SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10
Malware ,[object Object],[object Object],[object Object],[object Object]
Purpose ,[object Object],[object Object],[object Object]
Bogus Link Example ,[object Object]
Bogus Chat Message ,[object Object]
How Computer Viruses Work ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Viruses & Spyware Spread ,[object Object],[object Object],[object Object]
How Spyware works on your Computer
Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention Tips ,[object Object],[object Object],[object Object]
Free Anti-Virus & Spyware Software ,[object Object],[object Object]
Creative Commons License ,[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 

Was ist angesagt? (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Ch 3 computer malware ppt
Ch 3 computer malware pptCh 3 computer malware ppt
Ch 3 computer malware ppt
 
Ppt123
Ppt123Ppt123
Ppt123
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer security
 
Malware
MalwareMalware
Malware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
spyware
spywarespyware
spyware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Computer virus
Computer virus Computer virus
Computer virus
 
Spyware
SpywareSpyware
Spyware
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 

Andere mochten auch (6)

Sektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak HaftasıSektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak Haftası
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Microsoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - AtidanMicrosoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - Atidan
 
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
 
John Aguirre, President
John Aguirre, PresidentJohn Aguirre, President
John Aguirre, President
 
Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 

Ähnlich wie 4 a module virus and spyware

Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Ähnlich wie 4 a module virus and spyware (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Virus
VirusVirus
Virus
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
What is malware
What is malwareWhat is malware
What is malware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Internet security
Internet securityInternet security
Internet security
 
Viruses
VirusesViruses
Viruses
 

Mehr von Rozell Sneede

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
Rozell Sneede
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
Rozell Sneede
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
Rozell Sneede
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
Rozell Sneede
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
Rozell Sneede
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
Rozell Sneede
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
Rozell Sneede
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
Rozell Sneede
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
Rozell Sneede
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
Rozell Sneede
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
Rozell Sneede
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
Rozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
Rozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
Rozell Sneede
 

Mehr von Rozell Sneede (20)

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
5 steps
5 steps5 steps
5 steps
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

4 a module virus and spyware

Hinweis der Redaktion

  1. And no, getting into the virus and spyware business is not a good idea. The Russian Mafia doesn’t like newcomers.  In the past most viruses were acts of vandalism. More and more, their purpose is financial.
  2. Have you heard the phrase there’s no such thing as a free lunch? Well, there’s also no such thing as a free iPad. Have you ever received a similar message? Maybe through email? Email and networking profiles get hijacked.
  3. Clues: Would your friend send a message like the ones in this chat? What is the top level domain of each link? Research it. Sending a non personalized message that encourages you to click on a link is a strategy of scammers. Be aware of their strategies.
  4. Strange as it may sound the computer virus is something of an age marvel on one hand viruses show us how vulnerable we are a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages . On the other hand they show us how sophisticated and interconnected human beings have really become. Viruses- For example a virus might attach itself to a program such as a spreadsheet program. Each time it runs the virus runs too. And it has the chance to reproduce by attaching to other program or wreak havoc! Email-and usually replicates itself by automatically mailing itself to dozens of people in the victims email address book. Trojan Horse- The program claims to do one thing ( it could even claim to be a game) but instead does damage when you run it ( it may erase your hard disk). Trojan Horses have no way to replicate automatically. Worms- a copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there as well.
  5. Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Perhaps  spyware  is to blame. Spyware is a category of computer programs that attach themselves to your  operating system  in nefarious ways. They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware.Here are some of the general ways in which spyware finds its way into your computer: Piggybacked software installation  - Some applications -- particularly  peer-to-peer file-sharing clients  -- will install spyware as a part of their standard installation procedure. If you don't read the installation list closely, you might not notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as alternatives to software you have to buy. As the old saying goes, there's no such thing as a free lunch. Drive-by download  - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would be your browser's standard message telling you the name of the software and asking if it's okay to install it. If your security settings are set low enough, you won't even get the warning. Browser add-ons  - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they'll do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered  browser hijackers  -- these embed themselves deeply in your machine and take quite a bit of work to get rid of. Masquerading as anti-spyware  -- This is one of the cruelest tricks in the book. This type of software convinces you that it's a tool to detect and remove spyware. At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging  RAM  and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser's home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your  search engine  practically useless. It can also modify the dynamically linked libraries (DLLs) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose. At its very worst, spyware can record the words you type, your Web browsing history, passwords and other private information. The point of all this from the spyware makers' perspective isn't always clear. One reason it's used is to pad advertisers' Web traffic statistics. If they can force your computer to show you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product. Another use of spyware is to steal affiliate credits. Major shopping sites like  Amazon  and  eBay  offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture your requests to view sites like Amazon and eBay and then take the credit for sending you there. Malware  -- a general term for any program that makes changes (does malicious or "bad" things) without your express permission Adware  -- programs designed specifically to deliver unrequested advertising Stealware  -- specific spyware designed to capture clicks or Web-site referral credits Browser hijacker  -- a malicious program that becomes deeply embedded in your browser's code and core functionality  
  6. Software updates often include security updates. The companies fix security holes as they learn of them. Use a spyware scanner. Use a pop-up blocker. Disable Active-X. Be suspicious of installing new software Use the "X" to close pop-up windows.
  7. If you will be participating in HomeConnect, you will learn more about virus and spyware software in the Computer Maintenance class.