By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.

14
By : Rishika ,Autumn and Melissa Computer and other malware http://www.youtube.c om/watch?y=c34QwtY40 g

Transcript of By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.

Page 1: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

By : Rishika ,Autumn and Melissa

Computer and other

malwarehttp://www.youtube.com/watch?y=c34QwtY40g

Page 2: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

VIRUS ?.Viruses are small pieces of software.They attach themselves to programs and stay there.When the program runs the virus runs too.They reproduce and spread to other files.You can send them to other people accidentally.They can steal and/or delete your files/information.Security programs can delete viruses

Page 3: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

VIRAL HISTORY IS A MYSTERY• 10 most destructive and popular virus : (1999-2010)

1) Stuxnet (Malware)

2) Conficker (Virus)

3) Agent (Malware)

4) Zeus (Malware)

5) PoisonIvy (Malware)

6) Storm (Worm)

7) Sasser (Worm)

8) Nimda virus

9) Morris (worm)

10)Conflicker (Malware)

Page 4: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

THE TROJAN HORSE • A Trojan horse is a computer virus, that looks like another file

or document on your computer.

• This a evil and 1 of the most popular computer virus.

• There is a good part about this famous virus it doesn’t duplicate itself

• There is one and only but just one is destructive enough.

• This all famous virus uses devious and vile techniques to get into your system software usually it pops up as warning that something is trying to invade your computer and that a certain program can fix it for you but in real this so called ‘’ antivirus’’ is actually putting the virus in the software .

• This is why you have to beware about all the pops you get ONE WRONG CLICK and its invaded.

Page 5: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

What Is It?

A malware computer program Can independently replicate itself Independently sends copies of

itself; Using a computer network

COMPUTER WORMS

Page 6: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

COMPUTER WORMS

How are they Spread?

MS outlook servicesImmediate contact to SMTP serversThrough SMTP API of their own Windows MAPI functions

Page 7: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

COMPUTER WORMS

What are the Different Kinds of Worms?

Instant Messaging worms Internet wormsIRC wormsFile Sharing Network worms

Page 8: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

ADWARE ATTACKS .Happen mostly when online

.Usually don’t notice until it’s too late

.Virus attaches to your hard drive

.Attach instantly and go through your files

.Often disguised as adware protection

Page 9: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

message sent to a group of people

Same messageLarge groupOn the internet

SPAM: WHAT IS IT?

Page 10: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

VIRUS PROTECTIONHow can you Protect your Computer?

1) Firewall

Prevents malware or malicious

software from gaining access

to it

2) Virus Protection

Protects against viruses and other security threats

Page 11: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

VIRUS PROTECTION3) Spyware and other malware protection

-antispyware software

-Protects against spyware

Page 12: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

UPGRADES & PURCHASES

Upgrades:

-once a week

-automatically or manually

Where to purchase protection:

-purchase at a computer retail store

-Ex: Future Shop, Apple, etc.

Page 13: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

ROOTKITS• Provides a root/path for hackers

• Allows hackers to access your network

• Hackers install hidden programs on your computer

• They can access your data and personal information

• You usually don’t even notice

• .Rootkits don’t go away on their own

• You need to look into security software

• They will give you helpful options

Page 14: By : Rishika,Autumn and Melissa Computer and other malware  tch?y=c34QwtY40g.

BIBLIOGRAPHY• http://www.google.ca/search?q=wikipedia&rls=com.microsoft:en-ca&ie=UTF-8&oe=UTF-8

&startIndex=&startPage=1&redir_esc=&ei=5mh1UYn8BM23qAH4koGABQ

• http://images.google.ca/

• http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html?c=y&page=2

• http://www.worsetech.com/hack/hacker-attack/top-5-most-deadly-viruses-1102431.html

• http://en.wikipedia.org/wiki/Rootkit

• http://www.streetdirectory.com/travel_guide/136873/security/how_adware_attacks__internet_surfing__adware_infection.html