16
COMPUTER SAFETY!!! Viruses Hacking Back-

COMPUTER SAFETY!!! Viruses Hacking Back-up. Contents: Virus’: slide 3 - 10 Hacking: back ups:

Embed Size (px)

Citation preview

COMPUTER SAFETY!!!

Viruses

Hacking

Back-up

Contents:

• Virus’: slide 3 - 10

• Hacking:

• back ups:

VirusesHmmmm.. Well what is a virus?? Don’t worry this part of my power point presentation is all about viruses and tells you everything you need to know to understand what a virus is!! It includes; what viruses are, what damage they can make, what are the different types of viruses, how you can stop a virus and are there any drawbacks on using anti-virus software.

What is a computer virus???

A computer virus is a computer program that can infect a computer. The term "virus" is also commonly but incorrectly used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

How do viruses spread???Viruses begin to work and spread when you start up the program or application of which the virus is present. For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run.

Once in memory, one of a number of things can happen. The virus may be programmed to attach to other applications, disks or folders. It may infect a network if given the opportunity.

Viruses behave in different ways. Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive. Other viruses will operate every time you turn on your computer after infecting a system file or network.

How to Prevent a Virus Invasion!

1. Load only software from original disks or CD's. Pirated or copied software is always a risk for a virus.

2. Execute only programs of which you are familiar as to their origin. Programs sent by email should always be suspicious.

3. Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed.

4.Check all shareware and free programs downloaded from on-line services with a virus checking program.

5.Purchase a virus program that runs as you boot or work your computer. Up-date it frequently.

What are the different types of viruses???

1. I love you

The three words that can at most motivate you to cross the seven seas - or at least tempt you to open en email. This very temptation was the downfall of many computer users when this multipurpose skilled virus hit the web. It had the ability to replicate itself via IRC chat and email, transfer and hide itself in different files and folders, and infect the registry keys once you opened an email in you inbox declaring I Love You . The virus thought to be originated somewhere in the � �Philippines, caused damage which was estimated to be around $8-10 billion.

2. Melissa

The creator of this virus received a 20 month jail sentence and a $5000 fine. Generated over a decade ago, this clever piece of virtual disease operated through Microsoft Outlook. This is how it worked: you receive an email titled Here is the �Document you asked for from an unknown sender, you got infected as soon as �you opened the email, and the virus would replicate and delivers itself to the top 50 people on your list without you getting a hint of it. Some major US government departments were hit and the damage is thought to be around $1 billion at least. A 20 month jail sentence well deserved.

3. My Doom

My Doom was instigated somewhere in mid 2004 and it actually prompted US senator to propose the creation of a National Virus Response Centre . The virus attacked in two � �phases; the first phase infected different Operating Systems, creating inroads and backdoors and making them vulnerable to external users. Once this problem was sorted out, the My Doom struck again after few months, this time targeting the Search Engines like Google, slowing them down considerably, and crashing a few.

4. Nimda

Spell it backwards and you will understand its prime targets: yes, the Admin and � �servers. It was basically a worm and has the record of being the fastest ever virus to spread; it took only 22 minutes to break into the list of top ten most deadly viruses of all times. It basically targeted internet servers and websites, creating a mass crater through which thousands of computers were affected at the same time. Once infected, the systems became exposed to open attacks by the outsiders.

What are the different types of viruses???

What are the different types of viruses???

5. Code Red

Damages of almost $200 million a day, and affecting the computers inside the White House are the degree of achievements of this virus. It subjugated the Windows by acting as a buffer overflow, sending gigantic amount of information to the computer so that it spilt over, eventually forcing a shut down by overlapping the memory of the computers. The problem wasn’t t solved until Microsoft issued a revival package to �cater for this virus.

What damage can a virus do???

Computer viruses can do varying amounts of damage to your computer, ranging from rendering it wholly unusable to doing nothing at all. Viruses have many methods of damaging your computer, which have evolved over time along with computers themselves.

How can you stop yourself from getting a virus on your computer??? To stop your computer from getting viruses you should install an anti-virus software, for your computer.

Here is the list of the top 10 anti-virus software’s you can buy -

01. Kaspersky Anti-Virus Kaspersky Antivirus often treated as the best available Antivirus application and has a special version for file servers. It covers almost all sections needed for a top class security. Kaspersky provides hourly virus definition update to keep you up-to-date.

