SlideShare a Scribd company logo
What is computer virus?
- Attached to a small pieces of computer
code, software, or documents.
- A virus executes when the software is
run on a computer. If the virus spreads
to other computers. Those computers
could continue to spread the virus.
- A virus is transferred to another
through e-mail, file transfers, and
instant messaging.
- A virus has a potential to corrupt or even delete files on your computer, use e-mail to
spread itself to other computers, or even erase your hard drive.
What is Worm?
- Is a self-replicating program that is
harmful to networks.
- Worm uses the network to duplicate
its code to the hosts on a network, often
without any user intervention.
- Different from the virus because the
worm does not need to attach to a
program to infect the host.
- It harms networks because it
consumes bandwidth.
BANDWIDTH - describes the maximum data
transfer rate of a network or
Internet connection.
- measures how much data can be
sent over a specific connection in
a given amount of time.
What is Trojan Horse?
- Technically is a worm.
- Does not need to attached to other software
instead Trojan threat is hidden in software that
appears to do one thing, and yet behind the
scenes it does another.
Security Procedures
• Use a security plan to determine what will be done
in critical situation.
• Security plan should be constantly updated to
reflect the latest threats to a network.
• To be reviewed every year.
• Conduct tests to determine areas where security is
weak.
Most commonly known anti-virus
software
Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect
a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent updates.
SECURITY POLICY - most organizations established this
policy stating that employees are not permitted to install
any software that is not provided by the company.
Data Encryption
• Encrypting data involves using codes and ciphers.
• Can help prevent attackers from monitoring or
recording traffic between resources & computers
VPN – Virtual Private Network is any encryption
system that protects data as though it resides on a
private network.
Port Protection
• Firewall – is a way of protecting a computer from
intrusion through the ports.
• With port connection, the user can control the type
of data sent to a computer by selecting which ports
will be open & which will be secured.
• Traffic – the data being transported on a network.
Enabling Windows 7 Firewall
1. Open Windows 7 Firewall by clicking the Start button, and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you
want help protect, and then click OK.

More Related Content

What's hot

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer virus
Computer virusComputer virus
Computer virus
Aarya Khanal
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 

What's hot (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Antivirus
AntivirusAntivirus
Antivirus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Security threats
Security threatsSecurity threats
Security threats
 
Malware
MalwareMalware
Malware
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 

Viewers also liked

Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
EILLEN IVY PORTUGUEZ
 
Computer Network
Computer NetworkComputer Network
Computer Network
EILLEN IVY PORTUGUEZ
 
Materials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing DevicesMaterials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing Devices
EILLEN IVY PORTUGUEZ
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
EILLEN IVY PORTUGUEZ
 
Moodboard as
Moodboard asMoodboard as
Moodboard as
ellendavi
 
Dental courses in delhi
Dental courses in delhiDental courses in delhi
Dental courses in delhi
Rajat Sachdeva
 
Cетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личностиCетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личности
Мобильное Электронное Образование
 
Sigma type
Sigma typeSigma type
Sigma type
Dmytro Mitin
 
тима о. о.
тима о. о.тима о. о.
тима о. о.
semyurihor
 
туркула л. в.
туркула л. в.туркула л. в.
туркула л. в.
semyurihor
 
стецько н. б.
стецько н. б.стецько н. б.
стецько н. б.
semyurihor
 
погоріла о. с.
погоріла о. с.погоріла о. с.
погоріла о. с.
semyurihor
 
Hotdesking Feedback
Hotdesking FeedbackHotdesking Feedback
Hotdesking Feedback
j1huntridgedixon
 
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Ekonomikas ministrija/ Dzīvo siltāk
 
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
Rui Quintino
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
EILLEN IVY PORTUGUEZ
 
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi datiCloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Aruba S.p.A.
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
Samrat Sikri
 

Viewers also liked (20)

Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Materials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing DevicesMaterials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing Devices
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
Moodboard as
Moodboard asMoodboard as
Moodboard as
 
Dental courses in delhi
Dental courses in delhiDental courses in delhi
Dental courses in delhi
 
Cетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личностиCетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личности
 
Sigma type
Sigma typeSigma type
Sigma type
 
тима о. о.
тима о. о.тима о. о.
тима о. о.
 
