SlideShare a Scribd company logo
P7 – Identify Potential
    security risks


      By James Bennett
Reason for the Installation of
       the Anti-Virus
• The reason we installed the anti-virus was to help protect our
  computer from being infected with viruses, Trojans, Worms
  etc. The anti-virus was scheduled to perform hourly checks for
  new updates for the software and a daily scan to determine if
  there are any threats and if so to delete them immediately.
• If you do not have anti-virus you are at a bigger threat to
  thousands of viruses compared to if you were protected and
  your computer got infected the anti-virus software would be
  able to detect the virus and delete it while performing it’s
  daily scan.
Trojans
• Trojans or Trojan horses are computer malware in which the
  victim downloads believing that it is a legitimate program but
  it is actually a Trojan which gives a hacker unauthorized access
  into the victims computer. They are not like Viruses because
  they do not embed themselves into files in the computer.
• Hackers use Trojans to steal Money, passwords, credit card
  information and watching the victims screen.
• Common Trojans are NetBus, Back Orifice, Zeus, Flashback
  Trojan, Subseven, Y3k Remote Administration tool, Beast and
  The Blackhole exploit kit.
• When downloading a file from the internet make sure your
  anti-virus scans the file you are downloading to check for
  Trojans.
Viruses
• A computer virus is a type of computer program which
  duplicates itself and then goes on to spread from one
  computer and then to many others. Viruses are not like
  Trojans because Trojans hide their harmful content whereas
  viruses make themselves known. Viruses mostly corrupt files
  on the target computer. Anti-virus can pick up and delete
  viruses easily, just by doing a scan it can trace and then delete
  viruses. A way to get rid of Viruses on Windows is to use
  System Restore which restores your computer back to a time
  when it was last backed up, which at that time you computer
  was not infected with the Virus.
Here is an example of Anti-Virus discovering unwanted content on a
                             Computer
Worms
• A computer worm is another Malware computer program
  which only duplicates itself to then spread to other
  computers. Some computer worms purpose is to only
  replicate itself and then to spread through security breaches
  in the computers on a network. A Payload worm is a worm
  that increases Network Traffic, this type of worm has the
  capabilities to delete files. But there are good worms such as
  the Xerox PARC worm which was used to patch glitches in the
  Microsoft Website.
This is a picture of the source code for the Morris Internet Worm

More Related Content

What's hot

Spyware
SpywareSpyware
Spyware
Avani Patel
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Malware
MalwareMalware
Malware
Avani Patel
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Malware
MalwareMalware
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
Forrester High School
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Malware
MalwareMalware

What's hot (19)

Spyware
SpywareSpyware
Spyware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malware
MalwareMalware
Malware
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
information about virus
information about virusinformation about virus
information about virus
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Malware
MalwareMalware
Malware
 

Similar to P7 – Identify Potential Security Risks

Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
shubhamverma2711
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
chinmay kelkar
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
itsamuamit11
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
Bashdar Rahman
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
Anirudh Kannan
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 

Similar to P7 – Identify Potential Security Risks (20)

Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious
MaliciousMalicious
Malicious
 
anti_virus
anti_virusanti_virus
anti_virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 

More from JamesBennett15

Unit 111 – D1
Unit 111 – D1Unit 111 – D1
Unit 111 – D1
JamesBennett15
 
Companies using Twitter
Companies using TwitterCompanies using Twitter
Companies using TwitterJamesBennett15
 
P1 - Typical Computer Components
P1 - Typical Computer ComponentsP1 - Typical Computer Components
P1 - Typical Computer ComponentsJamesBennett15
 
P5 – Connect Hardware Safely to a Computer
P5 – Connect Hardware Safely to a ComputerP5 – Connect Hardware Safely to a Computer
P5 – Connect Hardware Safely to a ComputerJamesBennett15
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemJamesBennett15
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsJamesBennett15
 
X-Plane 9.0 By James Bennett
X-Plane 9.0 By James BennettX-Plane 9.0 By James Bennett
X-Plane 9.0 By James Bennett
JamesBennett15
 

More from JamesBennett15 (14)

Unit 111 – D1
Unit 111 – D1Unit 111 – D1
Unit 111 – D1
 
Companies using Twitter
Companies using TwitterCompanies using Twitter
Companies using Twitter
 
D2
D2D2
D2
 
D1
D1D1
D1
 
M3
M3M3
M3
 
M2
M2M2
M2
 
M1
M1M1
M1
 
P4
P4 P4
P4
 
P1 - Typical Computer Components
P1 - Typical Computer ComponentsP1 - Typical Computer Components
P1 - Typical Computer Components
 
P5 – Connect Hardware Safely to a Computer
P5 – Connect Hardware Safely to a ComputerP5 – Connect Hardware Safely to a Computer
P5 – Connect Hardware Safely to a Computer
 
P3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer SystemP3 - Represent how Data flows around a Computer System
P3 - Represent how Data flows around a Computer System
 
P6 - Anti-Virus Setup
P6 - Anti-Virus SetupP6 - Anti-Virus Setup
P6 - Anti-Virus Setup
 
P2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer SystemsP2 - Describing the Purposes of Different types of Computer Systems
P2 - Describing the Purposes of Different types of Computer Systems
 
X-Plane 9.0 By James Bennett
X-Plane 9.0 By James BennettX-Plane 9.0 By James Bennett
X-Plane 9.0 By James Bennett
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

P7 – Identify Potential Security Risks

  • 1. P7 – Identify Potential security risks By James Bennett
  • 2. Reason for the Installation of the Anti-Virus • The reason we installed the anti-virus was to help protect our computer from being infected with viruses, Trojans, Worms etc. The anti-virus was scheduled to perform hourly checks for new updates for the software and a daily scan to determine if there are any threats and if so to delete them immediately. • If you do not have anti-virus you are at a bigger threat to thousands of viruses compared to if you were protected and your computer got infected the anti-virus software would be able to detect the virus and delete it while performing it’s daily scan.
  • 3. Trojans • Trojans or Trojan horses are computer malware in which the victim downloads believing that it is a legitimate program but it is actually a Trojan which gives a hacker unauthorized access into the victims computer. They are not like Viruses because they do not embed themselves into files in the computer. • Hackers use Trojans to steal Money, passwords, credit card information and watching the victims screen. • Common Trojans are NetBus, Back Orifice, Zeus, Flashback Trojan, Subseven, Y3k Remote Administration tool, Beast and The Blackhole exploit kit. • When downloading a file from the internet make sure your anti-virus scans the file you are downloading to check for Trojans.
  • 4. Viruses • A computer virus is a type of computer program which duplicates itself and then goes on to spread from one computer and then to many others. Viruses are not like Trojans because Trojans hide their harmful content whereas viruses make themselves known. Viruses mostly corrupt files on the target computer. Anti-virus can pick up and delete viruses easily, just by doing a scan it can trace and then delete viruses. A way to get rid of Viruses on Windows is to use System Restore which restores your computer back to a time when it was last backed up, which at that time you computer was not infected with the Virus.
  • 5. Here is an example of Anti-Virus discovering unwanted content on a Computer
  • 6. Worms • A computer worm is another Malware computer program which only duplicates itself to then spread to other computers. Some computer worms purpose is to only replicate itself and then to spread through security breaches in the computers on a network. A Payload worm is a worm that increases Network Traffic, this type of worm has the capabilities to delete files. But there are good worms such as the Xerox PARC worm which was used to patch glitches in the Microsoft Website.
  • 7. This is a picture of the source code for the Morris Internet Worm