### Understanding Computer Viruses and Worms: Protection and History ###
This comprehensive guide by Rafael Albuernes explores the nature of computer viruses and worms, their origins, types of infections, and the historical context surrounding them. It explains what constitutes a virus and a worm, detailing how they function by replicating themselves through software and networks. The evolution of these threats from the late 1980s to present day is highlighted, along with future predictions about professional attacks on data systems. Essential protective measures, such as installing anti-virus software and firewalls, are also discussed to safeguard personal and professional data. ###
### Understanding Computer Viruses and Worms: Protection and History ###
E N D
Presentation Transcript
Computer Viruses and Worms By Rafael Albuernes
What is a Virus? • What is a Worm? • Types of Infections • Origins • History • Future • How can you protect yourself?
What is a Virus? • A virus is a small piece of software that piggybacks on real programs. • Computer viruses are called viruses because they share some of the same traits of biological viruses.
What is a Worm? • A worm is a small piece of software that uses computer networks and security holes to replicate itself.
Types of Infections • Viruses • E-mail viruses • Worms • Trojan horses
Origins • People create viruses • A person writes the code • Tests it to make sure it spreads properly • Designs the virus’s attack phase • Silly message or destruction
History • Traditional computer viruses were first widely seen in the late 1980’s. • Factors • Spread of personal computers • Use of computer bulletin boards • Floppy Disk
Future • Attacks against data systems will increase and become more and more professional.
How can you protect yourself? • Install an Anti-Virus program on your computer • Install a Firewall on your computer • Close all open ports on your computer • Only use floppy’s from a trusted source
Conclusion • The virus technology used by spammers is threatening to change the entire Internet into a battle field. • We must each do our part to protect our systems.