SlideShare uma empresa Scribd logo
1 de 3
Computer Viruses
Understanding Risks and Prevention


4/6/2012

Robert Wayman




                        Page 1
Viruses 101

A computer virus, unlike a human virus, does not occur naturally, but is deliberately
created by an individual who is intent on wreaking havoc. It is an actively infectious
program that attaches itself to other files and has the ability to alter the way your
computer works without your permission. The virus may or may not announce itself.
Once a computer is infected, some or all of the application programs may slow
significantly or cease working altogether. Unusual error messages may appear on your
screen and/or you may run out of memory or disk space. The machine may reboot
continually and/or files can become corrupted or can be completely erased.

    We often use the term virus to identify any type of malevolent code that adversely
affects our computer, when in fact what we are dealing with is not a virus, but a Trojan
horse or a worm. A Trojan horse is a file that presents itself as something desirable, but in
fact is harmful. For example, it may claim to be a useful utility program or game, but
when executed causes data to become corrupted and/or erased. It differs from a virus in
that viruses are programmed to replicate themselves, whereas, Trojan horses do not. They
typically are spread through email or downloading files from the Internet.

   A worm is a program that, like a virus, is written to replicate itself, but unlike a virus,
does not have to attach itself to other programs in order to reproduce. Rather, the worm
uses holes in the operating system and in network security to replicate itself throughout a
network. Because it can travel through a network so quickly, a
worm’s damage potential is significant and worms have been
known to clog Internet bandwidth and bring down hundreds, if not
thousands, of computers in very short periods of time.

    The best way to protect your system from these threats is
through the installation of an antivirus program that can
automatically detect a virus, Trojan horse, or worm should it
threaten your system. Many such programs are available, but their
effectiveness depends on continual updating since new threats appear all the time. The
software vendor typically includes a limited subscription to automatic updates to detect
new viruses. Once the subscription expires, however, it is incumbent on you to renew it.

    Viruses are often spread through ignorance or sheer laziness. Students may say that
they do not have the time to update their antivirus program and/or that they cannot afford
the cost of the update. If you are prone to think this way, ask yourself how much time
will it take to reformat your hard drive if a virus destroys your system. What if the virus
permanently destroys an important document such as the term paper you need to
graduate? What is the value of your time and/or your documents?




                                           Page 2
The Essence of Backup

It’s not a question of if it will happen, but when — hard disks die, files are lost, or viruses
may infect a system. It has happened to us and it will happen to you, but you can prepare
for the inevitable by creating adequate backup before the problem occurs. The essence of
a backup strategy is to decide which files to backup, how often to do the backup, and
where to keep the backup.
     Our strategy is very simple — backup what you can’t afford to lose every time the
data changes. Store the backup away from your computer; e.g., e-mail the file to yourself
as an attachment. You need not copy every file, every day. Instead, copy just the files that
changed during the current session. Realize, too, that it is much more important to back
up your data files than your program files. You can always reinstall the application from
the original disks or CD, or if necessary, go the vendor for another copy of an
application. You, however, are the only one who has a copy of the term paper that is due
tomorrow. Once you decide on a strategy, follow it, and follow it faithfully! Show that
you understand the nature of backup by answering the following questions:

   Which files should be backed up?
   How often should the backup be performed?
   Where should the backup files be stored?
   Should you trust anyone else to do the backup for you?




                                           Page 3

Mais conteúdo relacionado

Mais procurados

Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 

Mais procurados (19)

Antivirus
AntivirusAntivirus
Antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
False alarms
False alarmsFalse alarms
False alarms
 
Virus
VirusVirus
Virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Sowmya
SowmyaSowmya
Sowmya
 
False alarms
False alarmsFalse alarms
False alarms
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Tips to avoid malware
Tips to avoid malwareTips to avoid malware
Tips to avoid malware
 

Semelhante a W01p2virus wayman robert

A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
UltraUploader
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

Semelhante a W01p2virus wayman robert (20)

Computer virus
Computer virus Computer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computervirus
Computervirus Computervirus
Computervirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation2
Presentation2Presentation2
Presentation2
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus project
Virus projectVirus project
Virus project
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Mais de robsworld

Mais de robsworld (9)

Presentation1 wayman robert
Presentation1 wayman robertPresentation1 wayman robert
Presentation1 wayman robert
 
