SlideShare a Scribd company logo
1 of 28
COMPUTER MALWARE
[object Object],[object Object]
In the following slides + a series of short videos,we will explore exactly what types of computer Malware exist, and how you can protect your computer from them.
*A computer virus is a piece of malicious computer code that  attaches itself to a software program, email or computer file  without your permission.*It can damage your software, hardware and files. They are generally spread via email attachments or Internet downloads. They run without your knowledge. A Basic Definition of a Computer Virus VIDEO What is a Computer Virus
TROJANS *This is an average computer program that says it will do one thing [it says can it is a game, calendar, weather monitor],*But instead when you run the program it damages your computer.
RATS - Remote  Access Trojans ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Large groups of computers that criminals control that are used to overwhelm servers with messages, or spread viruses and spyware. Zombie Armies or BOTNETS VIDEO ON BOTNETS
WORMS *  A piece of computer code that is able to send itself to many computers by taking control of a computers ability to transport files and information.  They get into your computer via email. *Worms multiply and use up a computers memory causing the computer to stop. They can now also cause damage to your computer.
 
Trojan Horses and Worms are both considered to be Viruses. What do Trojans and Worms have in Common? They both   multiply, and spread themselves to other computers and can cause damage.  What makes Trojans and Worms different? Trojans   get into your computer via a program  then  damage and destroy programs and files-  .   Worms   get into your computer usually via email  and can damage your computer or cause a computer to  stop  by multiplying and using up all a computers memory VIRUS/WORM VIDEO
Trojan Worm Spread to other computers Destroy files and programs. Enter via a program Can damage your computers files and Multiply, take up your computers  memory and stops your computer. Enter via email.
What is a Logic Bomb? A Logic Bomb starts when a specific event occurs. It can perform a variety of malicious tasks such as releasing a virus, worm or other code to attack a system. In and of itself it cannot cause physical damage to any of the computer components.
What is Spyware? Spyware downloads into your computer without you knowing that.  It can collect personal information about you such as passwords, credit card numbers and web sites you visit, and transmit this to a third party.  It can also change the configuration of your computer, or put advertisements on your computer. SPYWARE  VIDEO
What is Adware? Software that displays banners or pop-up ads on your computer.  It downloads to your computer when you access certain Internet sites, or when you agree to download it when using certain freeware or shareware.  Adware can contain Spyware. It could track your files and where you surf on the Internet and report this information back to a third party.
What is Spam? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VIDEO: SPAM
What is Phishing? This is another way hackers try to get personal information from you. They use email to do this. They send you a fake request acting like it is from a bank, or other institution asking for personal information. You click a link in the email and it takes you to a fake website imitating the institution. If you give your personal information it can result in Identity Theft. VIDEO: PHISHING
What is a Browser Hijacker? *A program that puts itself as your browsers’ home page.  *It often shows ads for pornography and adds pornography bookmarks.  *It does NOT damage your computer. Using the free program “Browser Hijack” will stop this form of Malware.
What is a Hoax? *A fake computer message or chain letter. It comes via email. They are written for one purpose- to be sent to everyone you know. They can be a warning for a new virus, or ask you to forward the email to all your friends in the name of a fictitious cause, or promote a moneymaking scheme.  Some hoaxes tell you that you must delete certain files on your computer or it will stop working. * If  you delete those files your computer may really stop working.
Hello Disney fans, And thank you for signing up for Bill Gates' Beta Email Tracking.  My name is Walt Disney Jr. Here at Disney we are working with Microsoft which has just compiled an e-mail tracing program that tracks everyone to whom this message is forwarded to. It does this through an unique IP (Internet Protocol) address log book database. We are experimenting with this and need your help. Forward this to everyone you know and if it reaches 13,000 people, 1,300 of the people on the list will receive $5,000, and the rest will receive a free trip for two to Disney World for one week during the summer of 1999 at our expense. Enjoy. Note: Duplicate entries will not be counted. You will be notified by email with further instructions once this email has reached 13,000 people. Your friends, Walt Disney Jr., Disney, Bill Gates & The Microsoft Development Team.  Example of a non-threatening Hoax Link to  Other Hoaxes
What is Social Engineering? The use of social tricks or psychology to gain access to secured systems.  The goal is to trick people into revealing passwords and other information.  An example is when a hacker calls a company pretending to be an employee in order to learn secrets about an internal network.  Sometimes this method is used in emails, such as a title ‘You have Won a Prize’ and in the email they want  you to reveal personal information that might gain them access to your bank accounts, etc.
What is Antivirus software? Software that detects viruses coming into your computer and attempts to get rid of them. This HELPS your computer.
Some ways to Avoid Viruses: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Avoiding Viruses continued.. ,[object Object],What is a Firewall? ,[object Object],[object Object],[object Object],[object Object],[object Object],VIDEO  ON FIREWALLS/HACKERS
Example of Firewall Program [Zone Alarm] protecting a PC
Some ways to Avoid Spyware: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safe Computing Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VIDEO: PRIVACY
Passwords You use Passwords to log in to your accounts on the Internet. Criminals would love to get a hold of yours so they could pretend to be you and do online transactions as you. Creating strong passwords is Very Important for your Internet Security. Refer to the handout “Strong Passwords: How to Create and Use Them” and see some examples in this video
Being Cautious And Observant Will Help you Avoid Computer Malware!

