Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Viruses

No description
by

Seso Saud

on 24 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Viruses

Protection.
Function Of Antivirus
Computer Threats
Introduction
Internet and computer become a part of our 21st
century lives, the widespread use of technology also brings with it many computer threats that users must be aware of .
Computer Threat Types
Trojan horse:
A program that does something else that the user thought it would do.
Spyware:
Software that gains access to your computer without your knowledge.
Computer Threat Types
Worm:
Is a small piece of software that uses computer networks to replicate itself.
Spam:
Any kind of unwanted online communication.
Computer virus:
A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message or otherwise disrupting computer operations.
Virus History
Viruses Types
File viruses
:
Infect program files such as .EXE files.
Macro Virus:
Infect files that are created using certain applications or programs that contain macros.
Time bombs:
Stays in the computer system until a specific date is reached.
Boot sector viruses:
That infects the sectors on a disk that contain the data a computer uses during the boot process.
 Computer Viruses Writers
There are three different types of virus writers : 
The Adolescent: their age is between 13 and 17 
The College Student: their age is between 18 and 24 .
The Professionally Employed: they could be post-college or professionally employed.
Why People Create Computer Viruses?
To take control of a computer and use it for specific tasks.
To generate money.
To steal sensitive information such as credit card numbers, passwords, personal details and data.
It's a way of getting attention or for revenge purposes.
To cripple a computer or network.
Virus Characteristics
Encrypting :
The

virus code converts itself into cryptic symbols.
Polymorphic:
The ability to change code segments to look different from one infection to another.
Stealth:
The ability to hide from detection and repair.
Virus

Lifecycle
How Does A Computer Virus Find Me?
What Does A Computer Virus Do?
It reproduces or displays messages.
How To Detect Viruses?
The operating system will not load when you start your computer.
How To Protect From Computer Viruses
Avoid bad sites such as illegal download sites and Some game sites.
Antivirus
Computer program that identify ,remove computer viruses and protects the computer from further virus attacks.
1
Birth
2
Release
3
Proliferation
4
Trigger
5
Activation
Detection
Modification
8
It alters or deletes infected files.
It formats all or a part of the disk.
It overwrites boot sector.
It can slow down your computer.
It can reboot the computer when executed.
Can Infect file type such as .exe.
6
Elimination
7
The program size keeps changing.
Computer runs slower than usual.
Use antivirus software.
Unexplained data loss.
Have an updated antivirus program.
Daily virus scan.
Regular backup.
Check download file and email attachment.
Use an internet firewall.
Cleanup.
Alert.
Update.
Further Protection.
Richard Skrenta writes "Elk Cloner" one of the first viruses that spread in the wild.
1982
1999
the "Jerusalem“ virus makes its presence well known On every Friday 13.
The infamous "Melissa" virus , spread in MS Word documents sent via e-mail.
1987
The "I Love You" virus was sent as an attachment to an e-mail posing as a love letter.
2000
Belgian Computer Crime Virus: get information claiming that it was for police records.
2012
OUTLINE
INTRODUCTION
COMPUTER THREAT TYPES
COMPUTER VIRUS
Establishing Ethics In The Computer Viruses
1.Don't use computer to steal information.
2.Don't edit or view the information of others.
3.Don't disturb others.
4.Do not use other user's computer resources without their permission.
Virus Types
Virus History
Virus Writers
Why People Create Viruses?
Virus Characteristics
Virus Lifecycle
How Virus Find Me?
What Virus Do?
How To Detect Viruses?
How To Protect From Viruses?
Antivirus
Ethics In Viruses
Thank you for your attention ...
Full transcript