1 / 14

By : Rishika , Autumn and Melissa

Computer and other malware. By : Rishika , Autumn and Melissa. http://www.youtube.com/watch?y=c34QwtY40g. Virus ?. . Viruses are small pieces of software .They attach themselves to programs and stay there .When the program runs the virus runs too

Download Presentation

By : Rishika , Autumn and Melissa

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer and other malware By : Rishika ,Autumn and Melissa http://www.youtube.com/watch?y=c34QwtY40g

  2. Virus ? .Viruses are small pieces of software .They attach themselves to programs and stay there .When the program runs the virus runs too .They reproduce and spread to other files .You can send them to other people accidentally .They can steal and/or delete your files/information .Security programs can delete viruses

  3. Viral history is a mystery • 10 most destructive and popular virus : (1999-2010) • Stuxnet(Malware) • Conficker (Virus) • Agent (Malware) • Zeus (Malware) • PoisonIvy(Malware) • Storm (Worm) • Sasser (Worm) • Nimda virus • Morris (worm) • Conflicker(Malware)

  4. The Trojan horse • A Trojan horse is a computer virus, that looks like another file or document on your computer. • This a evil and 1 of the most popular computer virus. • There is a good part about this famous virus it doesn’t duplicate itself • There is one and only but just one is destructive enough. • This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software . • This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.

  5. Computer Worms What Is It? A malware computer program Can independently replicate itself Independently sends copies of itself; Using a computer network

  6. Computer Worms How are they Spread? • MS outlook services • Immediate contact to SMTP servers • Through SMTP API of their own • Windows MAPI functions

  7. Computer Worms What are the Different Kinds of Worms? • Instant Messaging worms • Internet worms • IRC worms • File Sharing Network worms

  8. adware attacks .Happen mostly when online .Usually don’t notice until it’s too late .Virus attaches to your hard drive .Attach instantly and go through your files .Often disguised as adware protection

  9. Spam: What is it? message sent to a group of people Same message Large group On the internet

  10. Virus protection How can you Protect your Computer? 1) Firewall Prevents malware or malicious software from gaining access to it 2) Virus Protection Protects against viruses and other security threats

  11. Virus protection 3) Spyware and other malware protection -antispyware software -Protects against spyware

  12. Upgrades & Purchases Upgrades: -once a week -automatically or manually Where to purchase protection: -purchase at a computer retail store -Ex: Future Shop, Apple, etc.

  13. Rootkits • Provides a root/path for hackers • Allows hackers to access your network • Hackers install hidden programs on your computer • They can access your data and personal information • You usually don’t even notice • .Rootkits don’t go away on their own • You need to look into security software • They will give you helpful options

  14. bibliography • http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF-8&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ • http://images.google.ca/ • http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html?c=y&page=2 • http://www.worsetech.com/hack/hacker-attack/top-5-most-deadly-viruses-1102431.html • http://en.wikipedia.org/wiki/Rootkit • http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__internet_surfing__adware_infection.html

More Related