Unit 6 Viruses & Destructive Programs

Download Report

Transcript Unit 6 Viruses & Destructive Programs

VIRUSES & DESTRUCTIVE
PROGRAMS
UNIT 6 DIGITAL LITERACY STUDY
S3 OBJ 2-2
COMPUTER VIRUS
 A Virus is a computer program written to alter the way a
computer operates without the permission or knowledge of the
user.
 Viruses can either be considered a Nuisance or Destructive.
 They can
 Corrupt files
 Destroy data
 Display irritating messages
 Corrupt computer systems
 Some viruses replicate themselves which means that they copy
themselves over and over.
TYPES OF VIRUSES
 Not all computer viruses behave, replicate, or infect the same way.
There are several different categories of viruses and malware.
 Trojan Horse
 Worms
 Bootsector Virus
 Macro Virus
 Memory Resident Viruses
 Rootkit Virus
 Polymorphic Viruses
 Logic Bombs/Time Bombs
TYPES OF VIRUSES
Trojan Horse:
 Has the appearance of having a useful and desired function.
 Program performs undesired functions secretly.
 Does not replicate itself.
Worms:
 A program that replicates itself in order to spread from one
computer to another.
TYPES OF VIRUSES
Bootsector Virus:
 Attaches itself to the first part of the hard disk that is read by
the computer during the bootup process.
Macro Virus:
 Uses another application’s macro programming language to
distribute themselves.
 They infect documents such as MS Word, Excel, etc.
TYPES OF VIRUSES
Memory Resident Viruses:
 Viruses that reside in a computer’s RAM.
 They stay in the memory after the initiating program closes.
Rootkit Virus:
 An undetectable virus which attempts to allow someone to
gain control of a computer system.
 Disguised as operating system files.
TYPES OF VIRUSES
Polymorphic Viruses:
 Copies itself by creating multiple files of itself.
 It changes its signature making it hard for antivirus software
to detect.
Logic Bombs/Time Bombs:
 Programmed to initiate at a specific date or when a specific
event occurs.
SPREADING VIRUSES
 Viruses spread because people distribute infected files by exchanging
disks and CDs, sending e-mail attachments, and downloading files from
the Internet.
 Viruses attach themselves to files with .exe, .com, or .vbs filename
extensions
 When you open the infected file, the virus opens and waits to infect the
next program you run or disk you use.
 Viruses have the ability to lurk in a computer for days or months,
quietly replicating (copying) themselves.
 You may not even know your computer has a virus, thus making it
easier to spread the virus.
HOW VIRUSES SPREAD
 Email Attachments
 Rogue Websites
 Networks
 Infected Boot Disks
 Phishing Schemes
 Infected Software
 Hackers
 Instant Messaging
 Fake Anti-Virus Software
 Mobile Devices
 Friends and Relatives
HOW VIRUSES SPREAD
Email Attachments:
 Viruses may be carried in attachments to email messages.
Rogue Websites:
 Viruses may lurk on untrustworthy websites.
 Clicking on them may infect your computer.
HOW VIRUSES SPREAD
Networks:
 A computer may be infected through a network which
spreads from another computer connected to that same
network.
 Keeping anti-virus software updated can help the situation.
Infected Boot Disks:
 A virus can spread if an infected disk is in the hard drive and
you try to restart.
 Know the origin of any media you use with your computer
system.
HOW VIRUSES SPREAD
Phishing Schemes:
 These schemes try to get your personal information through
email messages pretending to be legitimate sites.
 When you visit these sites, spyware, adware, and viruses are
automatically installed on your computer.
Infected Software:
 Freeware or shareware may infect your computer system.
 Only download from trusted sites.
HOW VIRUSES SPREAD
Hackers:
 The best way to protect yourself is to have a firewall and up-
to-date anti-virus software installed.
Instant Messaging:
 Hackers see it as an easy target to get people to click on
links.
 Only chat with people you know.
 Don’t follow links you don’t recognize.
HOW VIRUSES SPREAD
Fake Anti-Virus Software:
 Only download anti-virus programs from trusted sites .
Mobile Devices:
 Before you plug peripheral devices into your computer for
the first time, be sure your anti-virus software is up to date.
Friends and Relatives:
 Viruses may come from family and friends’ email attachments
or from social media sites.
 DO NOT open an attachment with a .exe or .dll extension.
PROTECTING YOUR COMPUTER
 Just as you protect yourself from illness and
disease, there are ways you can cut the chances
of your computer systems being infected.
 Install trusted anti-virus program
 Install anti-spyware and malware programs
 Avoid suspicious websites
