computer viruses. virus quote “ i think computer viruses should count as life. i think it says...

30
Computer Viruses Computer Viruses

Upload: ginger-gallagher

Post on 25-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Computer VirusesComputer Viruses

Page 2: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Virus QuoteVirus Quote

“ “I think computer viruses should count as I think computer viruses should count as life. I think it says something about human life. I think it says something about human nature that the only form of life we have nature that the only form of life we have created so far is purely destructive. We've created so far is purely destructive. We've created life in our own image.”created life in our own image.”

Stephen Hawking, Author & Stephen Hawking, Author & ScientistScientist

Page 3: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

What are Computer Viruses?

A computer program written intentionally to A computer program written intentionally to enter a computer without the user’s enter a computer without the user’s permission or knowledge. permission or knowledge. A virus attaches itself to files or A virus attaches itself to files or boot sectorsboot sectors and copies itself, thus and copies itself, thus continuing to spreadcontinuing to spread. . Some viruses do little other than replicate, Some viruses do little other than replicate, however others can cause serious damage however others can cause serious damage or severely effect program and system or severely effect program and system performance.performance.

Page 4: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Overview of VirusesOverview of Viruses

Viruses cost billions of dollars each year.Viruses cost billions of dollars each year.They can be classified into three main They can be classified into three main categories that describe the part of the categories that describe the part of the computer they infect:computer they infect:1. boot-sector1. boot-sector2. file2. file3. macro3. macro

Viruses can also be classified according to Viruses can also be classified according to the type of infection they cause.the type of infection they cause.

Page 5: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Where Do Viruses Come From?

Created by computer Created by computer programmers, typically programmers, typically males between age 14-34.males between age 14-34.

Viruses are usually Viruses are usually executable filesexecutable files or or macrosmacros that attach themselves to that attach themselves to applications.applications.

A virus may be spread by a A virus may be spread by a user, without the knowledge user, without the knowledge of that user.of that user.

Page 6: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Common Places Viruses Where Common Places Viruses Where Spread:Spread:

InternetInternet

Chat linesChat lines

EmailEmail

Floppy Floppy drives/DVDs, drives/DVDs, CD-ROMsCD-ROMs

Pirated SoftwarePirated Software

PeoplePeople

Page 7: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Common Virus Types

Boot Sector VirusBoot Sector Virus

Macro VirusMacro Virus

WormsWorms

Virus Hoaxes Virus Hoaxes

E-mail Virus – Refers to method of E-mail Virus – Refers to method of deliverydelivery

Trojan HorsesTrojan Horses

Page 8: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Group ActivityGroup Activity

JIGSAWJIGSAW

Page 9: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Group NamesGroup Names

Group 1 – “Group 1 – “StonedStoned”” (Boot Sector)(Boot Sector)

Group 2 – “Group 2 – “MelissaMelissa” (Macro)” (Macro)

Group 3 – “Group 3 – “I Love YouI Love You” (Worms)” (Worms)

Group 4 – “Group 4 – “Good TimesGood Times” (Hoax)” (Hoax)

Group 5 – “Group 5 – “KlezKlez” (E-mail Delivery)” (E-mail Delivery)

Group 6 – “Group 6 – “TrojanTrojan” (Trojan)” (Trojan)

Page 10: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Group AssignmentGroup Assignment

1.1. Describe your virus type?Describe your virus type?

2.2. How does the virus break into the How does the virus break into the computer?computer?

3.3. Your group is named after a computer Your group is named after a computer virus; what did your virus do? virus; what did your virus do?

Page 11: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Anti-Virus SoftwareAnti-Virus Software

Page 12: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

How Anti-Virus Software WorksHow Anti-Virus Software Works

Step 1: Scans the memoryStep 1: Scans the memory

When you first boot up your computer, the anti-virus When you first boot up your computer, the anti-virus software will check the memory to ensure that no software will check the memory to ensure that no virus is present before the computer starts opening virus is present before the computer starts opening more files.more files.

Step 2: Checks for a signatureStep 2: Checks for a signature

Every virus has a signature; the software searches Every virus has a signature; the software searches for these signature. If found, the software can for these signature. If found, the software can identify the virus and apply the appropriate measure identify the virus and apply the appropriate measure to fix/delete the file.to fix/delete the file.

Page 13: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

How Anti-Virus Software WorksHow Anti-Virus Software Works (con’t)(con’t)

Step 3: Scans before opening filesStep 3: Scans before opening filesAnti-virus software allows you to specify which types Anti-virus software allows you to specify which types of files will be checked before opening them. The of files will be checked before opening them. The software usually defaults to checking executable files, software usually defaults to checking executable files, since these are the most common types of files to be since these are the most common types of files to be infected.infected.

