computer technology part 5 megan rees erms 5/13. set of program instructions that attaches itself...

Download Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other

If you can't read please download the document

Upload: alvin-morgan

Post on 24-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Computer Technology Part 5 Megan Rees ERMS 5/13
  • Slide 2
  • Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other files It can Corrupt files Destroy data Display irritating messages Corrupt computer systems Megan ReesERMS 5/13
  • Slide 3
  • Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading documents from the Internet. Viruses attach themselves to files with.exe,.com, or.vbs filename extensions When you open an infected file, the virus opens and waits to infect the next program you run or disk you use Megan ReesERMS 5/13
  • Slide 4
  • Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves You may not even know your computer has a virus, thus making it easier to spread the virus Megan ReesERMS 5/13
  • Slide 5
  • An event that activates a task often associated with a computer virus Time Bomb Watches for the PC clock to reach a certain date to activate the virus Example Michelangelo virus Damages files on March 6 the artists birthday Logic Bomb Watches for a specific set of input to activate the virus Megan ReesERMS 5/13
  • Slide 6
  • Megan ReesERMS 5/13
  • Slide 7
  • Virus that attaches to an application program Example Chernobyl Notorious for overwriting a section of the hard disk, making it impossible to access data Written by Chen Ging Hau of Taiwan in 1998. One of the most damaging viruses. Megan ReesERMS 5/13
  • Slide 8
  • Infects the system files that your computer uses every time it is turned on Cause widespread damage and recurring problems Example Stoned Virus Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk Created in 1987, written by a university student in Wellington, New Zealand. One of the very first viruses. Megan ReesERMS 5/13
  • Slide 9
  • Macro A miniature program that usually contains legitimate instructions to automate a document or task. Infects data fileschiefly files created in Word, Excel, Power Point, and even Access. This virus infects a macro Example Melissa Virus Attaches itself to Microsoft Word documents Codemas Virus Attaches itself to Microsoft Excel spreadsheets Megan ReesERMS 5/13
  • Slide 10
  • Megan ReesERMS 5/13
  • Slide 11
  • Computer program that seems to perform one function while actually doing something else Different from a virus because it does not make copies of itself Different tasks that can be affected Stealing passwords Deleting files Megan ReesERMS 5/13
  • Slide 12
  • Megan ReesERMS 5/13
  • Slide 13
  • Software program designed to enter a computer system usually through a network, through security holes and then replicate itself Spreads from computer to computer Megan ReesERMS 5/13
  • Slide 14
  • Megan ReesERMS 5/13
  • Slide 15
  • Megan ReesERMS 5/13
  • Slide 16
  • Antivirus software Set of utility programs that looks for and eradicates a wide spectrum of problems, including viruses, Trojan horses, and worms Example McAfee Virus Scan Dont open e-mails attachments that have strange names or are from people you dont recognize Megan ReesERMS 5/13
  • Slide 17
  • Jeff has a disk he borrowed from a friend. He puts in the school computer lab and retrieves the data he needs. He turns off the computer and leaves, leaving his disk behind and forgetting all about it. The next morning, Molly comes to the lab and starts the same computer. The computer tries to start from the disk in drive A, and is unable to start, giving Molly an error message. Molly notices the strange disk and takes it out, then tries to start the computer again. But the computer will not start up even when Molly removes the disk. Megan ReesERMS 5/13
  • Slide 18
  • David is surfing the internet for some free games. He finds a really awesome game, and its FREE! Hes super excited! He downloads the game, ignoring the user agreement and just clicking yes without reading it. He plays the game for a while, but then he notices his computer is slowing down and isnt working properly. There is a virus on his computer! I wonder where it came from? Megan ReesERMS 5/13
  • Slide 19
  • Delilah is at the University checking her email in the computer lab. She sees she has several emails and is going through them one by one. One of the emails has the subject line: ILOVEYOU. Wahoo! Someone is in love with her! Its a love note! YES! Delilah opens the email eagerly. But there was nothing interesting in the email. Before she knows it, a copy of this same email has been sent to all the people in her address book. The next day, the computer lab is closed because it and all the other computers on the network have been infected. Dang it! She has a paper due! Why did they close the lab?? Megan ReesERMS 5/13
  • Slide 20
  • Brian is a computer programmer at Synco Systems International. Its an awesome company and he gets paid really well. He loves his job. Hes just finished writing a new software program for the company that will be used Internationally by hundreds of employees. He loves his job SO much. Three weeks later, Brian is shocked to find out hes been let go due to company cutbacks. Brian is SO ticked off. Strangely, within minutes of Brians name being removed from the company database, the software program suddenly goes down, causing a huge breach in the company. Weird. Megan ReesERMS 5/13
  • Slide 21
  • Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002. Megan ReesERMS 5/13