The most popular threat that face computers are viruses,
A virus is a program written intentionally to change the way your computer operates without your permission or knowledge. Their behavior is similar to how real-life biological viruses work, and the ways of dealing with them can be quite similar as well!
A virus attaches copies of it to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk.
Maybe all of you know these information about computer viruses ,but do you know what was the first virus appeared in the world , who created it
He is Richard Skrenta( showing his picture in the powerpoint)
Other type of threats are Worms
They are the most effective and dangerous threats because they replicate and spread by them self without even opening the file, hackers often use this type to gain access to the computers that they infect. Worms can also spread by copying themselves from disk to disk or by email.
The most dangerous worm ever created is I LOVE YOU worm. It was first noticed in Philippines on May 4 2000 and then spread all over world in just one day!
Affecting 10% internet users all around the world and causing loss of about $5.5 billion.
It arrives in email inbox with subject “ILOVEYOU”. It had an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”.
Also, it sent the worm to everyone on victim contact list. Although, worm spread very fast. Only windows users were affected.
The other type of threats is Trojan horse;
Trojan horses are programs that appear to serve some useful purpose or provide entertainment; it looks like an interesting program with a beautiful link. It’s mostly annoying but some times it damages files.
I will show you how it’s done briefly…( in the computer)
I talked to you about some of the threats; and know I will tell you how to protect your self from them
1. Never open an e-mail, attachment, or click on an e-mail link from any unknown source.
2. Use antivirus software that includes e-mail scanning. I recommend Kaspersky Anti-Virus 2010(have a sample and show the students) or Shield Deluxe anti virus
3. Install a firewall on your computer.
4. Change your password regularly and create a smart password with different characters.
5. Always back up your system in case your computer was attacked you not lose your data.
But what if your computer was attacked, what you will do if you faced a hacker or your e-mail was stolen. Don’t worry I will tell you what to do
Bad news—you've suffered a virus attack. Take a few seconds to get over the initial shock, but only a few seconds. =)
It can quickly go through your system, destroying files, corrupting data, rendering applications useless, and in general causing many problems. You need to act immediately. Follow the steps below to remove the virus and restore your. - First of all disconnect the machine from the network to not infect other computer. - Once the computer has been disconnected, you need to remove the virus by cleaning up the system Use virus removal tools written for the specific virus causing the damage. - If your operating system is completely destroyed, you'll need to reinstall. Use the 'quick restore' CD that came with your computer to restore your computer to its original configuration. - Scan for viruses. After restoring, scan your entire network from viruses.
It is very easy to deal with a virus but what if you had to deal with a haker a person who breaks into computers or a cracker a person who steals passwords.
But just be aware that not all hackers are dangerous or have bad intention some times they just do it for fun.
I am going to try (only trying) to come up with some good ways to either force the hacker to leave or have them leave legally.
- First off all, just try to avoid them
- When you are not using your computer, disconnect it from the Internet. One of the worst things that can happen is when a hacker breaks into your computer and you don't even know it
- Never post your IP address in a public place. This is like inviting a hacker to your door. Once they know your Internet Protocol address (four numbers divided by periods e.g. 168.320.001.01) they can begin hacking you.
- but if your computer is already been hacked , just report hacking by taking a recording and screenshots. Don't be afraid of being targeted.
In conclusion , computer threats maybe not as important as some of other topics discussed . but still just as real ! will viruses kill anyone?..probably not. Will they cause an epidemic? I doubt it. But computer threats are larger threats to society than most people realize.
Therefore , weather you are writing a college report or your saving your best friend picture, just remember what are the threats that can in a blink destroy everything . so write away protect yourself because you never know when you'll be attacked.
[pic]
You May Also Find These Documents Helpful
-
Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…
- 437 Words
- 2 Pages
Satisfactory Essays -
Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…
- 633 Words
- 3 Pages
Satisfactory Essays -
A virus is a small infectious agent that can replicate only inside the living cells of organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea.…
- 923 Words
- 4 Pages
Good Essays -
A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…
- 7255 Words
- 53 Pages
Powerful Essays -
A virus is a small infectious agent that replicates only inside the living cells of other organisms. A virus is a small parasite that cannot reproduce by itself. Once it infects a susceptible cell, however, a virus can direct the cell to produce many more viruses. Viruses can infect all types of life forms, such as animals and plants to microorganisms, including bacteria and archaea.…
- 1508 Words
- 7 Pages
Good Essays -
Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…
- 3844 Words
- 14 Pages
Powerful Essays -
* This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…
- 669 Words
- 2 Pages
Good Essays -
A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…
- 711 Words
- 3 Pages
Satisfactory Essays -
Viruses are a small infectious agent that can only multiply inside the cells of living organisms although unlike bacteria, fungi and parasites viruses are not living organisms. Viruses can infect any living organism such as humans, plants and animals. Viruses multiply by spreading from organism to organism for example viruses can be spread from human to human by coughing or sneezing.…
- 1674 Words
- 7 Pages
Better Essays -
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…
- 787 Words
- 3 Pages
Good Essays -
Computer viruses parallel many facets of microbial infection. Unlike biological viruses, computer viruses can be thought of as a virus, worm, or Trojan infection. Computer viruses are programs that infect a computer and modify itself which permits it to spread throughout the computer’s software and hardware. Worms are programs that spread between computers through networking while a Trojan horse infection can make a computer available to non-authorized uses without knowledge from owner. Resembling biological viruses, computer viruses can be latent such as a herpes virus or HIV. Both have evolved to produce numerous variants and modified copies to ensure survival against their host’s means of evolving to protect against the infection. But what makes them different other than the obvious fact that computers viruses are “virtual” and biological are molecular based.…
- 442 Words
- 2 Pages
Good Essays -
Gregg Keizer Techweb News June 2004. http://www.informationweek.com/worst-caseworms.com Research work done by Nicholas Weaver & Vern Paxon two security researches who worked in collaboration with ICSI and University of California at Berkley…
- 985 Words
- 4 Pages
Good Essays -
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory…
- 2000 Words
- 8 Pages
Good Essays -
Second kind is the worm, is has a self replicating ability that spreads itself through computer network. It search for loopholes in the network copies itself and reaches another computer in the network. This kind of virus invades the kernel of the computer that makes it halt and become slow. It replicates in drastic number that make duplicates of files that cause confusion in the computer user.…
- 639 Words
- 3 Pages
Good Essays -
Computer viruses are the small software programs that are designed for the purpose of spreading from one computer to another in order to interfere with the computer operations.…
- 3458 Words
- 14 Pages
Powerful Essays