 Never open email attachments without scanning them first
 Set up automatic scans
 Watch your downloads
PROTECTING YOUR COMPUTER
 Install updates coming from your operating system software
programs
 Know what to look for
 Stay away from Cracked Software
 Install a Firewall
 Be prepared to lock down
COMPUTER THEFT & PRIVACY
 The most popular tech item to steal are Laptops which are then most
often sold.
 Theft of personal information can also be stolen through unsecured use
of wireless services. Others may be able to access the files you have
open in these situations.
 Use passwords to keep your files and information safe and to keep most people out of
your files.
 View the 5 minute video on the importance of using strong passwords to help protect your
privacy.
 Record at least three things you learned.
FIND OUT HOW SECURE YOUR PASSWORD IS BY
CLICKING THE IMAGE BELOW
COMPUTER THEFT & PRIVACY
Tips on Using Passwords from the Video:
 Never write down your password; use unique
passwords
 Use at least seven characters; use letters from a
phrase
 Include punctuation or symbols; use upper and
lower case letters
HACKING
 Hacking
 Hacking means finding out weaknesses in a computer or computer network.
 The term can also refer to someone with an advanced understanding of computers
and computer networks. Hackers may be motivated by a multitude of reasons, such
as profit, protest, or challenge. Their objective is to do damage or steal personal
information.
 The Penalty
 The federal punishment for hacking into computers ranges from a fine or
imprisonment depending upon the seriousness of the criminal activity and what
damage the hacker has done.
 Hackers cost businesses money because of downtime and loss of
data
INTERNET CONTROLS
Types of controls for internet safety
 Firewalls: Form a barrier between two networks
 Filters: Control what can be viewed on Internet
 Parental Controls: Software that allows parental
control over what kids do on the Internet
FREEWARE & SHAREWARE
Freeware
 Copyrighted computer software which is made available for
use free of charge for an unlimited time.
Shareware Software
 Is typically obtained free of charge, either by downloading
from the Internet or other source. A user may try it out for
a certain period of time without charge. There is an eventual
charge for this use of the program.
PLEASE COMPLETE THE ATTACHED
ASSIGNMENT:
VIRUSES & DESTRUCTIVE PROGRAMS
COMPUTER VIRUS
A computer virus is a computer program that can
replicate itself and spread from one computer to
another. The term "virus" is also commonly, but
erroneously, used to refer to other types of
malware, including but not limited to adware and
spyware programs that do not have a reproductive
ability.
TROJAN HORSE
A Trojan horse, or Trojan, is a type of
malware that masquerades as a legitimate file
or helpful program with the ultimate
purpose of granting a hacker unauthorized
access to a computer.
WORM
A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers. Often,
it uses a computer network to spread itself.
DICTIONARY ATTACK
A dictionary attack uses a targeted
technique of successively trying all the
words in an exhaustive list called a
dictionary to find out passwords on a
computer system.
FILE VIRUS
A type of computer virus that inserts
its malicious code into executable files
on a system.
MALWARE
Short for malicious software, software
designed specifically to damage or
disrupt a system, such as a virus or a
Trojan horse.
ADWARE
Adware is the common name used to
describe software that is given to the
user with advertisements embedded in
the application.
SPYWARE
Any software that
covertly gathers user
information through
the user's Internet
connection without
his or her knowledge,
usually for advertising
purposes.
FREEWARE VS. SHAREWARE
Freeware is software downloaded at no
charge to the user. There may be a
charge for Shareware after a trial
period.
PHISHING & SPOOFING ATTACKS
The act of sending an e-mail to a user falsely
claiming to be an established legitimate enterprise
in an attempt to scam the user into surrendering
private information that will be used for identity
theft.
SOCIAL ENGINEERING
In the realm of computers, the act of obtaining or
attempting to obtain otherwise secure data by
conning an individual into revealing secure
information. Social engineering is successful
because its victims innately want to trust other
people and are naturally helpful.
WAR DRIVING
The act of driving around in a vehicle
with a laptop computer, an antenna, and
an 802.11 wireless LAN adapter to
exploit existing wireless networks.
STUDY YOUR NOTES
TEST NEXT CLASS
PERIOD!