SlideShare a Scribd company logo
14A-1
Basic Security Concepts
• What is a threats?
– Anything that can harm a computer
– Vulnerabilities are weaknesses in security
– Security attempts to neutralize threats
14A-2
Basic Security Concepts
• Degrees of harm
– Level of potential damage
– Include all parts of system
• Potential data loss
• Loss of privacy
• Inability to use hardware
• Inability to use software
14A-3
Basic Security Concepts
• Countermeasures
– Steps taken to block a threat
– Protect the data from theft
– Protect the system from theft
14A-4
Threats To Users
• 1. Loss of privacy
– Personal information is stored electronically
– Purchases are stored in a database
• Data is sold to other companies
– Public records on the Internet
– Internet use is monitored and logged
– None of these techniques are illegal
14A-5
Threats to Users
• 2. Cookies
– A cookie is information that a Web site puts
on your hard disk so that it can remember
something about you at a later time.
– Cookies now track history and passwords
– Browsers include cookie blocking tools
14A-6
Threats to Users
• 3. Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
14A-7
Threats to Users
• 4. Web bugs
– Small programs embedded in gif images
– A Web bug, also known as a Web beacon,
is a file object (usually a graphic image
such as a transparent GIF) that is placed
on a Web page or in an e-mail message to
monitor user behavior.
– Gets around cookie blocking tools
– Companies use to track usage
14A-8
Threats to Users
• 5. Spam
– Unsolicited commercial email
– Irrelevant or unsolicited messages sent
over the Internet, typically to large numbers
of users, for the purposes of advertising,
phishing, spreading malware, etc.
– Networks and PCs need a spam blocker
• Stop spam before reaching the inbox
– Spammers acquire addresses using many
methods
14A-9
Threats to Data
• The most serious threat
– Data is the reason for computers
– Data is very difficult to replace
– Protection is difficult
• Data is intangible
14A-10
Threats to Data
• Viruses
– Software that distributes and installs itself
– Ranges from annoying to catastrophic
– Countermeasures
• Anti-virus software
• Popup blockers
• Do not open unknown email
14A-11
Threats to Data
• Trojan horses
– Program that poses as beneficial software
– Not an actual virus but a loophole to cause
virus.
– User willingly installs the software
– Countermeasures
• Anti-virus software
• Spyware blocker
14A-12
Threats to Data
• Cybercrime
– Using a computer in an illegal act
– Fraud and theft are common acts
14A-13
Threats to Data
• Internet fraud
– Most common cybercrime
– Fraudulent website
– Have names similar to legitimate sites
14A-14
Threats to Data
• Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
• Recreational hacking
• Financial hackers
• Grudge hacking
– Hacking methods
• Sniffing
• Social engineering
• Spoofing
Computer virus
• Computer viruses are small software
programs that are designed to spread from
one computer to another and to interfere with
computer operation.
• A virus might corrupt or delete data on your
computer, use your e-mail program to spread
itself to other computers, or even erase
everything on your hard disk.
• Computer viruses are often spread by
attachments in e-mail messages or instant
messaging messages
14A-15
Causes of Computer virus
• Virus infection in computers can be
caused through different means. Below
are the commonest causes of Computer
Virus attack.
Through the internet
Through email attachment
Through removable storage devices
Through Bluetooth transfer
14A-16
Most Common Types of Viruses
• 1. Resident Viruses
• This type of virus is a permanent which
resides in the RAM memory. From there
it can overcome and interrupt all of the
operations executed by the system:
corrupting files and programs that are
opened, closed, copied, renamed etc.
14A-17
2. Boot Virus
• This type of virus affects the boot sector of a floppy or
hard disk. This is a crucial part of a disk, in which
information on the disk itself is stored together with a
program that makes it possible to boot (start) the
computer from the disk.
The best way of avoiding boot viruses is to ensure
that floppy disks are write-protected and never start
your computer with an unknown floppy disk in the disk
drive.
14A-18
3. Overwrite Viruses
• Virus of this kind is characterized by the fact that it
deletes the information contained in the files that it
infects, rendering them partially or totally useless
once they have been infected.
The only way to clean a file infected by an overwrite
virus is to delete the file completely, thus losing the
original content.
14A-19
4. Directory Virus
• Directory viruses change the paths that indicate the
location of a file. By executing a program (file with the
extension .EXE or .COM) which has been infected by
a virus, you are unknowingly running the virus
program, while the original file and program have
been previously moved by the virus.
Once infected it becomes impossible to locate the
original files.
14A-20
5. File infectors
•
This type of virus infects programs or executable files
(files with an .EXE or .COM extension). When one of
these programs is run, directly or indirectly, the virus
is activated, producing the damaging effects it is
programmed to carry out. The majority of existing
viruses belongs to this category, and can be classified
depending on the actions that they carry out.
14A-21
Antivirus
• Anti-virus software is a program or set of
programs that are designed to prevent,
search for, detect, and remove software
viruses, and other malicious software
infections like worms, Trojans and more.
• McAfee
• ESET NOD32
• Avast
• Avira
14A-22
Functions of Antivirus
• Scan specific files or directories for any malware or
known malicious patterns
• Allow you to schedule scans to automatically run for
you
• Allow you to initiate a scan of a specific file or of your
computer, or of a CD or flash drive at any time.
• Remove any malicious code detected –sometimes
you will be notified of an infection and asked if you
want to clean the file, other programs will
automatically do this behind the scenes.
• Show you the ‘health’ of your computer
14A-23
PASSWORD
• Password is a secret word that is used to protect a
computer system or program. It may consist of
numbers, alphabets or both. The user has to type the
password to access the computer system.
• Examples:-
Every computer provides an option for setting
password. If the computer is protected with password,
it will ask for that password to login.
Email facility on the internet is also protected with
password. Every user has to give email ID and
password to check emails.
14A-24
Purpose of password
• The purpose of password is to protect
data stored on a computer.
• It protects data from being lost,
misused or deleted by any person.
• The system can be accessed by a
person who knows the password.
14A-25
Tricks for obtaining password
• There are two essential password rules to
consider when creating a password for the
first time
• – length and complexity.
• Your password length should be at least 8
characters long
• Your password should use a combination of
lower case letters, upper case letters,
numbers, and special characters
14A-26
Purpose of password
14A-27
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
Chapter 14A
End of Chapter