Step 4: Notification of a Detected VirusStep 4: Notification of a Detected VirusIf a virus is found during any of these processes, the If a virus is found during any of these processes, the software will notify you. You are given the option of software will notify you. You are given the option of how to proceed. It is best to follow what the software how to proceed. It is best to follow what the software advises. It will usually destroy the virus and then try to advises. It will usually destroy the virus and then try to repair the file. However, if the file cannot be repaired, repair the file. However, if the file cannot be repaired, the file will be deleted. the file will be deleted.

Page 14: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Protecting Your Computer From Viruses

Install Virus Protection Software with a Install Virus Protection Software with a subscription servicesubscription serviceAvoid programs from unknown sources Avoid programs from unknown sources (e.g. pirated software, internet files)(e.g. pirated software, internet files)Disable floppy disk booting – this Disable floppy disk booting – this eliminates the risk of a boot sector viruseliminates the risk of a boot sector virus

Page 15: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Protect Your Computer From Viruses (con’t)

Enable Macro ProtectionEnable Macro Protection

Page 16: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Protect Your Computer From Viruses (con’t)

Never double-click on an attachment that contains Never double-click on an attachment that contains an executable file that arrives as an e-mail an executable file that arrives as an e-mail attachment.attachment.

Page 17: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

GlossaryGlossary

Boot SectorBoot Sector - the first portion of a hard disk or floppy disk that controls - the first portion of a hard disk or floppy disk that controls the start-up sequence of the computer.the start-up sequence of the computer.

Boot Sector VirusBoot Sector Virus – a virus that executes when the computer boots up. – a virus that executes when the computer boots up.Email VirusEmail Virus – a virus that is spread through email; in most cases the – a virus that is spread through email; in most cases the

virus will sent itself to others without the user’s knowledge.virus will sent itself to others without the user’s knowledge.MacroMacro- a single computer instruction that results in a series of - a single computer instruction that results in a series of

instructions in machine language.instructions in machine language.Macro VirusMacro Virus - a virus that uses the same machine language as a Macro; - a virus that uses the same machine language as a Macro;

the virus ‘hides’ within the code.the virus ‘hides’ within the code.PayloadPayload - t - the eventual effect and magnitude of a computer virus.he eventual effect and magnitude of a computer virus.Trojan Horse - Trojan Horse - a malicious program that hides within a legitimate a malicious program that hides within a legitimate

program.program.Virus - Virus - aa computer program written intentionally to enter a computer computer program written intentionally to enter a computer

without the user’s permission or knowledgewithout the user’s permission or knowledgeVirus Hoax - Virus Hoax - a false warning about a computer virus.a false warning about a computer virus.WormsWorms – similar to virus, however they exist as separate entities. They – similar to virus, however they exist as separate entities. They

can infect both computers and computer networks.can infect both computers and computer networks.

Page 18: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

PrivacyPrivacy

Privacy is a person’s ability to restrict or Privacy is a person’s ability to restrict or stop the collection, use, and sale of her or stop the collection, use, and sale of her or his personal information.his personal information.

Page 19: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Identity TheftIdentity Theft

Identity theft is a consequence of online privacy invasion.Identity theft is a consequence of online privacy invasion.It occurs when someone steals personal information about It occurs when someone steals personal information about someone else for the purposes of impersonating him or someone else for the purposes of impersonating him or her.her.The signs of identity theft includeThe signs of identity theft include1. bills or bank statements that do not arrive when they 1. bills or bank statements that do not arrive when they

shouldshould2. phone calls from collection agencies or creditors from 2. phone calls from collection agencies or creditors from

whom you have not borrowedwhom you have not borrowed3. withdrawals or transfers appear that you did not make3. withdrawals or transfers appear that you did not make4. approval or denial for credit you have not applied for4. approval or denial for credit you have not applied for5. you are turned down for a loan despite having a good 5. you are turned down for a loan despite having a good

credit ratingcredit rating

Page 20: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Personal Information Is ValuablePersonal Information Is Valuable

A number of groups want information A number of groups want information about you:about you:– corporationscorporations– governmentgovernment– individuals with criminal intentionsindividuals with criminal intentions– employersemployers– schoolsschools

Why do they want your information?Why do they want your information?

