SlideShare ist ein Scribd-Unternehmen logo
1 von 9
The Effects of Malware on Computers ANONYMOUS English 151 WC April 26th 2011
Subtopic #1 – “Introduction of Malware” Have you ever had this happen to you? A sudden decrease in your operating system with no explanation? Pop ups and ads even though you don’t have any web browser open? Unauthorized programs are being installed onto your computer? You notice that your computer is using more of it’s resources than usual? If so – you might be a victim of malware!
Subtopic #1 – “Introduction of Malware” So what is malware, anyway? Software designed to cause harm or gain unauthorized access to one’s computer. Also known as: Viruses Spyware Bloatware Botnets Rootkits Scareware
Subtopic #1 – “Introduction of Malware” History of Malware 1970 - 1990 History of Malware 1990-present day 1971 – “Creeper Virus” is introduced. 1974 – The “Rabbit” Virus. 1981 – “Elk Cloner” the first major virus for the Apple II personal computer. 1987 – The “Vienna Virus” is the first virus that actually destroys data. 1990 – “Chameleon” becomes the first virus that can purposely hide itself from it’s victim. 1998 – “HLLP.DeTroi” becomes the first virus to relay compromised passwords to the creators. 2001 – “E-mail and Websites” become the number one “honey pot” for malware. 2003 – “Slammer” infects the actual memory of computer systems to decrease the performance.
Subtopic #2 – “Effects of Malware on Computers in the Present Day” “As computers become more advanced in what they are capable of, the effects of malware is always changing to fit the agenda of its creator.”
Subtopic #2 – “Effects of Malware on Computers in the Present Day” Types of Malware: Insert info here. Insert info here. Insert info here. Insert info here. Insert info here.
Subtopic #3 – “The Victims of Malware” What are users doing to prevent malware from gaining unauthorized access to their computers? What can you do?
Subtopic #3 – “Future of Malware” What is the current growing concern for the effects of malware?  What might be in store for the future, and what can we do to protect ourselves?
Subtopic #3 – “Conclusion” What do I think?

Weitere Àhnliche Inhalte

Was ist angesagt?

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Virus
VirusVirus
VirusCHITRA S
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsJeremy Flores
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virusJesus Obenita Jr.
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virussmithz
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prezStudio Sheen
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 

Was ist angesagt? (20)

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Internet threat
Internet threatInternet threat
Internet threat
 
Sowmya
SowmyaSowmya
Sowmya
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Malware
MalwareMalware
Malware
 
C 7
C 7C 7
C 7
 

Andere mochten auch

Research project power point
Research project power pointResearch project power point
Research project power pointafonderwhite
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation FormatLifelong Learning
 
Research project ppt
Research project pptResearch project ppt
Research project pptJohn McKeown
 
Research paper power point
Research paper power pointResearch paper power point
Research paper power pointKatymarie33
 
Business Statistics
Business StatisticsBusiness Statistics
Business Statisticsshorab
 
Introduction to Business Statistics
Introduction to Business StatisticsIntroduction to Business Statistics
Introduction to Business StatisticsMegha Mishra
 
time series analysis
time series analysistime series analysis
time series analysisSACHIN AWASTHI
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slidesHelen Dixon
 
Research report ppt
Research report pptResearch report ppt
Research report pptVikas Dalmia
 
Sample Methodology
Sample MethodologySample Methodology
Sample MethodologyAiden Yeh
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposalguest349908
 

Andere mochten auch (12)

Research project power point
Research project power pointResearch project power point
Research project power point
 
Presentation Of Research Work
Presentation Of Research WorkPresentation Of Research Work
Presentation Of Research Work
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
 
Research project ppt
Research project pptResearch project ppt
Research project ppt
 
Research paper power point
Research paper power pointResearch paper power point
Research paper power point
 
Business Statistics
Business StatisticsBusiness Statistics
Business Statistics
 
Introduction to Business Statistics
Introduction to Business StatisticsIntroduction to Business Statistics
Introduction to Business Statistics
 
time series analysis
time series analysistime series analysis
time series analysis
 
Present your research project in 10 simple slides
Present your research project in 10 simple slidesPresent your research project in 10 simple slides
Present your research project in 10 simple slides
 
Research report ppt
Research report pptResearch report ppt
Research report ppt
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
 

Ähnlich wie Research paper powerpoint presentation for public viewing

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
Anti virus
Anti virusAnti virus
Anti virusLauratHarun
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxEdwinGervacio2
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 
Malware
MalwareMalware
Malwarezelkan19
 
Malware
MalwareMalware
Malwarezelkan19
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Computer Worms
Computer WormsComputer Worms
Computer Wormssadique_ghitm
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 

Ähnlich wie Research paper powerpoint presentation for public viewing (20)

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Malware
MalwareMalware
Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Spyware
SpywareSpyware
Spyware
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 

KĂŒrzlich hochgeladen

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

KĂŒrzlich hochgeladen (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Research paper powerpoint presentation for public viewing

  • 1. The Effects of Malware on Computers ANONYMOUS English 151 WC April 26th 2011
  • 2. Subtopic #1 – “Introduction of Malware” Have you ever had this happen to you? A sudden decrease in your operating system with no explanation? Pop ups and ads even though you don’t have any web browser open? Unauthorized programs are being installed onto your computer? You notice that your computer is using more of it’s resources than usual? If so – you might be a victim of malware!
  • 3. Subtopic #1 – “Introduction of Malware” So what is malware, anyway? Software designed to cause harm or gain unauthorized access to one’s computer. Also known as: Viruses Spyware Bloatware Botnets Rootkits Scareware
  • 4. Subtopic #1 – “Introduction of Malware” History of Malware 1970 - 1990 History of Malware 1990-present day 1971 – “Creeper Virus” is introduced. 1974 – The “Rabbit” Virus. 1981 – “Elk Cloner” the first major virus for the Apple II personal computer. 1987 – The “Vienna Virus” is the first virus that actually destroys data. 1990 – “Chameleon” becomes the first virus that can purposely hide itself from it’s victim. 1998 – “HLLP.DeTroi” becomes the first virus to relay compromised passwords to the creators. 2001 – “E-mail and Websites” become the number one “honey pot” for malware. 2003 – “Slammer” infects the actual memory of computer systems to decrease the performance.
  • 5. Subtopic #2 – “Effects of Malware on Computers in the Present Day” “As computers become more advanced in what they are capable of, the effects of malware is always changing to fit the agenda of its creator.”
  • 6. Subtopic #2 – “Effects of Malware on Computers in the Present Day” Types of Malware: Insert info here. Insert info here. Insert info here. Insert info here. Insert info here.
  • 7. Subtopic #3 – “The Victims of Malware” What are users doing to prevent malware from gaining unauthorized access to their computers? What can you do?
  • 8. Subtopic #3 – “Future of Malware” What is the current growing concern for the effects of malware? What might be in store for the future, and what can we do to protect ourselves?
  • 9. Subtopic #3 – “Conclusion” What do I think?