3. COMPUTER VIRUSES WORM
A potentially A program that copies
damaging computer itself repeatedly, using
program that affects, up resources and
or infects, a computer possibly shutting down
negatively by altering the computer or
the way the computer network.
works without the
user’s knowledge or
permission.
4. ROOTKIT
TROJAN HORSE A program that hides
A program that hides in the computer and
within or looks like a allows someone from a
legitimate program. remote location to
A certain condition or take full control of the
action usually triggers location.
the Trojan Horse Once the rootkit is
It does not replicate installed, the rootkit
itself to other author can execute
computers. programs, change
settings, monitor
activity and access files
on the remote.
7. Step 1
Unscrupulous programmers create a virus program that deletes all They hide the virus in a word processing document and attach the
files. document to an e-mail message.
Step 2
They send the e-mail message to thousands of users around the world
Step 3
b) Other users do not recognize the name of the sender of the
a) Some users open the attachment and their computers become
message and they do not open it – instead they immediately
infected with the virus
delete the e-mail message.So, the computers not infected.
10. Many application programs such as Microsoft Word can be
configured to display a warning if a user attempts to open a file that
contains a macro.
11. Protects a computer
against viruses by
identifying and
removing any computer
viruses found in memory
on storage media.
Is a known
specific
pattern of
virus code.
14. Is an e-mail message
that warns users of a
non-existent virus or
other malware.
15. BOTNETS
•Is a group of compromised computers connected to
network that attacks other network.
•compromised computer is known as zombie where
owner is unware the computer is being controlled
remotely by an outsider.
•Bot is a program that performs a repetitive task
on a network.
•cybercriminals install malicious bots on
unprotected computers to create botnet.
16. •is an assault whose purpose is to disrupt computer access
to Internet service.
•DOS attack carried out in many ways:
Using unsuspecting computers to DDoS(Distributed DoS) attack
send influx of confusing data •Zombie is used to attack computer
messages or useless traffic to a networks.
computer network. •Able to stop operations
temporarily at numerous websites.
There are few motives for doing Dos/DDoS attacks:
Claim As a vehicle Simply for
political for extortion recognition even it
anger is negative.
17. •is a program/set of instructions
in a
program that allow users to bypass
security controls when accessing
program.
•Rootkit can be a back door.
•programmers usually build back doors
into programs during system
development to save development time.
•computer repair technician may install a
back door while troubleshooting
problems on a computer.
18. •is a technique intruders use to make their
network or Internet transmission appear
legitimate to a victim computer or network.
•types of spoofing computers schemes:
E-MAIL SPOOFING IP SPOOFING
•Occurs when sender’s address
•Occurs when an intruders
or other components of e-mail
computer fools a network
header are altered.
into believing its IP address is
•Commonly used for viruses
associated with a trusted
hoaxes, spam and phishing
source.
scams.
20. Isa hardware/software that protects a network’s resources
from intrusion
Organizations
- use firewalls to protect network resources and to restrict
employees’ access to sensitive data.
- use proxy server that controls which communications pass
into the organization’s network.
Home and small office/home office
- users protect their computers with personal firewall.
- it monitors all transmissions to and from computer and may
inform a user of any attempted intrusion.
- some users purchase stand-alone personal firewall software.
21. Large organizations may use intrusion
detection software to identify possible security
breaches.
It analyses all network traffic, assesses system
vulnerabilities, identifies any unauthorized
intrusions and notifies network administrators of
suspicious behavoiur patterns or system breaches.
22. Some organizations use honeypots so that they
can analyze an attack being perpetrated.
A honeypot is a vulnerable computer that is set
up to entice an intruder to break into it.
Honeypots allow the organizations to learn how
intruders are exploiting their network and also
attempt to catch perpetrators who have been
doing damage elsewhere on their network.
25. Act of defacing or destroying computer
equipment
Cutting computer cable wire .
Aimlessly destroying individuals or school
computers.
Normally it doesnt pose threat to home
desktop computer users.
Small unit system can be stolen as their
portable and able to fit in backpack or
briefcases
27. locked doors and windows(usually for school and
business) enough to protect these hardwares
install alarm system
cables that lock the equipment to the desk
Small locking devices also exists that require a key
to access a hard disk or a optical disk drive
28. Real time location system (RTLS)
- to track and identify location aof high risk or high
valued items.
RTLS place RFID tags in items to be tracked.
Mobile users can install mini security system in the
notebook computer
29. Some of these security systems shut down
the computer or sound an alarm if computer
moves out of a specific distance
Some can configure to photograph the
thieves when they use the computer
Tracking software can track the location of
stolen notebook computer
Use passwords ,possessed objects and
biometrics.
30. Ex: starting up a computer requires password ,
slide card in card reader or press you finger on a
finger print reader for the hard disk to unlock
This type of security does not prevent theft but it
makes the computer useless after stolen
Password protect can be used on portable devices :
USB flash drives,smart phones and other devices.
This will allow only authorized users to access the
devices data.
31. Some security system can destroy data if an
incorrect password entered in a certain number of
times.
You can instruct the password screen to display
your name and phone number ,, so that if it was
misplaced or lost someone can always contact you
and return it!