More Related Content

What's hot

Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
System security
System securitySystem security
System security
sommerville-videos
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Computer security
Computer securityComputer security
Computer security
Shashi Chandra
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
arun alfie
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
Faruk_Hossen
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 

What's hot (20)

Security Basics
Security BasicsSecurity Basics
Security Basics
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
System security
System securitySystem security
System security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer security and
Computer security andComputer security and
Computer security and
 
Network Security
Network SecurityNetwork Security
Network Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Computer security
Computer securityComputer security
Computer security
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computer security
Computer securityComputer security
Computer security
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Viewers also liked

Computer security 101
Computer security 101Computer security 101
Computer security 101
Khairulmizam Samsudin
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
MediaMosa
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
Sai Ram
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
guest5fd01d
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Annies Minu
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
Shwana M
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
Volker Hirsch
 

Viewers also liked (13)

Computer security 101
Computer security 101Computer security 101
Computer security 101
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Viruses (Lecture) IT Slides # 3

Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
ReshmaBV2
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
Plus91 Technologies Pvt. Ltd.
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
Maxwell Musonda
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
DINESH KAMBLE
 

Similar to Viruses (Lecture) IT Slides # 3 (20)

Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Malicious
MaliciousMalicious
Malicious
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Network security
Network securityNetwork security
Network security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

More from Muhammad Talha Zaroon

Internet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture SlideInternet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture Slide
Muhammad Talha Zaroon
 
Conversion (IT) Slide # 3
Conversion (IT) Slide # 3Conversion (IT) Slide # 3
Conversion (IT) Slide # 3
Muhammad Talha Zaroon
 
Internet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture SlideInternet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture Slide
Muhammad Talha Zaroon
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide
Muhammad Talha Zaroon
 
