Unit 6 Viruses & Destructive Programs
Download
Report
Transcript Unit 6 Viruses & Destructive Programs
VIRUSES & DESTRUCTIVE
PROGRAMS
UNIT 6 DIGITAL LITERACY STUDY
S3 OBJ 2-2
COMPUTER VIRUS
A Virus is a computer program written to alter the way a
computer operates without the permission or knowledge of the
user.
Viruses can either be considered a Nuisance or Destructive.
They can
Corrupt files
Destroy data
Display irritating messages
Corrupt computer systems
Some viruses replicate themselves which means that they copy
themselves over and over.
TYPES OF VIRUSES
Not all computer viruses behave, replicate, or infect the same way.
There are several different categories of viruses and malware.
Trojan Horse
Worms
Bootsector Virus
Macro Virus
Memory Resident Viruses
Rootkit Virus
Polymorphic Viruses
Logic Bombs/Time Bombs
TYPES OF VIRUSES
Trojan Horse:
Has the appearance of having a useful and desired function.
Program performs undesired functions secretly.
Does not replicate itself.
Worms:
A program that replicates itself in order to spread from one
computer to another.
TYPES OF VIRUSES
Bootsector Virus:
Attaches itself to the first part of the hard disk that is read by
the computer during the bootup process.
Macro Virus:
Uses another application’s macro programming language to
distribute themselves.
They infect documents such as MS Word, Excel, etc.
TYPES OF VIRUSES
Memory Resident Viruses:
Viruses that reside in a computer’s RAM.
They stay in the memory after the initiating program closes.
Rootkit Virus:
An undetectable virus which attempts to allow someone to
gain control of a computer system.
Disguised as operating system files.
TYPES OF VIRUSES
Polymorphic Viruses:
Copies itself by creating multiple files of itself.
It changes its signature making it hard for antivirus software
to detect.
Logic Bombs/Time Bombs:
Programmed to initiate at a specific date or when a specific
event occurs.
SPREADING VIRUSES
Viruses spread because people distribute infected files by exchanging
disks and CDs, sending e-mail attachments, and downloading files from
the Internet.
Viruses attach themselves to files with .exe, .com, or .vbs filename
extensions
When you open the infected file, the virus opens and waits to infect the
next program you run or disk you use.
Viruses have the ability to lurk in a computer for days or months,
quietly replicating (copying) themselves.
You may not even know your computer has a virus, thus making it
easier to spread the virus.
HOW VIRUSES SPREAD
Email Attachments
Rogue Websites
Networks
Infected Boot Disks
Phishing Schemes
Infected Software
Hackers
Instant Messaging
Fake Anti-Virus Software
Mobile Devices
Friends and Relatives
HOW VIRUSES SPREAD
Email Attachments:
Viruses may be carried in attachments to email messages.
Rogue Websites:
Viruses may lurk on untrustworthy websites.
Clicking on them may infect your computer.
HOW VIRUSES SPREAD
Networks:
A computer may be infected through a network which
spreads from another computer connected to that same
network.
Keeping anti-virus software updated can help the situation.
Infected Boot Disks:
A virus can spread if an infected disk is in the hard drive and
you try to restart.
Know the origin of any media you use with your computer
system.
HOW VIRUSES SPREAD
Phishing Schemes:
These schemes try to get your personal information through
email messages pretending to be legitimate sites.
When you visit these sites, spyware, adware, and viruses are
automatically installed on your computer.
Infected Software:
Freeware or shareware may infect your computer system.
Only download from trusted sites.
HOW VIRUSES SPREAD
Hackers:
The best way to protect yourself is to have a firewall and up-
to-date anti-virus software installed.
Instant Messaging:
Hackers see it as an easy target to get people to click on
links.
Only chat with people you know.
Don’t follow links you don’t recognize.
HOW VIRUSES SPREAD
Fake Anti-Virus Software:
Only download anti-virus programs from trusted sites .
Mobile Devices:
Before you plug peripheral devices into your computer for
the first time, be sure your anti-virus software is up to date.
Friends and Relatives:
Viruses may come from family and friends’ email attachments
or from social media sites.
DO NOT open an attachment with a .exe or .dll extension.
PROTECTING YOUR COMPUTER
Just as you protect yourself from illness and
disease, there are ways you can cut the chances
of your computer systems being infected.
