1 / 12

Security Threat

Security Threat. By: Zach Brodsky. A Software Research and Microsoft PowerPoint Lab. Instructor: Jason Long Class: IST 110 Author: Zach Brodsky Date:5/28/09. Objectives. Select two examples of security topics (i.e. type of viruses, type of worms, etc.)

taipa
Download Presentation

Security Threat

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Threat By: Zach Brodsky

  2. A Software Research and Microsoft PowerPoint Lab • Instructor: Jason Long • Class: IST 110 • Author: Zach Brodsky • Date:5/28/09

  3. Objectives • Select two examples of security topics (i.e. type of viruses, type of worms, etc.) • Explain the threat and how you get it • Explain how you remove the threat

  4. Computer Virus • Computer virus attaches itself to a program or file • Spreads from one computer to another (in a form of executable code) • Needs to have a human aspect to spread by being sent over a network, Internet, or a removable medium • Removable medium: CD, DVD, USB Drive

  5. Worm • Considered to be a subclass of virus • Can replicate itself and be sent out hundreds or thousands of times • Example: sends out copy to your address book, copies itself and sends to everyone in their address book and so on • Worm consumes too much system memory and causes servers to stop responding • Different from viruses because it exploits security vulnerabilities to be sent to other computers without a human aspect

  6. Trojan Horses • Program that looks like it is useful software but it will cause damage once it is ran or installed • Opens a backdoor which allows other users to access your computer • Different than virus and worm because it doesn’t replicate itself or reproduce by infecting other files

  7. Bot (Zombie) • Type of malware that allows an attacker to gain control of computer • DoS attacks against websites and phishing • Denys access to different websites • Hide in your computer • Have names similar to system file names and processes • Different because authors of bots always update the bot to avoid antivirus software

  8. Spyware • Collects information about user without the user being aware • Could also install additional software and redirect Web browser activity • Slows computers • Different viruses and worms: doesn’t replicate itself

  9. Security Topics • Email Worm: infected email can include links or attachments. • Click on link or download attachment to get the worm. • For information and steps to remove an email worm use the following website: • http://antivirus.about.com/library/weekly/aa091801c.htm

  10. Security Topics cont. • Remote Access Trojan: Provides attacker with complete control of victim’s system • Hidden in games or other small programs • Use the below site to download an Automatic Remote Access Trojan Removal • http://www.2-spyware.com/remove-remote-access-trojan-0-2a.html

  11. Conclusion • Viruses need a human aspect to be sent across networks • Worms replicate themselves • Trojan horses disguise themselves as harmless programs • Spyware collects information about unaware users

  12. Bibliography • http://en.wikipedia.org/wiki/Computer_virus • http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp • http://en.wikipedia.org/wiki/Spyware#Spyware.2C_virus_and_worm • http://netsecurity.about.com/od/frequentlyaskedquestions/qt/pr_bot.htm • http://antivirus.about.com/od/securitytips/a/emailsafety.htm • http://antivirus.about.com/library/weekly/aa091801c.htm • http://www.webopedia.com/TERM/R/Remote_Access_Trojan.html

More Related