Database (IT) Lecture Slide
Database (IT) Lecture SlideDatabase (IT) Lecture Slide
Database (IT) Lecture Slide
Muhammad Talha Zaroon
 
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 22nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
Muhammad Talha Zaroon
 
Derivative and Integeration Formulas
Derivative and Integeration FormulasDerivative and Integeration Formulas
Derivative and Integeration Formulas
Muhammad Talha Zaroon
 
Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1
Muhammad Talha Zaroon
 
IT semester 1 course outline
IT semester 1 course outlineIT semester 1 course outline
IT semester 1 course outline
Muhammad Talha Zaroon
 
Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1
Muhammad Talha Zaroon
 
Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2
Muhammad Talha Zaroon
 
Map of UNI TUF
Map of UNI TUFMap of UNI TUF
Map of UNI TUF
Muhammad Talha Zaroon
 
Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1
Muhammad Talha Zaroon
 
Front Page
Front PageFront Page
Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1
Muhammad Talha Zaroon
 
History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1 History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1
Muhammad Talha Zaroon
 

More from Muhammad Talha Zaroon (17)

Internet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture SlideInternet 2 (IT) Lecture Slide
Internet 2 (IT) Lecture Slide
 
Conversion (IT) Slide # 3
Conversion (IT) Slide # 3Conversion (IT) Slide # 3
Conversion (IT) Slide # 3
 
Internet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture SlideInternet 1 (IT) Lecture Slide
Internet 1 (IT) Lecture Slide
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide13 A Programing Languages (IT) Lecture Slide
13 A Programing Languages (IT) Lecture Slide
 
Database (IT) Lecture Slide
Database (IT) Lecture SlideDatabase (IT) Lecture Slide
Database (IT) Lecture Slide
 
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 22nd Law of Thermodynamics + Doppler (Physics) Assig # 2
2nd Law of Thermodynamics + Doppler (Physics) Assig # 2
 
Derivative and Integeration Formulas
Derivative and Integeration FormulasDerivative and Integeration Formulas
Derivative and Integeration Formulas
 
Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1Input & output devices (IT lab) assig # 1
Input & output devices (IT lab) assig # 1
 
IT semester 1 course outline
IT semester 1 course outlineIT semester 1 course outline
IT semester 1 course outline
 
Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1
 
Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2Data Communication (Lecture) IT Slide # 2
Data Communication (Lecture) IT Slide # 2
 
Map of UNI TUF
Map of UNI TUFMap of UNI TUF
Map of UNI TUF
 
Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1Role of computer (IT-Lab) Presentation # 1
Role of computer (IT-Lab) Presentation # 1
 
Front Page
Front PageFront Page
Front Page
 
Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1Welding (WorkShop) Assig # 1
Welding (WorkShop) Assig # 1
 
History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1 History of Computer (IT) Assig # 1
History of Computer (IT) Assig # 1
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Viruses (Lecture) IT Slides # 3