Install trusted anti-virus program
Install anti-spyware and malware programs
Avoid suspicious websites
Never open email attachments without scanning them first
Set up automatic scans
Watch your downloads
PROTECTING YOUR COMPUTER
Install updates coming from your operating system software
programs
Know what to look for
Stay away from Cracked Software
Install a Firewall
Be prepared to lock down
COMPUTER THEFT & PRIVACY
The most popular tech item to steal are Laptops which are then most
often sold.
Theft of personal information can also be stolen through unsecured use
of wireless services. Others may be able to access the files you have
open in these situations.
Use passwords to keep your files and information safe and to keep most people out of
your files.
View the 5 minute video on the importance of using strong passwords to help protect your
privacy.
Record at least three things you learned.
FIND OUT HOW SECURE YOUR PASSWORD IS BY
CLICKING THE IMAGE BELOW
COMPUTER THEFT & PRIVACY
Tips on Using Passwords from the Video:
Never write down your password; use unique
passwords
Use at least seven characters; use letters from a
phrase
Include punctuation or symbols; use upper and
lower case letters
HACKING
Hacking
Hacking means finding out weaknesses in a computer or computer network.
The term can also refer to someone with an advanced understanding of computers
and computer networks. Hackers may be motivated by a multitude of reasons, such
as profit, protest, or challenge. Their objective is to do damage or steal personal
information.
The Penalty
The federal punishment for hacking into computers ranges from a fine or
imprisonment depending upon the seriousness of the criminal activity and what
damage the hacker has done.
Hackers cost businesses money because of downtime and loss of
data
INTERNET CONTROLS
Types of controls for internet safety
Firewalls: Form a barrier between two networks
Filters: Control what can be viewed on Internet
Parental Controls: Software that allows parental
control over what kids do on the Internet
FREEWARE & SHAREWARE
Freeware
Copyrighted computer software which is made available for
use free of charge for an unlimited time.
Shareware Software
Is typically obtained free of charge, either by downloading
from the Internet or other source. A user may try it out for
a certain period of time without charge. There is an eventual
charge for this use of the program.
PLEASE COMPLETE THE ATTACHED
ASSIGNMENT:
VIRUSES & DESTRUCTIVE PROGRAMS
COMPUTER VIRUS
A computer virus is a computer program that can
replicate itself and spread from one computer to
another. The term "virus" is also commonly, but
erroneously, used to refer to other types of
malware, including but not limited to adware and
spyware programs that do not have a reproductive
ability.
TROJAN HORSE
A Trojan horse, or Trojan, is a type of
malware that masquerades as a legitimate file
or helpful program with the ultimate
purpose of granting a hacker unauthorized
access to a computer.
WORM
A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers. Often,
it uses a computer network to spread itself.
DICTIONARY ATTACK
A dictionary attack uses a targeted
technique of successively trying all the
words in an exhaustive list called a
dictionary to find out passwords on a
computer system.
FILE VIRUS
A type of computer virus that inserts
its malicious code into executable files
on a system.
MALWARE
Short for malicious software, software
designed specifically to damage or
disrupt a system, such as a virus or a
Trojan horse.
ADWARE
Adware is the common name used to
describe software that is given to the
user with advertisements embedded in
the application.
SPYWARE
Any software that
covertly gathers user
information through
the user's Internet
connection without
his or her knowledge,
usually for advertising
purposes.
FREEWARE VS. SHAREWARE
Freeware is software downloaded at no
charge to the user. There may be a
charge for Shareware after a trial
period.
PHISHING & SPOOFING ATTACKS
The act of sending an e-mail to a user falsely
claiming to be an established legitimate enterprise
in an attempt to scam the user into surrendering
private information that will be used for identity
theft.
SOCIAL ENGINEERING
In the realm of computers, the act of obtaining or
attempting to obtain otherwise secure data by
conning an individual into revealing secure
information. Social engineering is successful
because its victims innately want to trust other
people and are naturally helpful.
WAR DRIVING
The act of driving around in a vehicle
with a laptop computer, an antenna, and
an 802.11 wireless LAN adapter to
exploit existing wireless networks.
STUDY YOUR NOTES
TEST NEXT CLASS
PERIOD!