1 / 18

Computer viruses

Computer viruses. UNEVERSITY OF PALETINE IT COLLEGE. PREPARD BY: Ahmed Abd El- ilah Ahmed Abu Ghanima. SUPERVISES BY: Mss: Yasmin Al- bobo. What is a Computer Virus???. Computer viruses are software programs that are written to a compatible harm another, or to spy on and control.

novia
Download Presentation

Computer viruses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer viruses UNEVERSITY OF PALETINE IT COLLEGE • PREPARD BY: • Ahmed Abd El- ilah • Ahmed Abu Ghanima SUPERVISES BY: Mss: YasminAl-bobo

  2. What is a Computer Virus??? Computer viruses are software programs that are written to a compatible harm another, or to spy on and control computer virus is a malicious program that spreads from computer to computer.

  3. Threats • Hackers, malicious software, and poorly designed software • Threats may exploit vulnerabilities to cause harm to users. • The malicious software or intrusion attempts are the threats that must be defended against.

  4. How does viruses invade your computer? • You have probably heard of some ways that virus can invade your computer. • Through email attachments • By clicking on a web link when surfing the web • By downloading a program that claims to be a game or cool picture • Compressed files (Zip, Cab, Arj, Rar) • Others?

  5. Program Start Virus End How Does a Virus Work??? Prepender Trouble

  6. How Does a Virus Work??? Appender PE Infector Overwriter

  7. Types of Viruses • Trojans • Stealth Virus • Boot or system • Macro • Script • Multipartite • Worms

  8. Components of Security • Back Up • Configure your software • Use Anti-virus

  9. Evidence of the presence of viruses in the computer • [V  I*] and [MM] and vV H t, j  N • [[Pt = j] and [t = 0] and (t,j,…, t,j+|v|-1) = v]  • v’V, t’, t’’, j  N and t’ > t • [[j’ + |v’|)  j] or [(j + |v|)  j’]] and • [((t’,j’,…, t’,j’+|v’|-1) = v’] and • [t’’[t < t’’ < t’] and [Pt’’  {j’,…j’ + |v’| -1}]]

  10. Configuring Explorer

  11. Attachment Handling

  12. Attachment Handling

  13. Attachment Handling

  14. Attachment Handling

  15. Attachment Handling

  16. Use Security Features!!

More Related