Done By:Salha Mohammed Obaid AL-kaabi ID:201211567
Slide 2
What is virus? Type of virus Trojan Horses Popular Trojan
horses Worm Example of Worm(Code Red) To keep your computer and
data secure Type of antivirus software References
Slide 3
A virus is a small piece of software that piggybacks on real
programs. All viruses are attached to an executable file, which
means the virus may exist on your computer but it actually cannot
infect your computer unless you run or open the malicious
program.
Slide 4
FF ile infector virus IInfect program files BB oot sector virus
IInfect the system area of a disk MM aster boot record virus
iinfect disks in the same manner as boot sector viruses. MM
ulti-partite virus iinfect both boot records and program files MM
acro virus iinfect data files. Examples: Microsoft Office Word,
Excel, PowerPoint and Access files
Slide 5
It is a type of malware that masquerades as a legitimate file
or helpful program possibly with the purpose of granting a hacker
unauthorized access to a computer.
Slide 6
Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman)
Y3K Remote Administration Tool (by Konstantinos & Evangelos
Tselentis) Back Orifice (Sir Dystic) Beast Zeus The Blackhole
exploit kit Flashback Trojan (Trojan.BackDoor.Flashback)
Slide 7
Small piece of software that uses computer networks and
security holes to replicate itself. Copy itself to the new machine
using the security hole and start replicating. The worm has been
designed to tunnel into your system and allow malicious users to
control your computer remotely.
Slide 8
Code Red made huge headlines in 2001. Code Red designed to do
three things: Replicate itself for the first 20 days of each month.
Replace web pages on infected servers with a page that declares
Hacked by Chinese Launch a concreted attack on the White House Web
server
Slide 9
Four steps to keep your computer and your data secure: 1. Get
the latest Anti-Virus Software. 2. Make sure you have the latest
security patches and hot fixes using Windows Update. 3. Use a
Host-Based Firewall. 4. Back up your Important Files.