  • 1. 14A-1 Basic Security Concepts • What is a threats? – Anything that can harm a computer – Vulnerabilities are weaknesses in security – Security attempts to neutralize threats
  • 2. 14A-2 Basic Security Concepts • Degrees of harm – Level of potential damage – Include all parts of system • Potential data loss • Loss of privacy • Inability to use hardware • Inability to use software
  • 3. 14A-3 Basic Security Concepts • Countermeasures – Steps taken to block a threat – Protect the data from theft – Protect the system from theft
  • 4. 14A-4 Threats To Users • 1. Loss of privacy – Personal information is stored electronically – Purchases are stored in a database • Data is sold to other companies – Public records on the Internet – Internet use is monitored and logged – None of these techniques are illegal
  • 5. 14A-5 Threats to Users • 2. Cookies – A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time. – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 6. 14A-6 Threats to Users • 3. Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 7. 14A-7 Threats to Users • 4. Web bugs – Small programs embedded in gif images – A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior. – Gets around cookie blocking tools – Companies use to track usage
  • 8. 14A-8 Threats to Users • 5. Spam – Unsolicited commercial email – Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc. – Networks and PCs need a spam blocker • Stop spam before reaching the inbox – Spammers acquire addresses using many methods
  • 9. 14A-9 Threats to Data • The most serious threat – Data is the reason for computers – Data is very difficult to replace – Protection is difficult • Data is intangible
  • 10. 14A-10 Threats to Data • Viruses – Software that distributes and installs itself – Ranges from annoying to catastrophic – Countermeasures • Anti-virus software • Popup blockers • Do not open unknown email
  • 11. 14A-11 Threats to Data • Trojan horses – Program that poses as beneficial software – Not an actual virus but a loophole to cause virus. – User willingly installs the software – Countermeasures • Anti-virus software • Spyware blocker
  • 12. 14A-12 Threats to Data • Cybercrime – Using a computer in an illegal act – Fraud and theft are common acts
  • 13. 14A-13 Threats to Data • Internet fraud – Most common cybercrime – Fraudulent website – Have names similar to legitimate sites
  • 14. 14A-14 Threats to Data • Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation • Recreational hacking • Financial hackers • Grudge hacking – Hacking methods • Sniffing • Social engineering • Spoofing
  • 15. Computer virus • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. • Computer viruses are often spread by attachments in e-mail messages or instant messaging messages 14A-15
  • 16. Causes of Computer virus • Virus infection in computers can be caused through different means. Below are the commonest causes of Computer Virus attack. Through the internet Through email attachment Through removable storage devices Through Bluetooth transfer 14A-16
  • 17. Most Common Types of Viruses • 1. Resident Viruses • This type of virus is a permanent which resides in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. 14A-17
  • 18. 2. Boot Virus • This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. 14A-18
  • 19. 3. Overwrite Viruses • Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content. 14A-19
  • 20. 4. Directory Virus • Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files. 14A-20
  • 21. 5. File infectors • This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belongs to this category, and can be classified depending on the actions that they carry out. 14A-21
  • 22. Antivirus • Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software infections like worms, Trojans and more. • McAfee • ESET NOD32 • Avast • Avira 14A-22
  • 23. Functions of Antivirus • Scan specific files or directories for any malware or known malicious patterns • Allow you to schedule scans to automatically run for you • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time. • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes. • Show you the ‘health’ of your computer 14A-23
  • 24. PASSWORD • Password is a secret word that is used to protect a computer system or program. It may consist of numbers, alphabets or both. The user has to type the password to access the computer system. • Examples:- Every computer provides an option for setting password. If the computer is protected with password, it will ask for that password to login. Email facility on the internet is also protected with password. Every user has to give email ID and password to check emails. 14A-24
  • 25. Purpose of password • The purpose of password is to protect data stored on a computer. • It protects data from being lost, misused or deleted by any person. • The system can be accessed by a person who knows the password. 14A-25
  • 26. Tricks for obtaining password • There are two essential password rules to consider when creating a password for the first time • – length and complexity. • Your password length should be at least 8 characters long • Your password should use a combination of lower case letters, upper case letters, numbers, and special characters 14A-26
  • 28. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education Chapter 14A End of Chapter

Editor's Notes

  1. Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security.
  2. Teaching tip Cookies are named after the ‘magic cookie’.
  3. Teaching tip More information regarding web bugs can be found at en.wikipedia.org/wiki/Web_bug.
  4. Teaching tip Spam is rumored to be named in honor of the Monty Python skit, Spam!. In the skit, a customer is forced to select spam in his lunch. Much like we are forced to accept a spam message. Visit www.detritus.org/spam/skit.html for the entire spam skit. Discussion point Spam is one topic that nearly everyone in the class can relate to. Have your students think about spam from the other side. Have them consider the point of view of the self proclaimed ‘Spam King’, Scott Richter. For some conversation fodder visit www.pcworld.com/news/article/0,aid,116807,00.asp.
  5. Teaching tip For information on specific viruses visit securityresponse.Symantec.com/. Teaching tip Detailed information regarding the protection from viruses, see the Computing keynote at the end of the chapter.
  6. Teaching tip Ad Aware is sold by LavaSoft. The homepage is www.lavasoftusa.com/software/adaware/. Spybot is a product of Patrick M. Kolla. The true website is www.safer-networking.org/en/index.html.