computer malware
TRANSCRIPT
![Page 1: Computer Malware](https://reader037.vdocuments.net/reader037/viewer/2022100601/5575bcc8d8b42a312a8b46fd/html5/thumbnails/1.jpg)
Computer MalwareComputer Malware
Owen DarbyOwen Darby
![Page 2: Computer Malware](https://reader037.vdocuments.net/reader037/viewer/2022100601/5575bcc8d8b42a312a8b46fd/html5/thumbnails/2.jpg)
VirusesViruses
What viruses areWhat viruses are TypesTypes EffectsEffects Famous viruses in recent historyFamous viruses in recent history
![Page 3: Computer Malware](https://reader037.vdocuments.net/reader037/viewer/2022100601/5575bcc8d8b42a312a8b46fd/html5/thumbnails/3.jpg)
Trojan HorsesTrojan Horses
What a Trojan horse isWhat a Trojan horse is TypesTypes What they can do to your What they can do to your
computercomputer How they get on your computerHow they get on your computer Recent Trojan horse problemsRecent Trojan horse problems
![Page 4: Computer Malware](https://reader037.vdocuments.net/reader037/viewer/2022100601/5575bcc8d8b42a312a8b46fd/html5/thumbnails/4.jpg)
Computer WormsComputer Worms
What worms areWhat worms are How worms spreadHow worms spread Effects on computerEffects on computer Recent worm outbreaksRecent worm outbreaks
![Page 5: Computer Malware](https://reader037.vdocuments.net/reader037/viewer/2022100601/5575bcc8d8b42a312a8b46fd/html5/thumbnails/5.jpg)
Protection TacticsProtection Tactics
Why to stay protected Why to stay protected Ease of getting infectedEase of getting infected ProgramsPrograms User tacticsUser tactics