By : Rishika , Autumn and Melissa

Preview:

DESCRIPTION

Computer and other malware. By : Rishika , Autumn and Melissa. http://www.youtube.com/watch?y=c34QwtY40g. Virus ?. . Viruses are small pieces of software .They attach themselves to programs and stay there .When the program runs the virus runs too - PowerPoint PPT Presentation

Citation preview

By : Rishika ,Autumn and Melissa

Computer and other

malwarehttp://www.youtube.com/watch?y=c34QwtY40g

VIRUS ?.Viruses are small pieces of software.They attach themselves to programs and stay there.When the program runs the virus runs too.They reproduce and spread to other files.You can send them to other people accidentally.They can steal and/or delete your files/information.Security programs can delete viruses

VIRAL HISTORY IS A MYSTERY• 10 most destructive and popular virus : (1999-2010)

1) Stuxnet (Malware)

2) Conficker (Virus)

3) Agent (Malware)

4) Zeus (Malware)

5) PoisonIvy (Malware)

6) Storm (Worm)

7) Sasser (Worm)

8) Nimda virus

9) Morris (worm)

10)Conflicker (Malware)

THE TROJAN HORSE • A Trojan horse is a computer virus, that looks like another file

or document on your computer.

• This a evil and 1 of the most popular computer virus.

• There is a good part about this famous virus it doesn’t duplicate itself

• There is one and only but just one is destructive enough.

• This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software .

• This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.

What Is It?

A malware computer program Can independently replicate itself Independently sends copies of

itself; Using a computer network

COMPUTER WORMS

COMPUTER WORMS

How are they Spread?

MS outlook servicesImmediate contact to SMTP serversThrough SMTP API of their own Windows MAPI functions

COMPUTER WORMS

What are the Different Kinds of Worms?

Instant Messaging worms Internet wormsIRC wormsFile Sharing Network worms

ADWARE ATTACKS .Happen mostly when online

.Usually don’t notice until it’s too late

.Virus attaches to your hard drive

.Attach instantly and go through your files

.Often disguised as adware protection

message sent to a group of people

Same messageLarge groupOn the internet

SPAM: WHAT IS IT?

VIRUS PROTECTIONHow can you Protect your Computer?

1) Firewall

Prevents malware or malicious

software from gaining access

to it

2) Virus Protection

Protects against viruses and other security threats

VIRUS PROTECTION3) Spyware and other malware protection

-antispyware software

-Protects against spyware

UPGRADES & PURCHASES

Upgrades:

-once a week

-automatically or manually

Where to purchase protection:

-purchase at a computer retail store

-Ex: Future Shop, Apple, etc.

ROOTKITS• Provides a root/path for hackers

• Allows hackers to access your network

• Hackers install hidden programs on your computer

• They can access your data and personal information

• You usually don’t even notice

• .Rootkits don’t go away on their own

• You need to look into security software

• They will give you helpful options

BIBLIOGRAPHY• http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF-8

&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ

• http://images.google.ca/

• http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html?c=y&page=2

• http://www.worsetech.com/hack/hacker-attack/top-5-most-deadly-viruses-1102431.html

• http://en.wikipedia.org/wiki/Rootkit

• http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__internet_surfing__adware_infection.html

Recommended