Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.

  • Published on
    20-Dec-2015

  • View
    214

  • Download
    2

Transcript

<ul><li> Slide 1 </li> <li> Slide 2 </li> <li> Computer Viruses and Worms By Rafael Albuernes </li> <li> Slide 3 </li> <li> What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections Origins Origins History History Future Future How can you protect yourself? How can you protect yourself? </li> <li> Slide 4 </li> <li> What is a Virus? A virus is a small piece of software that piggybacks on real programs. A virus is a small piece of software that piggybacks on real programs. Computer viruses are called viruses because they share some of the same traits of biological viruses. Computer viruses are called viruses because they share some of the same traits of biological viruses. </li> <li> Slide 5 </li> <li> What is a Worm? A worm is a small piece of software that uses computer networks and security holes to replicate itself. A worm is a small piece of software that uses computer networks and security holes to replicate itself. </li> <li> Slide 6 </li> <li> Types of Infections Viruses E-mail viruses Worms Trojan horses </li> <li> Slide 7 </li> <li> Origins People create viruses People create viruses A person writes the code A person writes the code Tests it to make sure it spreads properly Tests it to make sure it spreads properly Designs the viruss attack phase Designs the viruss attack phase Silly message or destruction Silly message or destruction </li> <li> Slide 8 </li> <li> History Traditional computer viruses were first widely seen in the late 1980s. Traditional computer viruses were first widely seen in the late 1980s. Factors Spread of personal computers Use of computer bulletin boards Floppy Disk </li> <li> Slide 9 </li> <li> Future Attacks against data systems will increase and become more and more professional. Attacks against data systems will increase and become more and more professional. </li> <li> Slide 10 </li> <li> How can you protect yourself? Install an Anti-Virus program on your computer Install an Anti-Virus program on your computer Install a Firewall on your computer Install a Firewall on your computer Close all open ports on your computer Close all open ports on your computer Only use floppys from a trusted source Only use floppys from a trusted source </li> <li> Slide 11 </li> <li> Conclusion The virus technology used by spammers is threatening to change the entire Internet into a battle field. The virus technology used by spammers is threatening to change the entire Internet into a battle field. We must each do our part to protect our systems. We must each do our part to protect our systems. </li> <li> Slide 12 </li> <li> Questions? </li> </ul>

Recommended

View more >