Professional Documents
Culture Documents
CHAPTER 7
KEY WORDS
COMPUTER VIRUS
ANTIVIRUS INTERNET SECURITY BACK-UP FILES HACKER UPDATE FIREWALL
11/2/2013 E. C. Zioulas (IT Teacher) 2
CAUSES OF DESTRUCTION
DAMAGED STORAGE MEDIA COMPUTER VIRUSES
11/2/2013
CAUSES OF DESTRUCTION
MISHANDLING OF THE USER
11/2/2013
WHAT IS A VIRUS?
A PROGRAM HIDDEN IN ANOTHER PROGRAM
11/2/2013
COMPUTER VIRUSES
They are malicious programs created by particular programmers, which cause many problems to computer
The first virus appeared in 1986, though up to our days there have been created almost 150.000
The virus is a piece of software (a program) that acts as a hidden attachment of another program which when is activated, the virus acts silently and harms computer functions.
E. C. Zioulas (IT Teacher) 6
11/2/2013
11/2/2013
11/2/2013
WAYS OF TRANSMISSION
EXTERNAL STORAGE DEVICES NETWORKS-INTERNET
11/2/2013
COMPUTER WORM
It is a self-replicating program (multiplied by itself) It sends through the net many copies of it to other computers
11/2/2013
10
TROJAN HORSE
It is a malicious program
Externally it harmless
seems
to
be
On the background, it installs harmful code to computer It allows external users to have access to the infected computer causing damages
11/2/2013
11
(MALICIOUS SOFTWARE)
MALWARE
11/2/2013
12
11/2/2013
13
SPYWARE
ADWARE
Programs that act silently and collect private information of the user e.g. passwords
11/2/2013
11/2/2013
16
INTERNET SECURITY
ANTIVIRUS
This software has the objective to protect user against attacks over the Internet (malware or hackers).
This software is used to prevent, detect, and remove malware from computer (including viruses, worms, Trojan horses, spyware and adware).
11/2/2013
17
11/2/2013
18
BACK-UP FILES
Copying users data in an alternative storage device (e.g. cd-rom, dvd, external disk) protects user from any possible loss.
FIREWALL
A firewall is a device designed to permit or deny network transmissions based upon a set of rules. It is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components.
11/2/2013
20
WINDOWS FIREWALL
UNAUTHORIZED INTRUDERS
HACKERS
CRACKERS
A hacker is a person who finds out weaknesses in the computer and exploits it.
Hackers may be motivated by a large number of reasons, such as profit, protest, or challenge.
A cracker is a person who breaks into a computer system without authorization, whose purpose is to cause damage (destroy files, steal credit card numbers, plant viruses)
11/2/2013
22
Class Activity 1
Classify the types of viruses according to the risk that you think they have.
11/2/2013
23
Class Activity 2
With your teachers help, run an antivirus program to scan and cure this specific malware.
Alternatively, you can visit specific antivirus pages on the Web, in order to perform virus scanning for free.
E. C. Zioulas (IT Teacher) 24
11/2/2013
11/2/2013
. ( )
25
DICTIONARY
11/2/2013
Computer virus Computer worm Trojan horse Back-up files Firewall Adware Spyware Antivirus Internet Security
E. C. Zioulas (IT Teacher) 26
EXERCISE 1
11/2/2013
27
EXERCISE 2
Fill the following concept map:
11/2/2013
28