what’s in your computer
TRANSCRIPT
Viruses, Worms, and Trojan Horses By: Laurie Madison
“Computer Gremlin 2” by Larry Wentzel
Definition:
A virus is a piece of self-replicating code embedded within another program called the host.
2
How does my computer catch a virus?
Definition:
A Trojan horse is a program with a benign capability that conceals another, sinister purpose.
How does my computer get a Trojan horse?
What kind of malicious tasks will a Trojan horse do?
Some examples of malicious tasks Trojan horse programs have done are:
opening an Internet connection that allows an outsider to gain access to files
logging the keystrokes of the user and storing them in a file that the attacker can see
looking for passwords stored on the computer and emailing them to the attacker
destroying files launching a denial-of-service attack on a
website turning the computer into a proxy server that
can be used to launch spam or stash information from illegal activities.
How does my computer get a worm?
Definition:
A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!
• Infiltrate networks spreading all by
itself through holes in your operating
system security.
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
computer
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
There’s an overwhelming list of products available.
• Trend Micro
• McAfee
• Norton
• Bitfender
• And on and on…
References
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc.
• Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570
Thank you!
Microsoft Office Clip Art,
audiomicro.com/free-sound-effects, and
pixabay.com for the free audio and clip art