SlideShare a Scribd company logo
What is computer virus?
- Attached to a small pieces of computer
code, software, or documents.
- A virus executes when the software is
run on a computer. If the virus spreads
to other computers. Those computers
could continue to spread the virus.
- A virus is transferred to another
through e-mail, file transfers, and
instant messaging.
- A virus has a potential to corrupt or even delete files on your computer, use e-mail to
spread itself to other computers, or even erase your hard drive.
What is Worm?
- Is a self-replicating program that is
harmful to networks.
- Worm uses the network to duplicate
its code to the hosts on a network, often
without any user intervention.
- Different from the virus because the
worm does not need to attach to a
program to infect the host.
- It harms networks because it
consumes bandwidth.
BANDWIDTH - describes the maximum data
transfer rate of a network or
Internet connection.
- measures how much data can be
sent over a specific connection in
a given amount of time.
What is Trojan Horse?
- Technically is a worm.
- Does not need to attached to other software
instead Trojan threat is hidden in software that
appears to do one thing, and yet behind the
scenes it does another.
Security Procedures
• Use a security plan to determine what will be done
in critical situation.
• Security plan should be constantly updated to
reflect the latest threats to a network.
• To be reviewed every year.
• Conduct tests to determine areas where security is
weak.
Most commonly known anti-virus
software
Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect
a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent updates.
SECURITY POLICY - most organizations established this
policy stating that employees are not permitted to install
any software that is not provided by the company.
Data Encryption
• Encrypting data involves using codes and ciphers.
• Can help prevent attackers from monitoring or
recording traffic between resources & computers
VPN – Virtual Private Network is any encryption
system that protects data as though it resides on a
private network.
Port Protection
• Firewall – is a way of protecting a computer from
intrusion through the ports.
• With port connection, the user can control the type
of data sent to a computer by selecting which ports
will be open & which will be secured.
• Traffic – the data being transported on a network.
Enabling Windows 7 Firewall
1. Open Windows 7 Firewall by clicking the Start button, and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you
want help protect, and then click OK.

More Related Content

What's hot

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriyaIPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriyaVijiPriya Jeyamani
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

What's hot (20)

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network security
Network securityNetwork security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Networking
NetworkingNetworking
Networking
 
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriyaIPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Viewers also liked

3Com 10005321 REV AF
3Com 10005321 REV AF3Com 10005321 REV AF
3Com 10005321 REV AFsavomir
 
30 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete11130 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete111Renée Bukay
 
Ppt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of CurriculumPpt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of CurriculumAbhimanyu Sharma
 
Utrpení mladého Werthera
Utrpení mladého WertheraUtrpení mladého Werthera
Utrpení mladého WertheraRoman Věžník
 
Rcs1 -chapter6-SLS
Rcs1 -chapter6-SLSRcs1 -chapter6-SLS
Rcs1 -chapter6-SLSMarwan Sadek
 
Внешний Совет Директоров
Внешний Совет ДиректоровВнешний Совет Директоров
Внешний Совет ДиректоровIgor Seleznev
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartSatria Ady Pradana
 
Benefits of Technology
Benefits of TechnologyBenefits of Technology
Benefits of TechnologyIntikhab Alam
 
Resharper 使用經驗分享
Resharper 使用經驗分享Resharper 使用經驗分享
Resharper 使用經驗分享Ming Hsun Yang
 
Relevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detectionRelevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detectionR prasad
 

Viewers also liked (18)

Romeo a Julie
Romeo a JulieRomeo a Julie
Romeo a Julie
 
3Com 10005321 REV AF
3Com 10005321 REV AF3Com 10005321 REV AF
3Com 10005321 REV AF
 
30 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete11130 phenomenes naturels sur notre planete111
30 phenomenes naturels sur notre planete111
 
Ppt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of CurriculumPpt psycholinguistic basis of Curriculum
Ppt psycholinguistic basis of Curriculum
 
Chatbots and AI
Chatbots and AIChatbots and AI
Chatbots and AI
 
Revizor
RevizorRevizor
Revizor
 
Utrpení mladého Werthera
Utrpení mladého WertheraUtrpení mladého Werthera
Utrpení mladého Werthera
 
