Computer Technology Part 5 Megan Rees ERMS 5/13. Set of program instructions that attaches itself...
If you can't read please download the document
Computer Technology Part 5 Megan Rees ERMS 5/13. Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other
Set of program instructions that attaches itself to a file,
reproduces itself, and/or spreads to other files It can Corrupt
files Destroy data Display irritating messages Corrupt computer
systems Megan ReesERMS 5/13
Slide 3
Viruses spread because people distribute infected files by
exchanging disks and CDs, sending e-mail attachments, and
downloading documents from the Internet. Viruses attach themselves
to files with.exe,.com, or.vbs filename extensions When you open an
infected file, the virus opens and waits to infect the next program
you run or disk you use Megan ReesERMS 5/13
Slide 4
Viruses have the ability to lurk in a computer for days or
months, quietly replicating themselves You may not even know your
computer has a virus, thus making it easier to spread the virus
Megan ReesERMS 5/13
Slide 5
An event that activates a task often associated with a computer
virus Time Bomb Watches for the PC clock to reach a certain date to
activate the virus Example Michelangelo virus Damages files on
March 6 the artists birthday Logic Bomb Watches for a specific set
of input to activate the virus Megan ReesERMS 5/13
Slide 6
Megan ReesERMS 5/13
Slide 7
Virus that attaches to an application program Example Chernobyl
Notorious for overwriting a section of the hard disk, making it
impossible to access data Written by Chen Ging Hau of Taiwan in
1998. One of the most damaging viruses. Megan ReesERMS 5/13
Slide 8
Infects the system files that your computer uses every time it
is turned on Cause widespread damage and recurring problems Example
Stoned Virus Every time you turn on your computer the virus is
activated and infects any non-write-protected files including your
hard disk Created in 1987, written by a university student in
Wellington, New Zealand. One of the very first viruses. Megan
ReesERMS 5/13
Slide 9
Macro A miniature program that usually contains legitimate
instructions to automate a document or task. Infects data
fileschiefly files created in Word, Excel, Power Point, and even
Access. This virus infects a macro Example Melissa Virus Attaches
itself to Microsoft Word documents Codemas Virus Attaches itself to
Microsoft Excel spreadsheets Megan ReesERMS 5/13
Slide 10
Megan ReesERMS 5/13
Slide 11
Computer program that seems to perform one function while
actually doing something else Different from a virus because it
does not make copies of itself Different tasks that can be affected
Stealing passwords Deleting files Megan ReesERMS 5/13
Slide 12
Megan ReesERMS 5/13
Slide 13
Software program designed to enter a computer system usually
through a network, through security holes and then replicate itself
Spreads from computer to computer Megan ReesERMS 5/13
Slide 14
Megan ReesERMS 5/13
Slide 15
Megan ReesERMS 5/13
Slide 16
Antivirus software Set of utility programs that looks for and
eradicates a wide spectrum of problems, including viruses, Trojan
horses, and worms Example McAfee Virus Scan Dont open e-mails
attachments that have strange names or are from people you dont
recognize Megan ReesERMS 5/13
Slide 17
Jeff has a disk he borrowed from a friend. He puts in the
school computer lab and retrieves the data he needs. He turns off
the computer and leaves, leaving his disk behind and forgetting all
about it. The next morning, Molly comes to the lab and starts the
same computer. The computer tries to start from the disk in drive
A, and is unable to start, giving Molly an error message. Molly
notices the strange disk and takes it out, then tries to start the
computer again. But the computer will not start up even when Molly
removes the disk. Megan ReesERMS 5/13
Slide 18
David is surfing the internet for some free games. He finds a
really awesome game, and its FREE! Hes super excited! He downloads
the game, ignoring the user agreement and just clicking yes without
reading it. He plays the game for a while, but then he notices his
computer is slowing down and isnt working properly. There is a
virus on his computer! I wonder where it came from? Megan ReesERMS
5/13
Slide 19
Delilah is at the University checking her email in the computer
lab. She sees she has several emails and is going through them one
by one. One of the emails has the subject line: ILOVEYOU. Wahoo!
Someone is in love with her! Its a love note! YES! Delilah opens
the email eagerly. But there was nothing interesting in the email.
Before she knows it, a copy of this same email has been sent to all
the people in her address book. The next day, the computer lab is
closed because it and all the other computers on the network have
been infected. Dang it! She has a paper due! Why did they close the
lab?? Megan ReesERMS 5/13
Slide 20
Brian is a computer programmer at Synco Systems International.
Its an awesome company and he gets paid really well. He loves his
job. Hes just finished writing a new software program for the
company that will be used Internationally by hundreds of employees.
He loves his job SO much. Three weeks later, Brian is shocked to
find out hes been let go due to company cutbacks. Brian is SO
ticked off. Strangely, within minutes of Brians name being removed
from the company database, the software program suddenly goes down,
causing a huge breach in the company. Weird. Megan ReesERMS
5/13
Slide 21
Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston:
Course Technology - Thompson Learning, 2002. Megan ReesERMS
5/13