туркула л. в.
туркула л. в.туркула л. в.
туркула л. в.
 
стецько н. б.
стецько н. б.стецько н. б.
стецько н. б.
 
погоріла о. с.
погоріла о. с.погоріла о. с.
погоріла о. с.
 
Hotdesking Feedback
Hotdesking FeedbackHotdesking Feedback
Hotdesking Feedback
 
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
 
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi datiCloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 

Similar to Viruses, worms, and trojan horses

Firewall
FirewallFirewall
Firewall
sajeena81
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computing safety
Computing safetyComputing safety
Computing safety
Brulius
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Network security
Network securityNetwork security
Network security
Preethi B
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
Ahmed Muzammil
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Firewall
FirewallFirewall
Firewall
Garmian
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
Computer networking
Computer networking Computer networking
Computer networking
Sukrant Chandna
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
Apoorva812677
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 

Similar to Viruses, worms, and trojan horses (20)

Firewall
FirewallFirewall
Firewall
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Mitppt
MitpptMitppt
Mitppt
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Firewall
FirewallFirewall
Firewall
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer networking
Computer networking Computer networking
Computer networking
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Network security
Network securityNetwork security
Network security
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 

More from EILLEN IVY PORTUGUEZ

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
EILLEN IVY PORTUGUEZ
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
EILLEN IVY PORTUGUEZ
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
EILLEN IVY PORTUGUEZ
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
EILLEN IVY PORTUGUEZ
 
Web design principles
Web design principlesWeb design principles
Web design principles
EILLEN IVY PORTUGUEZ
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
EILLEN IVY PORTUGUEZ
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
EILLEN IVY PORTUGUEZ
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
EILLEN IVY PORTUGUEZ
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
EILLEN IVY PORTUGUEZ
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
EILLEN IVY PORTUGUEZ
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
EILLEN IVY PORTUGUEZ
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
EILLEN IVY PORTUGUEZ
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
EILLEN IVY PORTUGUEZ
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
EILLEN IVY PORTUGUEZ
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
EILLEN IVY PORTUGUEZ
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
EILLEN IVY PORTUGUEZ
 

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 

Recently uploaded

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 

Recently uploaded (20)

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 

Viruses, worms, and trojan horses

  • 1.
  • 2. What is computer virus? - Attached to a small pieces of computer code, software, or documents. - A virus executes when the software is run on a computer. If the virus spreads to other computers. Those computers could continue to spread the virus. - A virus is transferred to another through e-mail, file transfers, and instant messaging. - A virus has a potential to corrupt or even delete files on your computer, use e-mail to spread itself to other computers, or even erase your hard drive.
  • 3. What is Worm? - Is a self-replicating program that is harmful to networks. - Worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. - Different from the virus because the worm does not need to attach to a program to infect the host. - It harms networks because it consumes bandwidth.
  • 4. BANDWIDTH - describes the maximum data transfer rate of a network or Internet connection. - measures how much data can be sent over a specific connection in a given amount of time.
  • 5. What is Trojan Horse? - Technically is a worm. - Does not need to attached to other software instead Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another.
  • 6. Security Procedures • Use a security plan to determine what will be done in critical situation. • Security plan should be constantly updated to reflect the latest threats to a network. • To be reviewed every year. • Conduct tests to determine areas where security is weak.
  • 7. Most commonly known anti-virus software
  • 8. Virus Protection Software • Known as Antivirus Software • Antivirus software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. • Becomes outdated quickly, the technician is responsible for applying the most recent updates. SECURITY POLICY - most organizations established this policy stating that employees are not permitted to install any software that is not provided by the company.
  • 9. Data Encryption • Encrypting data involves using codes and ciphers. • Can help prevent attackers from monitoring or recording traffic between resources & computers VPN – Virtual Private Network is any encryption system that protects data as though it resides on a private network.
  • 10. Port Protection • Firewall – is a way of protecting a computer from intrusion through the ports. • With port connection, the user can control the type of data sent to a computer by selecting which ports will be open & which will be secured. • Traffic – the data being transported on a network.
  • 11. Enabling Windows 7 Firewall 1. Open Windows 7 Firewall by clicking the Start button, and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want help protect, and then click OK.