SlideShare une entreprise Scribd logo
1  sur  29
Virus
&
Hacker
Lan Anh
Linh (Pi)
Thanh Huyen
OUTLINE
Virus Hacker Prevention
Virus
Definition Classification
Working Symptoms
Definition
• A computer virus is a program that can
copy itself and infect a computer
• A computer virus has 2 major
characteristics:
 the ability to replicate itself
 the ability to attack to anther file
Workingofviruses
Infector
copies
the
viruses
Detonator
performs
the virus’s
main work
Computer
is infected
with
viruses
Classification
Environment
Network virus File virus Boot virus File-boot virus
Classification
Method
of
infecting
•Resident
•Non- resident
Classification
Working
algorithm
Parasitic Mutants Replicators
Trojan
horse
Invisible
Symptoms
 Slow response and slow program execution
 Random hard drive crash and restart
 Distorted graphic and text
 File have mysteriously vanished
 Extensive pop-up ads
 Inability to open file with existing password
HACKER
Definition Purposes
Hacking process Classification
Negative effects
Definition
• A hacker originally means someone who
like to do new things with computers.
• In the computer security context, a
hacker is a person who uses a computer
to look at and/or change information on
another computer without permission.
Classification
Level of
knowledge
Code Programmer
Admins
Script kiddie
Cap or
characteristic
White Hat- Ethical Hackers
Black Hat- Malicious Hacker
Grey Hat, Blue Hat…
Purpos
es
Credit Card Information
(for money)
Identity TheftBusiness Information
Hacking process
Foot Printing
Scanning
Enumeration Gaining Access
Privilege
Escalation
Pilfering
Creating
Backdoors
Covering
Tracks
Stage 1 Stage 2 Stage 3
Negative effects
Financial losses Loss of information
Prevention
Viruses Hacker
Prevention virus
Do not open unknown attachments in emails
How to prevent viruses
Download files only from trusted sites
How to prevent viruses
How to prevent viruses
Use Anti-virus Protection Software and update regularly
How to prevent viruses
• replace files with your
backup copy
• store your backup copy in a
separate location from your
work files
Create backup files
Prevention hacker
Install a firewall
 Firewalls refer to either software or
hardware:
block network traffic coming to and
leaving a system
give permission to transmit and receive
only to user-authorized software
How to prevent hacker
Install Anti-spyware programs
How to prevent hacker
Advertising
Collecting personal
information
Changing the
configuration of
computer
Use strong passwords
Don’t use:
real words or combinations
thereof
numbers of significance
similar password for all your
accounts
How to prevent hacker
Virus Hacker Prevention
Conclusion
Virus and hacker
Virus and hacker

Contenu connexe

Tendances

P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 

Tendances (18)

Malware
MalwareMalware
Malware
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Ppt123
Ppt123Ppt123
Ppt123
 
Internet threat
Internet threatInternet threat
Internet threat
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Virus
VirusVirus
Virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Biometric devices & Malware
Biometric devices  & MalwareBiometric devices  & Malware
Biometric devices & Malware
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malwares
MalwaresMalwares
Malwares
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 

Similaire à Virus and hacker

Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 

Similaire à Virus and hacker (20)

Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdfCHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Malicious
MaliciousMalicious
Malicious
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
virus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdfvirus-part2-150726093824-lva1-app6891.pdf
virus-part2-150726093824-lva1-app6891.pdf
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
 
Virus part2
Virus part2Virus part2
Virus part2
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 

Virus and hacker