120 likes | 268 Views
Security Threat. By: Zach Brodsky. A Software Research and Microsoft PowerPoint Lab. Instructor: Jason Long Class: IST 110 Author: Zach Brodsky Date:5/28/09. Objectives. Select two examples of security topics (i.e. type of viruses, type of worms, etc.)
E N D
Security Threat By: Zach Brodsky
A Software Research and Microsoft PowerPoint Lab • Instructor: Jason Long • Class: IST 110 • Author: Zach Brodsky • Date:5/28/09
Objectives • Select two examples of security topics (i.e. type of viruses, type of worms, etc.) • Explain the threat and how you get it • Explain how you remove the threat
Computer Virus • Computer virus attaches itself to a program or file • Spreads from one computer to another (in a form of executable code) • Needs to have a human aspect to spread by being sent over a network, Internet, or a removable medium • Removable medium: CD, DVD, USB Drive
Worm • Considered to be a subclass of virus • Can replicate itself and be sent out hundreds or thousands of times • Example: sends out copy to your address book, copies itself and sends to everyone in their address book and so on • Worm consumes too much system memory and causes servers to stop responding • Different from viruses because it exploits security vulnerabilities to be sent to other computers without a human aspect
Trojan Horses • Program that looks like it is useful software but it will cause damage once it is ran or installed • Opens a backdoor which allows other users to access your computer • Different than virus and worm because it doesn’t replicate itself or reproduce by infecting other files
Bot (Zombie) • Type of malware that allows an attacker to gain control of computer • DoS attacks against websites and phishing • Denys access to different websites • Hide in your computer • Have names similar to system file names and processes • Different because authors of bots always update the bot to avoid antivirus software
Spyware • Collects information about user without the user being aware • Could also install additional software and redirect Web browser activity • Slows computers • Different viruses and worms: doesn’t replicate itself
Security Topics • Email Worm: infected email can include links or attachments. • Click on link or download attachment to get the worm. • For information and steps to remove an email worm use the following website: • http://antivirus.about.com/library/weekly/aa091801c.htm
Security Topics cont. • Remote Access Trojan: Provides attacker with complete control of victim’s system • Hidden in games or other small programs • Use the below site to download an Automatic Remote Access Trojan Removal • http://www.2-spyware.com/remove-remote-access-trojan-0-2a.html
Conclusion • Viruses need a human aspect to be sent across networks • Worms replicate themselves • Trojan horses disguise themselves as harmless programs • Spyware collects information about unaware users
Bibliography • http://en.wikipedia.org/wiki/Computer_virus • http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp • http://en.wikipedia.org/wiki/Spyware#Spyware.2C_virus_and_worm • http://netsecurity.about.com/od/frequentlyaskedquestions/qt/pr_bot.htm • http://antivirus.about.com/od/securitytips/a/emailsafety.htm • http://antivirus.about.com/library/weekly/aa091801c.htm • http://www.webopedia.com/TERM/R/Remote_Access_Trojan.html