SlideShare une entreprise Scribd logo
1  sur  15
Avoiding Email viruses
What is a virus?

Viruses are, by definition, small infections that
   replicate inside the cells of a living organism.
Like their predecessors, a computer virus is a
   program which can replicate itself and then
   spread from one computer to another.
Sometimes, malware, adware and spyware are
   called viruses, although they cannot replicate
   themselves. Instead, they can exploit the
   security of the computer as well as computers
   within their network.
Some viruses can harm a computer’s data or
   performance, but many are harmless.
Why are viruses
created?
We all dread the knowledge that our
 computer may be infected with a
 virus. But why would anyone go
 to the trouble and expense of
 creating one? There are many
 reasons why a computer virus
 may be created. Here are some of
 them…
1. To Control the
          computer

This enables the creator of the virus to
attack web servers by having each
infected computer sent information to the
server, thus overloading the system, and
shutting down the server (which may
host a rival website). It can also be used
to send spam to infected computers.
2. To generate money

The virus may pretend to offer free
spyware or virus removal tools. Once
installed, they will “scan” your computer
and find all sorts of viruses that they will
remove, provided you pay for the full
version of the application.
3. To steal your
      information
They may actually be able to keep
track of everything you type on the
keyboard, thus providing access to
your passwords, account numbers
and personal information.
4. Just because they
          can
Yes, some people would stoop this low
to deliver a message, such as a virus
which would cause your computer to
restart with the message: “billy gates
why do you make this possible? Stop
making money and fix your software!”
(actual virus!)
5. To shut down a
 computer or network
Although viruses that shut down a
computer are not as common as they
once were, viruses to shut down a
network are very common. Known as a
DNS (denial of service), they will cause a
excess amount of activity on a network,
shutting it down eventually.
Email and viruses

One of the most prevalent ways to
spread a virus is by using Email.
Although most of us use Email on a
daily basis, many of us are naïve of
the consequences of a “bad” Email.
Let’s look at some of the ways that
viruses are spread by Email.
1. A Virus as an Email
          Hoax

Although not the worse thing that can
happen, an email may contain false
information (a child needing an organ
transplant or a virus warning). This will
not infect your computer, but can clog up
the email servers of the recipients,
making it a waste of time, resources and
energy. To read more about email
hoaxes, see Hoax-Slayer.
2. In an Email
          attachment
This is a clear reason why you don’t open
attachments if you are not sure who sent them, or if
they are authentic. These attachments can contain
viruses which run programs, or infect programs on
your computer (such as Word or Excel). The harm
only occurs if you open the attachment, so if you are
unsure, delete the email. Caution: If your contacts
have been affected by a virus, they may be sending
you a rogue infection without you knowing. In this
case, to be safe, save the attachment to your hard
drive, and then scan it with your virus scanner.
3. In the body of the
           Email

It is now possible to place a virus right into the
e-mail. In this case, the virus will be
automatically triggered when you open the
email. This is done by embedding the message
into the email. You will usually see a warning
asking you to click if you want to see embedded
information. Only do this if you are certain of
the source. Also, be wary of URLS (links to a
web page) which may actually link you to a site
where a virus will be downloaded. If you are not
certain of the sender, don’t open URLS in your
email.
Summary

• Verify the source of any suspicious email
  before you open it
• Do not blindly forward e-mail
• Do not open attachments or links unless you
  are certain of the sender
• Use caution when authorizing your computer
  to display content of trustworthy sources
• Make sure that your email program does not
  automatically download and open
  attachments or display HTML content
  (embedded)
Resources

Click on these links for more information

• Top Ways People Get Infected by an Email
  Virus
• Why do People Create Computer Viruses?
• Top Ten Best Free Anti-Virus Programs
• Top Five Current Email Scams You Should
  Know About
For more information:

  Contact me: mprine@sdccd.edu

Contenu connexe

Tendances

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

Tendances (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus
computer viruscomputer virus
computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

En vedette

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 

En vedette (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
SCORE Fellowship Final Report
SCORE Fellowship Final ReportSCORE Fellowship Final Report
SCORE Fellowship Final Report
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics mechanical eng anna university final year Project thesis of bio plastics
mechanical eng anna university final year Project thesis of bio plastics
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation Success
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
parasites
parasites parasites
parasites
 
Online grocery store
Online grocery storeOnline grocery store
Online grocery store
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Security threats
Security threatsSecurity threats
Security threats
 
Consumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery StoresConsumer Perception Towards Online Grocery Stores
Consumer Perception Towards Online Grocery Stores
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 

Similaire à Avoiding email viruses

Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
ar-rifke.com
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
Dltk Custom Writing Paper Montreat
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similaire à Avoiding email viruses (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Sowmya
SowmyaSowmya
Sowmya
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Dangers Of The Internet Essay
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
 
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptxLESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
LESSON-10-GROUP-OF-ASHLUDE_20240329_140931_0000.pptx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Virus
VirusVirus
Virus
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
When love kills
When love killsWhen love kills
When love kills
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
What types of viruses can affect your computer
What types of viruses can affect your computerWhat types of viruses can affect your computer
What types of viruses can affect your computer
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Plus de San Diego Continuing Education

Plus de San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Burning fat
Burning fatBurning fat
Burning fat
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Dernier (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Avoiding email viruses

  • 2. What is a virus? Viruses are, by definition, small infections that replicate inside the cells of a living organism. Like their predecessors, a computer virus is a program which can replicate itself and then spread from one computer to another. Sometimes, malware, adware and spyware are called viruses, although they cannot replicate themselves. Instead, they can exploit the security of the computer as well as computers within their network. Some viruses can harm a computer’s data or performance, but many are harmless.
  • 3. Why are viruses created? We all dread the knowledge that our computer may be infected with a virus. But why would anyone go to the trouble and expense of creating one? There are many reasons why a computer virus may be created. Here are some of them…
  • 4. 1. To Control the computer This enables the creator of the virus to attack web servers by having each infected computer sent information to the server, thus overloading the system, and shutting down the server (which may host a rival website). It can also be used to send spam to infected computers.
  • 5. 2. To generate money The virus may pretend to offer free spyware or virus removal tools. Once installed, they will “scan” your computer and find all sorts of viruses that they will remove, provided you pay for the full version of the application.
  • 6. 3. To steal your information They may actually be able to keep track of everything you type on the keyboard, thus providing access to your passwords, account numbers and personal information.
  • 7. 4. Just because they can Yes, some people would stoop this low to deliver a message, such as a virus which would cause your computer to restart with the message: “billy gates why do you make this possible? Stop making money and fix your software!” (actual virus!)
  • 8. 5. To shut down a computer or network Although viruses that shut down a computer are not as common as they once were, viruses to shut down a network are very common. Known as a DNS (denial of service), they will cause a excess amount of activity on a network, shutting it down eventually.
  • 9. Email and viruses One of the most prevalent ways to spread a virus is by using Email. Although most of us use Email on a daily basis, many of us are naïve of the consequences of a “bad” Email. Let’s look at some of the ways that viruses are spread by Email.
  • 10. 1. A Virus as an Email Hoax Although not the worse thing that can happen, an email may contain false information (a child needing an organ transplant or a virus warning). This will not infect your computer, but can clog up the email servers of the recipients, making it a waste of time, resources and energy. To read more about email hoaxes, see Hoax-Slayer.
  • 11. 2. In an Email attachment This is a clear reason why you don’t open attachments if you are not sure who sent them, or if they are authentic. These attachments can contain viruses which run programs, or infect programs on your computer (such as Word or Excel). The harm only occurs if you open the attachment, so if you are unsure, delete the email. Caution: If your contacts have been affected by a virus, they may be sending you a rogue infection without you knowing. In this case, to be safe, save the attachment to your hard drive, and then scan it with your virus scanner.
  • 12. 3. In the body of the Email It is now possible to place a virus right into the e-mail. In this case, the virus will be automatically triggered when you open the email. This is done by embedding the message into the email. You will usually see a warning asking you to click if you want to see embedded information. Only do this if you are certain of the source. Also, be wary of URLS (links to a web page) which may actually link you to a site where a virus will be downloaded. If you are not certain of the sender, don’t open URLS in your email.
  • 13. Summary • Verify the source of any suspicious email before you open it • Do not blindly forward e-mail • Do not open attachments or links unless you are certain of the sender • Use caution when authorizing your computer to display content of trustworthy sources • Make sure that your email program does not automatically download and open attachments or display HTML content (embedded)
  • 14. Resources Click on these links for more information • Top Ways People Get Infected by an Email Virus • Why do People Create Computer Viruses? • Top Ten Best Free Anti-Virus Programs • Top Five Current Email Scams You Should Know About
  • 15. For more information: Contact me: mprine@sdccd.edu