E04m2credit wayman robert
E04m2credit wayman robertE04m2credit wayman robert
E04m2credit wayman robert
 
Resume
ResumeResume
Resume
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
W01m1heart wayman robert
W01m1heart wayman robertW01m1heart wayman robert
W01m1heart wayman robert
 
Recoverying lost customers
Recoverying lost customersRecoverying lost customers
Recoverying lost customers
 
Recoverying lost customers
Recoverying lost customersRecoverying lost customers
Recoverying lost customers
 
Listening to your customer
Listening to your customerListening to your customer
Listening to your customer
 
Website reveiws
Website reveiwsWebsite reveiws
Website reveiws
 

Último

Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
gajnagarg
 
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
HyderabadDolls
 
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
yynod
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
gynedubai
 
K Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CVK Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CV
K VENKAT NAVEEN KUMAR
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
nirzagarg
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
deejay178
 

Último (20)

Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
 
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
 
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
 
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstings
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
K Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CVK Venkat Naveen Kumar | GCP Data Engineer | CV
K Venkat Naveen Kumar | GCP Data Engineer | CV
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak Kumar
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
 

W01p2virus wayman robert

  • 1. Computer Viruses Understanding Risks and Prevention 4/6/2012 Robert Wayman Page 1
  • 2. Viruses 101 A computer virus, unlike a human virus, does not occur naturally, but is deliberately created by an individual who is intent on wreaking havoc. It is an actively infectious program that attaches itself to other files and has the ability to alter the way your computer works without your permission. The virus may or may not announce itself. Once a computer is infected, some or all of the application programs may slow significantly or cease working altogether. Unusual error messages may appear on your screen and/or you may run out of memory or disk space. The machine may reboot continually and/or files can become corrupted or can be completely erased. We often use the term virus to identify any type of malevolent code that adversely affects our computer, when in fact what we are dealing with is not a virus, but a Trojan horse or a worm. A Trojan horse is a file that presents itself as something desirable, but in fact is harmful. For example, it may claim to be a useful utility program or game, but when executed causes data to become corrupted and/or erased. It differs from a virus in that viruses are programmed to replicate themselves, whereas, Trojan horses do not. They typically are spread through email or downloading files from the Internet. A worm is a program that, like a virus, is written to replicate itself, but unlike a virus, does not have to attach itself to other programs in order to reproduce. Rather, the worm uses holes in the operating system and in network security to replicate itself throughout a network. Because it can travel through a network so quickly, a worm’s damage potential is significant and worms have been known to clog Internet bandwidth and bring down hundreds, if not thousands, of computers in very short periods of time. The best way to protect your system from these threats is through the installation of an antivirus program that can automatically detect a virus, Trojan horse, or worm should it threaten your system. Many such programs are available, but their effectiveness depends on continual updating since new threats appear all the time. The software vendor typically includes a limited subscription to automatic updates to detect new viruses. Once the subscription expires, however, it is incumbent on you to renew it. Viruses are often spread through ignorance or sheer laziness. Students may say that they do not have the time to update their antivirus program and/or that they cannot afford the cost of the update. If you are prone to think this way, ask yourself how much time will it take to reformat your hard drive if a virus destroys your system. What if the virus permanently destroys an important document such as the term paper you need to graduate? What is the value of your time and/or your documents? Page 2
  • 3. The Essence of Backup It’s not a question of if it will happen, but when — hard disks die, files are lost, or viruses may infect a system. It has happened to us and it will happen to you, but you can prepare for the inevitable by creating adequate backup before the problem occurs. The essence of a backup strategy is to decide which files to backup, how often to do the backup, and where to keep the backup. Our strategy is very simple — backup what you can’t afford to lose every time the data changes. Store the backup away from your computer; e.g., e-mail the file to yourself as an attachment. You need not copy every file, every day. Instead, copy just the files that changed during the current session. Realize, too, that it is much more important to back up your data files than your program files. You can always reinstall the application from the original disks or CD, or if necessary, go the vendor for another copy of an application. You, however, are the only one who has a copy of the term paper that is due tomorrow. Once you decide on a strategy, follow it, and follow it faithfully! Show that you understand the nature of backup by answering the following questions: Which files should be backed up? How often should the backup be performed? Where should the backup files be stored? Should you trust anyone else to do the backup for you? Page 3