what’s in your computer
TRANSCRIPT
![Page 1: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/1.jpg)
Viruses, Worms, and Trojan Horses By: Laurie Madison
![Page 2: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/2.jpg)
“Computer Gremlin 2” by Larry Wentzel
Definition:
A virus is a piece of self-replicating code embedded within another program called the host.
2
How does my computer catch a virus?
![Page 3: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/3.jpg)
![Page 4: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/4.jpg)
Definition:
A Trojan horse is a program with a benign capability that conceals another, sinister purpose.
How does my computer get a Trojan horse?
![Page 5: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/5.jpg)
What kind of malicious tasks will a Trojan horse do?
Some examples of malicious tasks Trojan horse programs have done are:
opening an Internet connection that allows an outsider to gain access to files
logging the keystrokes of the user and storing them in a file that the attacker can see
looking for passwords stored on the computer and emailing them to the attacker
destroying files launching a denial-of-service attack on a
website turning the computer into a proxy server that
can be used to launch spam or stash information from illegal activities.
![Page 6: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/6.jpg)
How does my computer get a worm?
Definition:
A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!
![Page 7: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/7.jpg)
• Infiltrate networks spreading all by
itself through holes in your operating
system security.
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
computer
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
![Page 8: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/8.jpg)
There’s an overwhelming list of products available.
• Trend Micro
• McAfee
• Norton
• Bitfender
• And on and on…
![Page 9: What’s in your computer](https://reader035.vdocuments.us/reader035/viewer/2022062514/55a1f9201a28ab6c6d8b470c/html5/thumbnails/9.jpg)
References
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc.
• Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570
Thank you!
Microsoft Office Clip Art,
audiomicro.com/free-sound-effects, and
pixabay.com for the free audio and clip art