collects spam in central location that you can view any time Service that blocks e-mail messages from designated sources E-mail filtering Sometimes removes valid e-mail messages Attempts to remove spam Anti-spam program