SlideShare une entreprise Scribd logo
1  sur  11
What is computer virus?
- Attached to a small pieces of computer
code, software, or documents.
- A virus executes when the software is
run on a computer. If the virus spreads
to other computers. Those computers
could continue to spread the virus.
- A virus is transferred to another
through e-mail, file transfers, and
instant messaging.
- A virus has a potential to corrupt or even delete files on your computer, use e-mail to
spread itself to other computers, or even erase your hard drive.
What is Worm?
- Is a self-replicating program that is
harmful to networks.
- Worm uses the network to duplicate
its code to the hosts on a network, often
without any user intervention.
- Different from the virus because the
worm does not need to attach to a
program to infect the host.
- It harms networks because it
consumes bandwidth.
BANDWIDTH - describes the maximum data
transfer rate of a network or
Internet connection.
- measures how much data can be
sent over a specific connection in
a given amount of time.
What is Trojan Horse?
- Technically is a worm.
- Does not need to attached to other software
instead Trojan threat is hidden in software that
appears to do one thing, and yet behind the
scenes it does another.
Security Procedures
• Use a security plan to determine what will be done
in critical situation.
• Security plan should be constantly updated to
reflect the latest threats to a network.
• To be reviewed every year.
• Conduct tests to determine areas where security is
weak.
Most commonly known anti-virus
software
Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect
a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent updates.
SECURITY POLICY - most organizations established this
policy stating that employees are not permitted to install
any software that is not provided by the company.
Data Encryption
• Encrypting data involves using codes and ciphers.
• Can help prevent attackers from monitoring or
recording traffic between resources & computers
VPN – Virtual Private Network is any encryption
system that protects data as though it resides on a
private network.
Port Protection
• Firewall – is a way of protecting a computer from
intrusion through the ports.
• With port connection, the user can control the type
of data sent to a computer by selecting which ports
will be open & which will be secured.
• Traffic – the data being transported on a network.
Enabling Windows 7 Firewall
1. Open Windows 7 Firewall by clicking the Start button, and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you
want help protect, and then click OK.

Contenu connexe

Tendances

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 

Tendances (20)

Network security
Network securityNetwork security
Network security
 
What is malware
What is malwareWhat is malware
What is malware
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer security
Computer securityComputer security
Computer security
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 

En vedette

BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 

En vedette (20)

Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Materials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing DevicesMaterials, Tools, Equipment and Testing Devices
Materials, Tools, Equipment and Testing Devices
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
Moodboard as
Moodboard asMoodboard as
Moodboard as
 
Dental courses in delhi
Dental courses in delhiDental courses in delhi
Dental courses in delhi
 
Cетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личностиCетевое общество. Духовно-нравственное развитие личности
Cетевое общество. Духовно-нравственное развитие личности
 
Sigma type
Sigma typeSigma type
Sigma type
 
тима о. о.
тима о. о.тима о. о.
тима о. о.
 
туркула л. в.
туркула л. в.туркула л. в.
туркула л. в.
 
стецько н. б.
стецько н. б.стецько н. б.
стецько н. б.
 
погоріла о. с.
погоріла о. с.погоріла о. с.
погоріла о. с.
 
Hotdesking Feedback
Hotdesking FeedbackHotdesking Feedback
Hotdesking Feedback
 
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
Dzīvojamā fonda atjaunošanas problēmas, risinājumi un ieguvumi iedzīvotājiem ...
 
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...Data Science Portugal  Meetup 7 - Machine Learning & Data Science Safety Remi...
Data Science Portugal Meetup 7 - Machine Learning & Data Science Safety Remi...
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi datiCloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
Cloud Backup e Cloud Object Storage: come mettere in sicurezza i tuoi dati
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 

Similaire à Viruses, worms, and trojan horses

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 

Similaire à Viruses, worms, and trojan horses (20)

Firewall
FirewallFirewall
Firewall
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Mitppt
MitpptMitppt
Mitppt
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Firewall
FirewallFirewall
Firewall
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer networking
Computer networking Computer networking
Computer networking
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Network security
Network securityNetwork security
Network security
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 

Plus de EILLEN IVY PORTUGUEZ

Plus de EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 

Dernier

%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Dernier (20)

WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 

Viruses, worms, and trojan horses

  • 1.
  • 2. What is computer virus? - Attached to a small pieces of computer code, software, or documents. - A virus executes when the software is run on a computer. If the virus spreads to other computers. Those computers could continue to spread the virus. - A virus is transferred to another through e-mail, file transfers, and instant messaging. - A virus has a potential to corrupt or even delete files on your computer, use e-mail to spread itself to other computers, or even erase your hard drive.
  • 3. What is Worm? - Is a self-replicating program that is harmful to networks. - Worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. - Different from the virus because the worm does not need to attach to a program to infect the host. - It harms networks because it consumes bandwidth.
  • 4. BANDWIDTH - describes the maximum data transfer rate of a network or Internet connection. - measures how much data can be sent over a specific connection in a given amount of time.
  • 5. What is Trojan Horse? - Technically is a worm. - Does not need to attached to other software instead Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another.
  • 6. Security Procedures • Use a security plan to determine what will be done in critical situation. • Security plan should be constantly updated to reflect the latest threats to a network. • To be reviewed every year. • Conduct tests to determine areas where security is weak.
  • 7. Most commonly known anti-virus software
  • 8. Virus Protection Software • Known as Antivirus Software • Antivirus software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. • Becomes outdated quickly, the technician is responsible for applying the most recent updates. SECURITY POLICY - most organizations established this policy stating that employees are not permitted to install any software that is not provided by the company.
  • 9. Data Encryption • Encrypting data involves using codes and ciphers. • Can help prevent attackers from monitoring or recording traffic between resources & computers VPN – Virtual Private Network is any encryption system that protects data as though it resides on a private network.
  • 10. Port Protection • Firewall – is a way of protecting a computer from intrusion through the ports. • With port connection, the user can control the type of data sent to a computer by selecting which ports will be open & which will be secured. • Traffic – the data being transported on a network.
  • 11. Enabling Windows 7 Firewall 1. Open Windows 7 Firewall by clicking the Start button, and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want help protect, and then click OK.