1 / 11

Malware: A Module of the CYC Course – Computer Security

Learn about viruses and spyware, commonly referred to as malware, and how they can damage your computer and steal your personal information. Understand the reasons why someone would create malware and how it spreads. Get tips on preventing malware attacks and recommendations for free anti-virus and spyware software.

dpleasant
Download Presentation

Malware: A Module of the CYC Course – Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10

  2. Malware Viruses and spyware are often referred to as malware, short for malicious software. Malicious = vicious or mischievous A virus uses your computer as it likes. It can interfere with your computer use. It can damage files or software. Spyware uses your information. It can interfere with your computer use. It can steal your personal information.

  3. Purpose • Why would someone create a computer virus or spyware? • Vandalism • Money

  4. Bogus Link Example Why should you not trust a message such as the one below, even if it comes from a friend?

  5. Bogus Chat Message This one is trickier. Why not trust these chat messages?

  6. How Viruses & Spyware Spread User clicks on an email attachment that downloads a virus or spyware. User clicks on downloadable file on a website that downloads a virus or spyware. User clicks on link in an email, on a website or on a social network. The link takes user to a website that attacks browser and forces virus or spyware download.

  7. Symptoms Homepage changes (and you did not change it!) A lot of pop-up windows you cannot stop. Unexpected toolbars show up. Redirected to sites you did not request. Search results are provided by a different search engine than you used. Browser continues to crash inexplicably. Files disappear (because they have been erased.) Computer shuts down inexplicably. Computer extremely slow. A lot more junk email being received.

  8. Prevention Tips Keep all your operating system and all software updated. Most virus and spyware attacks occur through security holes in popular software applications. For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, virus and spyware creators target security holes in IE. Don’t click on any pop ups or ads offering you anything for free.

  9. Free Anti-Virus & Spyware Software Use an anti-virus software that scans as files are downloaded. Do not use more than one anti-virus software that runs in real time. Recommended - AVG Free Anti-Virus Use a spyware software that scans periodically. Recommended - Spybot Search & Destroy and Malwarebytes

  10. Additional Resources How Computer Viruses Work How Spyware Works

  11. Creative Commons License • This module was created by Connect Your Community, a project of OneCommunity, funded by the federal Broadband Technology Opportunities Program. • This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0 11

More Related