Stařec a moře
Stařec a mořeStařec a moře
Stařec a moře
 
Tyrolské elegie
Tyrolské elegieTyrolské elegie
Tyrolské elegie
 
Rcs1 -chapter6-SLS
Rcs1 -chapter6-SLSRcs1 -chapter6-SLS
Rcs1 -chapter6-SLS
 
Внешний Совет Директоров
Внешний Совет ДиректоровВнешний Совет Директоров
Внешний Совет Директоров
 
Web Security Workshop : A Jumpstart
Web Security Workshop : A JumpstartWeb Security Workshop : A Jumpstart
Web Security Workshop : A Jumpstart
 
Proměna
ProměnaProměna
Proměna
 
Petr a Lucie
Petr a LuciePetr a Lucie
Petr a Lucie
 
Benefits of Technology
Benefits of TechnologyBenefits of Technology
Benefits of Technology
 
Resharper 使用經驗分享
Resharper 使用經驗分享Resharper 使用經驗分享
Resharper 使用經驗分享
 
Relevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detectionRelevance feedback algorithm inspired by Quantum detection
Relevance feedback algorithm inspired by Quantum detection
 
Miss la sen hand drawing 6
Miss la sen hand drawing 6Miss la sen hand drawing 6
Miss la sen hand drawing 6
 

Similar to Viruses, worms, and trojan horses

Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 
Firewall
FirewallFirewall
FirewallGarmian
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 

Similar to Viruses, worms, and trojan horses (20)

Firewall
FirewallFirewall
Firewall
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Mitppt
MitpptMitppt
Mitppt
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Firewall
FirewallFirewall
Firewall
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer networking
Computer networking Computer networking
Computer networking
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Network security
Network securityNetwork security
Network security
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 

More from EILLEN IVY PORTUGUEZ

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMEILLEN IVY PORTUGUEZ
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and InformationEILLEN IVY PORTUGUEZ
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicingEILLEN IVY PORTUGUEZ
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetEILLEN IVY PORTUGUEZ
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)EILLEN IVY PORTUGUEZ
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business ideaEILLEN IVY PORTUGUEZ
 

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 

Recently uploaded

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...AzmatAli747758
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfThiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfkaushalkr1407
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)rosedainty
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfSpecial education needs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 

Recently uploaded (20)

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Viruses, worms, and trojan horses

  • 1.
  • 2. What is computer virus? - Attached to a small pieces of computer code, software, or documents. - A virus executes when the software is run on a computer. If the virus spreads to other computers. Those computers could continue to spread the virus. - A virus is transferred to another through e-mail, file transfers, and instant messaging. - A virus has a potential to corrupt or even delete files on your computer, use e-mail to spread itself to other computers, or even erase your hard drive.
  • 3. What is Worm? - Is a self-replicating program that is harmful to networks. - Worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. - Different from the virus because the worm does not need to attach to a program to infect the host. - It harms networks because it consumes bandwidth.
  • 4. BANDWIDTH - describes the maximum data transfer rate of a network or Internet connection. - measures how much data can be sent over a specific connection in a given amount of time.
  • 5. What is Trojan Horse? - Technically is a worm. - Does not need to attached to other software instead Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another.
  • 6. Security Procedures • Use a security plan to determine what will be done in critical situation. • Security plan should be constantly updated to reflect the latest threats to a network. • To be reviewed every year. • Conduct tests to determine areas where security is weak.
  • 7. Most commonly known anti-virus software
  • 8. Virus Protection Software • Known as Antivirus Software • Antivirus software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. • Becomes outdated quickly, the technician is responsible for applying the most recent updates. SECURITY POLICY - most organizations established this policy stating that employees are not permitted to install any software that is not provided by the company.
  • 9. Data Encryption • Encrypting data involves using codes and ciphers. • Can help prevent attackers from monitoring or recording traffic between resources & computers VPN – Virtual Private Network is any encryption system that protects data as though it resides on a private network.
  • 10. Port Protection • Firewall – is a way of protecting a computer from intrusion through the ports. • With port connection, the user can control the type of data sent to a computer by selecting which ports will be open & which will be secured. • Traffic – the data being transported on a network.
  • 11. Enabling Windows 7 Firewall 1. Open Windows 7 Firewall by clicking the Start button, and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want help protect, and then click OK.