02. Bit Defender AntivirusBit Defender is one of the best antivirus with top class defending ability. It provides hourly definition updates for latest threats. Bit Defender comes with P2P File Sharing and Registry Start-up Protection but lacks Email scanning.

03. Trend MicroTrend Micro is a well known and popular antivirus with Spyware and Adware Protection. It has some great features including Remote File Lock that safeguards your private files in case your laptop is lost or stolen. But lacks P2P File Sharing and Registry Start-up Scanning.

04. Norton Antivirus/ Internet SecurityNorton Antivirus is one of the most popular and well known antivirus application. The latest version has the ability to map your wireless home network and safeguards your wifi networks. Recently Norton has introduced a special version for gaming PCs known as Norton 2009 Gaming Edition. It comes with daily virus definition update but no support for P2P File Sharing and Registry Start-up Protection.

05. McAfee AntivirusMcAfee is one of the leading anti viruses in security industry. McAfee introduced 2 features Script Stopper and Worm Stopper. But it has no support for P2P File Sharing, Instant Messenger and Registry Start-up. The inbuilt up dater updates virus definitions on a regular basis to keep your up-to-date.

06. Panda Antivirus Pro 2009Panda Antivirus comes with a new feature call UltraFast scan engine that scan almost 30% faster compared to other antivirus applications. It has few unique features as follows *Identity protection through Anti-Phishing Filter and Anti-Banking Trojans Engine *Panda Antivirus has an advanced heuristic scan which maximum possible identity theft *Inbuilt Personal Firewall

07. ZoneAlarm Anti-virus 2009The latest version of Zone Alarm antivirus comes with strong removal ability of most dangerous viruses and multilayer security for your PC. But it is not certified by any of the three major independent testing labs Virus Bulletic, Checkmark, or ICSA. Zone Alarm scans uses lesser possible system resources.

08. ESET NOD32 AntivirusNOD32 is one of the leading antivirus applications with feature like *Blocking all attempts to collect and forward your personal and confidential data *Provides best protection against zero day threat and attacks *Virus definition updates comes in very small size compared to others *Multi layered protection including real time email scanning

09. AVG AntivirusAVG is one of oldest and widely used antivirus. Latest version of AVG comes with a clean interface and the core scanning engine changed for better performance with multi-core processors. Now the AVG Antivirus comes with two separate stand alone applications AVG Antispyware and AVG Antirootkit to give your best possible security.

10. F-Secure Antivirus 2009F-Secure Antivirus is quite easy to use and comes with pre-defined options for known threats. F-Secure heuristic scanner is considered as one of fastest. It provides new definition update on every two hours to provide you best possible security from most latest threats. It supports emails scanning for both Outlook and Thunderbird.

How can you stop yourself from getting a virus on your computer???

Are there any draw backs to using anti-virus software???

Every virus cannot be detected by a signature-based antivirus largely for the following reasons:

If an attacker has changed the signature of a virus, any signature-based antivirus will not be able to find the virus.

Any new virus will not be captured by the antivirus, as it will not be on the list in the antivirus database.

If the virus is not in the database of a signature-based antivirus, it will be virtually impossible for the antivirus to detect that virus.

If the mutation engine of a polymorphic virus is generating a new encrypted code, this changes the signature of the virus. Therefore, polymorphic viruses cannot be detected by a signature-based antivirus.

HackingThis part of my power point presentation is all about hacking and hackers. It includes many questions, they are: what is hacking?, what damage can hackers do? And how can you stop hackers getting into your computer? It will give you loads of information and will tell you each answer in detail! :)

What is Hacking???

Hacking is when people go on your computer with unauthorised access. They can steal and copy any information that is on your computer and use it against you.

Hackers can send emails to your computer and they can have viruses attached to them and they can ruin your computer/laptop!

What damage can hackers do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might do any of the following activities:

Vandalism—Destruction or digital defacement of a computer or its data for destruction’s sake. Sometimes this is ego-driven. They break in and leave their mark to show they’ve been there.

Hacktivism—A form of vandalism or electronic civil disobedience with a political agenda. Usually hacktivists have altruistic motives.

Theft—Gaining access to intellectual or proprietary technology or information, sometimes for resale.

Hijacking—Many of the financially motivated hackers are interested in using viruses and Trojan horses to hijack your computer so they can remotely control it for their own purposes.

Identity theft—Electronic theft of personal information that can be used to steal financial resources from an individual or corporation.

Terrorism—Some experts believe that terrorists will eventually launch an attack using hacking techniques.

How can you stop hackers being able to get on your computer???