Page 21: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

CorporationsCorporations

Corporations gather demographic Corporations gather demographic information to market products more information to market products more effectively.effectively.Bill C-6 lays out guidelines for the collection Bill C-6 lays out guidelines for the collection and use of personal information.and use of personal information.Cookies are small text files place on your Cookies are small text files place on your computer’s hard drive by websites.computer’s hard drive by websites.– Cookies provide a footprint of websites visited.Cookies provide a footprint of websites visited.– They can be used to track online habits by They can be used to track online habits by

corporations.corporations.

Page 22: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

GovernmentGovernmentAll three levels of government collect information about All three levels of government collect information about individuals:individuals:

– federalfederal

– provincialprovincial

– municipalmunicipal

Each government agency you interact with holds information Each government agency you interact with holds information aboutabout

– your incomeyour income

– your jobyour job

– taxes you’ve paidtaxes you’ve paid

– government services you have usedgovernment services you have used

There is potential for both good and bad uses for this information.There is potential for both good and bad uses for this information.

Page 23: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

CriminalsCriminals

Identity thieves use the Internet to access Identity thieves use the Internet to access information electronically and impersonate information electronically and impersonate their victims.their victims.

Stalkers use the Internet to harm and Stalkers use the Internet to harm and harass their victims.harass their victims.

Pedophiles use the Internet to lure young Pedophiles use the Internet to lure young people to meet in person.people to meet in person.

Hackers use the Internet to steal Hackers use the Internet to steal passwords.passwords.

Page 24: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Employers and SchoolsEmployers and Schools

Employers and schools monitor computer Employers and schools monitor computer use, including email.use, including email.

There are few laws to protect employees There are few laws to protect employees and students from monitoring.and students from monitoring.

Employers and schools can block certain Employers and schools can block certain website on the Internet.website on the Internet.

Page 25: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Ten Steps to Protect Your PrivacyTen Steps to Protect Your Privacy

1.1. Use common sense.Use common sense.

2.2. Check for privacy policies.Check for privacy policies.

3.3. Keep separate e-mail accounts for business and Keep separate e-mail accounts for business and pleasure.pleasure.

4.4. Clear your cache after browsing.Clear your cache after browsing.

5.5. Encrypt whenever possible.Encrypt whenever possible.

6.6. Use anonymous remailers.Use anonymous remailers.

7.7. Use anonymous web-surfing programs.Use anonymous web-surfing programs.

8.8. Check your system for leaks.Check your system for leaks.

9.9. Say no to information sharing.Say no to information sharing.

10.10. Use personal Internet security programs.Use personal Internet security programs.

Page 26: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Cybercrimes and Online ScamsCybercrimes and Online Scams

phishingphishing

vishingvishing

pharmingpharming

hackinghacking

salami shavingsalami shaving

cyberstalkingcyberstalking

sexual predatorssexual predators

evil twinsevil twins

online auction fraudonline auction fraud

Page 27: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

SpamSpam

Spam is unsolicited e-mail.Spam is unsolicited e-mail.

Usually it is sent to thousands of Usually it is sent to thousands of recipients.recipients.

Online scams often rely on spam.Online scams often rely on spam.

Page 28: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Protecting Yourself From Protecting Yourself From CyberscamsCyberscams

Be skeptical.Be skeptical.Give out as little information about yourself Give out as little information about yourself as possible.as possible.Research the organizations you are dealing Research the organizations you are dealing with.with.Call organizations from which you have Call organizations from which you have received e-mails to confirm they are received e-mails to confirm they are legitimate.legitimate.Read the news and be aware of cyberscams.Read the news and be aware of cyberscams.Report all cybercrimes to authorities.Report all cybercrimes to authorities.

Page 29: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

LITERACY TOOLBOXLITERACY TOOLBOX

Making Sense of TV JournalismMaking Sense of TV Journalism– Media literacy is the ability to interpret and Media literacy is the ability to interpret and

create personal meaning from visual images create personal meaning from visual images by analyzing their structure and function.by analyzing their structure and function.

– Challenge and question what you see, hear, Challenge and question what you see, hear, and read in the media.and read in the media.

Page 30: Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life

Registration of Domain NamesRegistration of Domain Names

You must register a domain name when You must register a domain name when setting up a website.setting up a website.

Cybersquatters register domain names Cybersquatters register domain names and then demand millions of dollars for the and then demand millions of dollars for the sale of the name to organizations.sale of the name to organizations.

World Intellectual Property Organization World Intellectual Property Organization (WIPO) determines if the cybersquatter (WIPO) determines if the cybersquatter has a legitimate claim to the name.has a legitimate claim to the name.