The most popular threat that face computers are viruses,
A virus is a program written intentionally to change the way your computer operates without your permission or knowledge. Their behavior is similar to how real-life biological viruses work, and the ways of dealing with them can be quite similar as well!
A virus attaches copies of it to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk.
Maybe all of you know these information about computer viruses ,but do you know what was the first virus appeared in the world , who created it
He is Richard Skrenta( showing his picture in the powerpoint)
Other type of threats are Worms
They are the most effective and dangerous threats because they replicate and spread by them self without even opening the file, hackers often use this type to gain access to the computers that they infect. Worms can also spread by copying themselves from disk to disk or by email.
The most dangerous worm ever created is I LOVE YOU worm. It was first noticed in Philippines on May 4 2000 and then spread all over world in just one day!
Affecting 10% internet users all around the world and causing loss of about $5.5 billion.
It arrives in email inbox with subject “ILOVEYOU”. It had an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”.
Also, it sent the worm to everyone on victim contact list. Although, worm spread very fast. Only windows users were affected.
The other type of threats is Trojan horse;
Trojan horses are programs that appear to serve some useful purpose or provide entertainment; it looks like an interesting program with a beautiful link. It’s mostly annoying but some times it damages files.
I will show you how it’s done briefly…( in the computer)
I talked to you about some of the threats; and know I will tell you how to protect your self from them
1. Never open an e-mail, attachment, or click on an e-mail link from any unknown source.
2. Use antivirus software that includes e-mail scanning. I recommend Kaspersky Anti-Virus 2010(have a sample and show the students) or Shield Deluxe anti virus
3. Install a firewall on your computer.
4. Change your password regularly and create a smart password with different characters.
5. Always back up your system in case your computer was attacked you not lose your data.
But what if your computer was attacked, what you will do if you faced a hacker or your e-mail was stolen. Don’t worry I will tell you what to do
Bad news—you've suffered a virus attack. Take a few seconds to get over the initial shock, but only a few seconds. =)
It can quickly go through your system, destroying files, corrupting data, rendering applications useless, and in general causing many problems. You need to act immediately. Follow the steps below to remove the virus and restore your. - First of all disconnect the machine from the network to not infect other computer. - Once the computer has been disconnected, you need to remove the virus by cleaning up the system Use virus removal tools written for the specific virus causing the damage. - If your operating system is completely destroyed, you'll need to reinstall. Use the 'quick restore' CD that came with your computer to restore your computer to its original configuration. - Scan for viruses. After restoring, scan your entire network from viruses.
It is very easy to deal with a virus but what if you had to deal with a haker a person who breaks into computers or a cracker a person who steals passwords.
But just be aware that not all hackers are dangerous or have bad intention some times they just do it for fun.
I am going to try (only trying) to come up with some good ways to either force the hacker to leave or have them leave legally.
- First off all, just try to avoid them
- When you are not using your computer, disconnect it from the Internet. One of the worst things that can happen is when a hacker breaks into your computer and you don't even know it
- Never post your IP address in a public place. This is like inviting a hacker to your door. Once they know your Internet Protocol address (four numbers divided by periods e.g. 168.320.001.01) they can begin hacking you.
- but if your computer is already been hacked , just report hacking by taking a recording and screenshots. Don't be afraid of being targeted.
In conclusion , computer threats maybe not as important as some of other topics discussed . but still just as real ! will viruses kill anyone?..probably not. Will they cause an epidemic? I doubt it. But computer threats are larger threats to society than most people realize.
Therefore , weather you are writing a college report or your saving your best friend picture, just remember what are the threats that can in a blink destroy everything . so write away protect yourself because you never know when you'll be attacked.
