You are on page 1of 28

DATA SECURITY & COMPUTER VIRUSES

CHAPTER 7

Evagelos C. Zioulas (Information Technology Teacher)

KEY WORDS
COMPUTER VIRUS
ANTIVIRUS INTERNET SECURITY BACK-UP FILES HACKER UPDATE FIREWALL
11/2/2013 E. C. Zioulas (IT Teacher) 2

CAUSES OF DESTRUCTION
DAMAGED STORAGE MEDIA COMPUTER VIRUSES

11/2/2013

E. C. Zioulas (IT Teacher)

CAUSES OF DESTRUCTION
MISHANDLING OF THE USER

INTRUSION OF UNWANTED USERS

11/2/2013

E. C. Zioulas (IT Teacher)

WHAT IS A VIRUS?
A PROGRAM HIDDEN IN ANOTHER PROGRAM

11/2/2013

E. C. Zioulas (IT Teacher)

COMPUTER VIRUSES

They are malicious programs created by particular programmers, which cause many problems to computer
The first virus appeared in 1986, though up to our days there have been created almost 150.000

The virus is a piece of software (a program) that acts as a hidden attachment of another program which when is activated, the virus acts silently and harms computer functions.
E. C. Zioulas (IT Teacher) 6

11/2/2013

Monthly Malware Statistics June 2011

11/2/2013

E. C. Zioulas (IT Teacher)

11/2/2013

E. C. Zioulas (IT Teacher)

WAYS OF TRANSMISSION
EXTERNAL STORAGE DEVICES NETWORKS-INTERNET

11/2/2013

E. C. Zioulas (IT Teacher)

COMPUTER WORM

It is a self-replicating program (multiplied by itself) It sends through the net many copies of it to other computers

It doesnt need to attach itself to an existing program


It cause serious computer networks delays to

11/2/2013

E. C. Zioulas (IT Teacher)

10

TROJAN HORSE

It is a malicious program

Externally it harmless

seems

to

be

On the background, it installs harmful code to computer It allows external users to have access to the infected computer causing damages

11/2/2013

armlessE. C. Zioulas (IT Teacher)

11

(MALICIOUS SOFTWARE)

MALWARE

11/2/2013

E. C. Zioulas (IT Teacher)

12

SCANNING COMPUTER FOR MALWARE

11/2/2013

E. C. Zioulas (IT Teacher)

13

SPYWARE

ADWARE

Programs that act silently and collect private information of the user e.g. passwords
11/2/2013

Programs that full the screen with annoying advertisements


14

E. C. Zioulas (IT Teacher)

PROTECTION MEASURES AGAINST VIRUSES

Be careful of the applications you execute


especially when they are not authentic (that means they dont come straight from their manufacturer or they are not bought from a commercial store).

Install Antivirus and Internet Security


applications that can fully protect you against the most common and offensive malware (e.g. Norton, Panda, McAfee, Kaspersky, Zone Alarm, AVG etc)

Update frequently the antivirus software


through the internet, so the computer to be updated against all the new viruses.

Activate computers Firewall


every time you connect to the Internet, so that you deter all the unwanted users to invade in your computer. This can be done as follows:

Start Settings Control Panel Windows Firewall


11/2/2013 E. C. Zioulas (IT Teacher) 15

ANTIVIRUS & INTERNET SECURITY

11/2/2013

E. C. Zioulas (IT Teacher)

16

INTERNET SECURITY

ANTIVIRUS

This software has the objective to protect user against attacks over the Internet (malware or hackers).

This software is used to prevent, detect, and remove malware from computer (including viruses, worms, Trojan horses, spyware and adware).

11/2/2013

E. C. Zioulas (IT Teacher)

17

11/2/2013

E. C. Zioulas (IT Teacher)

18

BACK-UP FILES
Copying users data in an alternative storage device (e.g. cd-rom, dvd, external disk) protects user from any possible loss.

Start Programs Accessories System tools Back-Up


11/2/2013 E. C. Zioulas (IT Teacher)

FIREWALL

A firewall is a device designed to permit or deny network transmissions based upon a set of rules. It is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components.

11/2/2013

E. C. Zioulas (IT Teacher)

20

WINDOWS FIREWALL

Start Settings Control Panel Windows Firewall


11/2/2013 E. C. Zioulas (IT Teacher) 21

UNAUTHORIZED INTRUDERS
HACKERS

CRACKERS

A hacker is a person who finds out weaknesses in the computer and exploits it.

Hackers may be motivated by a large number of reasons, such as profit, protest, or challenge.

A cracker is a person who breaks into a computer system without authorization, whose purpose is to cause damage (destroy files, steal credit card numbers, plant viruses)

11/2/2013

E. C. Zioulas (IT Teacher)

22

Class Activity 1

Chapter 7 Activity 6 (p.50)

Explore the web and find information on modes of transmission of viruses.

Classify the types of viruses according to the risk that you think they have.

11/2/2013

E. C. Zioulas (IT Teacher)

23

Class Activity 2

Chapter 7 Activity 7, 8 (p.50)

Execute the application metro.exe and write down your impressions.

With your teachers help, run an antivirus program to scan and cure this specific malware.
Alternatively, you can visit specific antivirus pages on the Web, in order to perform virus scanning for free.
E. C. Zioulas (IT Teacher) 24

11/2/2013

11/2/2013

. ( )

25

DICTIONARY

Give the explanation of the following terms:



11/2/2013

Computer virus Computer worm Trojan horse Back-up files Firewall Adware Spyware Antivirus Internet Security
E. C. Zioulas (IT Teacher) 26

EXERCISE 1

Chapter 7 Activity 9 (p. 50)


Make a list of useful safety rules that a student should follow in the computer lab, in order to protect the lab from inappropriate actions (e.g. No eating or drinking in the laboratory) and keep it in optimum condition.

11/2/2013

E. C. Zioulas (IT Teacher)

27

EXERCISE 2
Fill the following concept map:

11/2/2013

E. C. Zioulas (IT Teacher)

28

You might also like