what’s in your computer

9
Viruses, Worms, and Trojan Horses By: Laurie Madison

Upload: lmadison10

Post on 12-Jul-2015

62 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: What’s in your computer

Viruses, Worms, and Trojan Horses By: Laurie Madison

Page 2: What’s in your computer

“Computer Gremlin 2” by Larry Wentzel

Definition:

A virus is a piece of self-replicating code embedded within another program called the host.

2

How does my computer catch a virus?

Page 3: What’s in your computer
Page 4: What’s in your computer

Definition:

A Trojan horse is a program with a benign capability that conceals another, sinister purpose.

How does my computer get a Trojan horse?

Page 5: What’s in your computer

What kind of malicious tasks will a Trojan horse do?

Some examples of malicious tasks Trojan horse programs have done are:

opening an Internet connection that allows an outsider to gain access to files

logging the keystrokes of the user and storing them in a file that the attacker can see

looking for passwords stored on the computer and emailing them to the attacker

destroying files launching a denial-of-service attack on a

website turning the computer into a proxy server that

can be used to launch spam or stash information from illegal activities.

Page 6: What’s in your computer

How does my computer get a worm?

Definition:

A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!

Page 7: What’s in your computer

• Infiltrate networks spreading all by

itself through holes in your operating

system security.

• Use up your bandwidth

• Slow computer processing down

• Open a “back door” to infiltrate your

computer

• Can cause denial-of-service attacks

interrupting web services

• Deleting subscribers from Web hosts

• May be used to control your

computer or steal information

Page 8: What’s in your computer

There’s an overwhelming list of products available.

• Trend Micro

• McAfee

• Norton

• Bitfender

• And on and on…

Page 9: What’s in your computer

References

• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc.

• Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570

Thank you!

Microsoft Office Clip Art,

audiomicro.com/free-sound-effects, and

pixabay.com for the free audio and clip art