[pic]
You May Also Find These Documents Helpful
-
A computer virus is a program that can copy itself and infect a computer without the user knowing. Some viruses are made to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but replicate themselves and perhaps make their presence known by displaying text, video, or audio messages. Even these benign viruses can create problems for the computer. They usually take up computer memory used by other programs. As a result, they often cause crazy behavior and can result in system crashes. Also many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.…
- 437 Words
- 2 Pages
Satisfactory Essays -
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…
- 827 Words
- 4 Pages
Good Essays -
of damage to other operating sytems, which only infects computers on Michelangelo's birthday. Computers usually get viruses through downloading and installing…
- 1630 Words
- 7 Pages
Powerful Essays -
Although computer viruses and biological viruses are not related in any way, they are very similar in many aspects. Both viruses need a host to replicate for a means of survival. Similarly, both enter their hosts passively. Biological hosts are infected by breathing, ingestion, or direct contact while infected software, email attachments and transfers infect the cyber host. Another notable similarity is the fact that both computer and biological viruses need the proper host as well as software and tissue specificity to reproduce efficiently. Computer viruses spread by inserting copies of itself in executable code and documents. Computer viruses can reduce the rate of computer performance, make files inaccessible, or completely wipes out the computer. In comparison, biological viruses replicate at the cost of the host by inserting itself into their cells which can result in pain, fever, and in the worse case, death.…
- 442 Words
- 2 Pages
Good Essays -
of this speech you will understand how a Hackers mind works and how to defend…
- 679 Words
- 3 Pages
Good Essays -
Second kind is the worm, is has a self replicating ability that spreads itself through computer network. It search for loopholes in the network copies itself and reaches another computer in the network. This kind of virus invades the kernel of the computer that makes it halt and become slow. It replicates in drastic number that make duplicates of files that cause confusion in the computer user.…
- 639 Words
- 3 Pages
Good Essays -
A virus causes several deleterious effects in a computer. A virus might delete or corrupt…
- 3458 Words
- 14 Pages
Powerful Essays -
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory…
- 2000 Words
- 8 Pages
Good Essays -
Just like in the human body, a virus can spread throughout a person’s computer, sometimes without a fighting chance, and become contagious to any other computers on the network or to others via email. There are three main types of “destructive” or “annoying” categories that can be downloaded via the internet or an email. They are Trojan horses, worms, and viruses. “In many cases, e-mail viruses are not "true" viruses because they cannot replicate without human interaction” (How Stuff Works). Trojan horses can simply hide the destructive application in a “package” that must be opened. Usually the package will come in the form of an attached, misleading application that the attacker will prompt the user to open. Once opened, this trojan can be so dangerous as to find the other contacts in your address book and send…
- 2028 Words
- 9 Pages
Better Essays -
Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…
- 3844 Words
- 14 Pages
Powerful Essays -
Gregg Keizer Techweb News June 2004. http://www.informationweek.com/worst-caseworms.com Research work done by Nicholas Weaver & Vern Paxon two security researches who worked in collaboration with ICSI and University of California at Berkley…
- 985 Words
- 4 Pages
Good Essays -
a. A virus is a simple program that spreads by infecting files in areas of a computer or a router’s hard drive and then making copies of itself. Some viruses will do no damage but just spread form computer to computer and there are others that will destroy files. Viruses spread primarily through email messages and when people share portable media device, for example USB drives and floppy disks. (Virus 1)…
- 1358 Words
- 6 Pages
Better Essays -
5. Ways of computer viruses enter your computer Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.…
- 836 Words
- 4 Pages
Better Essays -
A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk, and also spread through downloads on Internet. They can be hidden in pirated software or in other files or programs that you might download. Including the first Internet Worm, were written as experiments or pranks. Today, malicious software is used primarily to steal sensitive information of personal, financial, or business importance by black hat hackers with harmful intensions. Worms spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known. Worms aren’t always destructive to computers, but they usually cause computer and networks performance stability problems. A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of it over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of…
- 4229 Words
- 17 Pages
Good Essays -
The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user.…
- 4910 Words
- 20 Pages
Better Essays