More Related Content

What's hot

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 

What's hot (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security
Computer securityComputer security
Computer security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Malware and security
Malware and securityMalware and security
Malware and security
 
MALWARE
MALWAREMALWARE
MALWARE
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Viewers also liked

Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 

Viewers also liked (7)

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Malware
MalwareMalware
Malware
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Malware
Malware Malware
Malware
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 

Similar to Computer Malware

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

Similar to Computer Malware (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Sowmya
SowmyaSowmya
Sowmya
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 

Recently uploaded

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

Computer Malware

  • 2.
  • 3. In the following slides + a series of short videos,we will explore exactly what types of computer Malware exist, and how you can protect your computer from them.
  • 4. *A computer virus is a piece of malicious computer code that attaches itself to a software program, email or computer file without your permission.*It can damage your software, hardware and files. They are generally spread via email attachments or Internet downloads. They run without your knowledge. A Basic Definition of a Computer Virus VIDEO What is a Computer Virus
  • 5. TROJANS *This is an average computer program that says it will do one thing [it says can it is a game, calendar, weather monitor],*But instead when you run the program it damages your computer.
  • 6.
  • 7. Large groups of computers that criminals control that are used to overwhelm servers with messages, or spread viruses and spyware. Zombie Armies or BOTNETS VIDEO ON BOTNETS
  • 8. WORMS * A piece of computer code that is able to send itself to many computers by taking control of a computers ability to transport files and information. They get into your computer via email. *Worms multiply and use up a computers memory causing the computer to stop. They can now also cause damage to your computer.
  • 9.  
  • 10. Trojan Horses and Worms are both considered to be Viruses. What do Trojans and Worms have in Common? They both multiply, and spread themselves to other computers and can cause damage. What makes Trojans and Worms different? Trojans get into your computer via a program then damage and destroy programs and files- . Worms get into your computer usually via email and can damage your computer or cause a computer to stop by multiplying and using up all a computers memory VIRUS/WORM VIDEO
  • 11. Trojan Worm Spread to other computers Destroy files and programs. Enter via a program Can damage your computers files and Multiply, take up your computers memory and stops your computer. Enter via email.
  • 12. What is a Logic Bomb? A Logic Bomb starts when a specific event occurs. It can perform a variety of malicious tasks such as releasing a virus, worm or other code to attack a system. In and of itself it cannot cause physical damage to any of the computer components.
  • 13. What is Spyware? Spyware downloads into your computer without you knowing that. It can collect personal information about you such as passwords, credit card numbers and web sites you visit, and transmit this to a third party. It can also change the configuration of your computer, or put advertisements on your computer. SPYWARE VIDEO
  • 14. What is Adware? Software that displays banners or pop-up ads on your computer. It downloads to your computer when you access certain Internet sites, or when you agree to download it when using certain freeware or shareware. Adware can contain Spyware. It could track your files and where you surf on the Internet and report this information back to a third party.
  • 15.
  • 16. What is Phishing? This is another way hackers try to get personal information from you. They use email to do this. They send you a fake request acting like it is from a bank, or other institution asking for personal information. You click a link in the email and it takes you to a fake website imitating the institution. If you give your personal information it can result in Identity Theft. VIDEO: PHISHING
  • 17. What is a Browser Hijacker? *A program that puts itself as your browsers’ home page. *It often shows ads for pornography and adds pornography bookmarks. *It does NOT damage your computer. Using the free program “Browser Hijack” will stop this form of Malware.
  • 18. What is a Hoax? *A fake computer message or chain letter. It comes via email. They are written for one purpose- to be sent to everyone you know. They can be a warning for a new virus, or ask you to forward the email to all your friends in the name of a fictitious cause, or promote a moneymaking scheme. Some hoaxes tell you that you must delete certain files on your computer or it will stop working. * If you delete those files your computer may really stop working.
  • 19. Hello Disney fans, And thank you for signing up for Bill Gates' Beta Email Tracking. My name is Walt Disney Jr. Here at Disney we are working with Microsoft which has just compiled an e-mail tracing program that tracks everyone to whom this message is forwarded to. It does this through an unique IP (Internet Protocol) address log book database. We are experimenting with this and need your help. Forward this to everyone you know and if it reaches 13,000 people, 1,300 of the people on the list will receive $5,000, and the rest will receive a free trip for two to Disney World for one week during the summer of 1999 at our expense. Enjoy. Note: Duplicate entries will not be counted. You will be notified by email with further instructions once this email has reached 13,000 people. Your friends, Walt Disney Jr., Disney, Bill Gates & The Microsoft Development Team. Example of a non-threatening Hoax Link to Other Hoaxes
  • 20. What is Social Engineering? The use of social tricks or psychology to gain access to secured systems. The goal is to trick people into revealing passwords and other information. An example is when a hacker calls a company pretending to be an employee in order to learn secrets about an internal network. Sometimes this method is used in emails, such as a title ‘You have Won a Prize’ and in the email they want you to reveal personal information that might gain them access to your bank accounts, etc.
  • 21. What is Antivirus software? Software that detects viruses coming into your computer and attempts to get rid of them. This HELPS your computer.
  • 22.
  • 23.
  • 24. Example of Firewall Program [Zone Alarm] protecting a PC
  • 25.
  • 26.
  • 27. Passwords You use Passwords to log in to your accounts on the Internet. Criminals would love to get a hold of yours so they could pretend to be you and do online transactions as you. Creating strong passwords is Very Important for your Internet Security. Refer to the handout “Strong Passwords: How to Create and Use Them” and see some examples in this video
  • 28. Being Cautious And Observant Will Help you Avoid Computer Malware!