SlideShare a Scribd company logo
The Effects of Malware on Computers ANONYMOUS English 151 WC April 26th 2011
Subtopic #1 – “Introduction of Malware” Have you ever had this happen to you? A sudden decrease in your operating system with no explanation? Pop ups and ads even though you don’t have any web browser open? Unauthorized programs are being installed onto your computer? You notice that your computer is using more of it’s resources than usual? If so – you might be a victim of malware!
Subtopic #1 – “Introduction of Malware” So what is malware, anyway? Software designed to cause harm or gain unauthorized access to one’s computer. Also known as: Viruses Spyware Bloatware Botnets Rootkits Scareware
Subtopic #1 – “Introduction of Malware” History of Malware 1970 - 1990 History of Malware 1990-present day 1971 – “Creeper Virus” is introduced. 1974 – The “Rabbit” Virus. 1981 – “Elk Cloner” the first major virus for the Apple II personal computer. 1987 – The “Vienna Virus” is the first virus that actually destroys data. 1990 – “Chameleon” becomes the first virus that can purposely hide itself from it’s victim. 1998 – “HLLP.DeTroi” becomes the first virus to relay compromised passwords to the creators. 2001 – “E-mail and Websites” become the number one “honey pot” for malware. 2003 – “Slammer” infects the actual memory of computer systems to decrease the performance.
Subtopic #2 – “Effects of Malware on Computers in the Present Day” “As computers become more advanced in what they are capable of, the effects of malware is always changing to fit the agenda of its creator.”
Subtopic #2 – “Effects of Malware on Computers in the Present Day” Types of Malware: Insert info here. Insert info here. Insert info here. Insert info here. Insert info here.
Subtopic #3 – “The Victims of Malware” What are users doing to prevent malware from gaining unauthorized access to their computers? What can you do?
Subtopic #3 – “Future of Malware” What is the current growing concern for the effects of malware?  What might be in store for the future, and what can we do to protect ourselves?
Subtopic #3 – “Conclusion” What do I think?

More Related Content

What's hot

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus
VirusVirus
Virus
CHITRA S
 
Computer safety
Computer safetyComputer safety
Computer safety
ahentz
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
Jeremy Flores
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
Jesus Obenita Jr.
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
sapphirecrs
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Sowmya
SowmyaSowmya
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
smithz
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
Studio Sheen
 
Computer virus
Computer virusComputer virus
Computer virus
Computer virusComputer virus
Computer virus
arif srk
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
RobC76
 
Malware
MalwareMalware
C 7
C 7C 7

What's hot (20)

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threat
Internet threatInternet threat
Internet threat
 
Sowmya
SowmyaSowmya
Sowmya
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Malware
MalwareMalware
Malware
 
C 7
C 7C 7
C 7
 

Viewers also liked

Research project power point
Research project power pointResearch project power point
Research project power point
afonderwhite
 
Presentation Of Research Work
Presentation Of Research WorkPresentation Of Research Work
Presentation Of Research Work
ChandraMouli Gunturi L
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
Lifelong Learning
 
Research project ppt
Research project pptResearch project ppt
Research project ppt
John McKeown
 
Research paper power point
Research paper power pointResearch paper power point
Research paper power point
Katymarie33
 
Business Statistics
Business StatisticsBusiness Statistics
Business Statistics
shorab
 
Introduction to Business Statistics
Introduction to Business StatisticsIntroduction to Business Statistics
Introduction to Business Statistics
Megha Mishra
 
time series analysis
time series analysistime series analysis
time series analysis
SACHIN AWASTHI
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slides
Helen Dixon
 
Research report ppt
Research report pptResearch report ppt
Research report ppt
Vikas Dalmia
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
Aiden Yeh
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
guest349908
 

Viewers also liked (12)

Research project power point
Research project power pointResearch project power point
Research project power point
 
Presentation Of Research Work
Presentation Of Research WorkPresentation Of Research Work
Presentation Of Research Work
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
 
Research project ppt
Research project pptResearch project ppt
Research project ppt
 
Research paper power point
Research paper power pointResearch paper power point
Research paper power point
 
Business Statistics
Business StatisticsBusiness Statistics
Business Statistics
 
Introduction to Business Statistics
Introduction to Business StatisticsIntroduction to Business Statistics
Introduction to Business Statistics
 
time series analysis
time series analysistime series analysis
time series analysis
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slides
 
Research report ppt
Research report pptResearch report ppt
Research report ppt
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
 

Similar to Research paper powerpoint presentation for public viewing

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
Shah Rashedul LastHaque
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
Lihtnes1
 
Malware
MalwareMalware
Anti virus
Anti virusAnti virus
Anti virus
LauratHarun
 
Computer virus
Computer virusComputer virus
Computer virus
BGS Model Public School
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100737728_ahmed
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
dharmendra321361
 
Spyware
SpywareSpyware
Spyware
norazokkar
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
sonykhan3
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
Fathoni Mahardika II
 
Malware
MalwareMalware
Malware
zelkan19
 
Malware
MalwareMalware
Malware
zelkan19
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 

Similar to Research paper powerpoint presentation for public viewing (20)

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Malware
MalwareMalware
Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Spyware
SpywareSpyware
Spyware
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Research paper powerpoint presentation for public viewing

  • 1. The Effects of Malware on Computers ANONYMOUS English 151 WC April 26th 2011
  • 2. Subtopic #1 – “Introduction of Malware” Have you ever had this happen to you? A sudden decrease in your operating system with no explanation? Pop ups and ads even though you don’t have any web browser open? Unauthorized programs are being installed onto your computer? You notice that your computer is using more of it’s resources than usual? If so – you might be a victim of malware!
  • 3. Subtopic #1 – “Introduction of Malware” So what is malware, anyway? Software designed to cause harm or gain unauthorized access to one’s computer. Also known as: Viruses Spyware Bloatware Botnets Rootkits Scareware
  • 4. Subtopic #1 – “Introduction of Malware” History of Malware 1970 - 1990 History of Malware 1990-present day 1971 – “Creeper Virus” is introduced. 1974 – The “Rabbit” Virus. 1981 – “Elk Cloner” the first major virus for the Apple II personal computer. 1987 – The “Vienna Virus” is the first virus that actually destroys data. 1990 – “Chameleon” becomes the first virus that can purposely hide itself from it’s victim. 1998 – “HLLP.DeTroi” becomes the first virus to relay compromised passwords to the creators. 2001 – “E-mail and Websites” become the number one “honey pot” for malware. 2003 – “Slammer” infects the actual memory of computer systems to decrease the performance.
  • 5. Subtopic #2 – “Effects of Malware on Computers in the Present Day” “As computers become more advanced in what they are capable of, the effects of malware is always changing to fit the agenda of its creator.”
  • 6. Subtopic #2 – “Effects of Malware on Computers in the Present Day” Types of Malware: Insert info here. Insert info here. Insert info here. Insert info here. Insert info here.
  • 7. Subtopic #3 – “The Victims of Malware” What are users doing to prevent malware from gaining unauthorized access to their computers? What can you do?
  • 8. Subtopic #3 – “Future of Malware” What is the current growing concern for the effects of malware? What might be in store for the future, and what can we do to protect ourselves?
  • 9. Subtopic #3 – “Conclusion” What do I think?