4
Computer Security and Viruses What is a virus? Not unlike a virus in nature, a computer virus is a piece of code (a program) that replicates by being copied or it initiates its copying to another program, computer boot sector or document. Can be transmitted as e-mail attachments, in a download file or be present on diskette. Some are immediate in the harm they do Some lie dormant until they are initiated by circumstance or time Often increase their chance of spreading by infecting files that are accessed by multiple computers on a networked system Harmful viruses can erase data, cause a hard drive to fail (require reformatting), yet some can be playful with no ill intent. Types of Viruses File infectors Attach themselves to program files usually aimed at .com or .exe files Loading the file loads the virus Some arrive as independent programs or scripts attached to e- mail System or boot-record infectors Infect executable code found on system areas of the disk or hard drive. Attached to the boot sector on a disk they are undetectable until you reboot the computer, and can make the computer inaccessible Macro viruses Most common and causes the least damage Often insert unwanted words and phrases into documents Protection Know your sources are clean,

Computer Security and Viruses

Embed Size (px)

DESCRIPTION

Summary Computer Security and Viruses

Citation preview

Computer Security and Viruses

Computer Security and Viruses

What is a virus?

Not unlike a virus in nature, a computer virus is a piece of code (a program) that replicates by being copied or it initiates its copying to another program, computer boot sector or document.

Can be transmitted as e-mail attachments, in a download file or be present on diskette.

Some are immediate in the harm they do

Some lie dormant until they are initiated by circumstance or time

Often increase their chance of spreading by infecting files that are accessed by multiple computers on a networked system

Harmful viruses can erase data, cause a hard drive to fail (require reformatting), yet some can be playful with no ill intent.

Types of VirusesFile infectors

Attach themselves to program files usually aimed at .com or .exe files

Loading the file loads the virus

Some arrive as independent programs or scripts attached to e-mail

System or boot-record infectors

Infect executable code found on system areas of the disk or hard drive. Attached to the boot sector on a disk they are undetectable until you reboot the computer, and can make the computer inaccessibleMacro viruses Most common and causes the least damage

Often insert unwanted words and phrases into documents

Protection Know your sources are clean, avoid sites that show they have had previous problems look at site advisor notices only open email from sources you know Run anti-virus software Can be configured to scan emails prior to them getting in your inbox Searches hard drive and floppy disks for potential threats e.g. Of free software AVG, Avast, Avira and KasperskySo, where are the Trojans, worms, spyware, dishonest adware etc??Malware malicious software any software that executes a process without a users consent

designed to disrupt computer operation

collect sensitive information

gain unauthorized access to a system

Types of MalwareWorms

self-replicating computer program uses the network to send itself to other computers does not attach to an existing program usually cause harm to a network (even if only taking up bandwidth)Trojan horse

usually make copies of themselves (but not usually), steal information, or harm the host computer

they appear as helpful programs

downloaded by Drive-by downloads (download authorized by a unknowing user)

worst one is a program that claims to get rid of viruses, but actually introduces them to the computer

Spyware collects information about a user from the computer (personal info, internet surfing habits)

hidden from user and hard to detect

can be used to monitor a networks activity

Adware software package which automatically allows for advertisement (often pop-ups)

can be spyware

Rootkit Stealthy software designed to hide certain programs from detection.

Enables continued privileged access to a computer (as root or administrator of the system)

Protection

If you suspect malware us an anti-malware application (e.g. Malwarebytes, Spyware Doctor, Spybot S&D, SuperAntiSpyware) Make sure you have anti-virus software that includes malware as wellFirewall

A firewall is a program or a hardware device that can be used to help protect a network from hackers who might try to break in and gain access to your data. The firewall filters the information coming through the Internet connection into your personal computer or into a company's network. It is set up to allow mainly one way access Your data can get out but only that which has been given permission can get back in Data that cannot get in has been blocked Anyone who has access to the internet should have a firewall installed.Computer Maintenance and Security use a security software with a firewall (Nortons, McAfee, other free anti-virus etc) Password protect wireless networks log in as a user not as an administrator (protects OS) Maintain security updates Patches, hot fixes and service packs Only 21% are technically fixes, most are software upgrades but improves functionality of system and of hardware drivers Dont click on random links Beware of e-mail attachments from unknown sources Dont propagate chain mail or virus hoaxes (mail that tells you to delete OS system files because they are viruses) Be careful of software you download from internet Restrict remote access Backup important files and documents in case of intrusion software failureTo maintain your system:

Use Add or Remove programs from the Control Panel when removing unused applications

Removes information from your system registry (database that holds configuration information about your Windows operating system)

Defragment your hard drive occasionally (Disk Defragmenter) Places all fragments of a program together

increase available space on the hard drive

increases the efficiency and performance of the computer

Keep system cool and clean

Unplug the system before touching anything inside

Also ground yourself and the system as well.