Top Banner
10
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ict Assignment
Page 2: Ict Assignment

VIRUVIRUSSA A Computer VirusComputer Virus is a is a

computer program which computer program which distributes copies of distributes copies of itself, even without itself, even without

permissionpermission or or knowledge of the user. knowledge of the user. Computer viruses can Computer viruses can

spread very fast.spread very fast.

Page 3: Ict Assignment

Every computer should have anti-virus Every computer should have anti-virus software on it. Use your anti-virus software software on it. Use your anti-virus software to check every file that you receive from to check every file that you receive from another person, especially files received another person, especially files received over the Internet or on a diskette. over the Internet or on a diskette.

NEVER open attachments to e-mails you NEVER open attachments to e-mails you receive unless you are expecting them. receive unless you are expecting them.

The following file types are the most The following file types are the most dangerous because they contain programs dangerous because they contain programs (as opposed to documents). NEVER open (as opposed to documents). NEVER open attachment with these extensions: attachment with these extensions: ~.exe ~.com ~.exe ~.com ~.scr ~.vbs ~.scr ~.vbs ~.cmd ~.cmd ~.bat ~.bat ~.reg ~.reg

Page 4: Ict Assignment

Don't open attachments with no Don't open attachments with no extension at all. extension at all.

On a PC, by default, Windows On a PC, by default, Windows does not show extensions. File does not show extensions. File extensions provide information extensions provide information about the type of file. Change this about the type of file. Change this setting so you can see file setting so you can see file extensions. extensions.

All computers should have a All computers should have a software firewall. software firewall.

Never download software from Never download software from the Internet unless you are sure the Internet unless you are sure you know what you are getting you know what you are getting

Page 5: Ict Assignment

Trojan horse is a program Trojan horse is a program that contains or installs a that contains or installs a malicious program . The malicious program . The term is derived from the term is derived from the classical myth of the classical myth of the Trojan Horse. Trojan Trojan Horse. Trojan horses may appear to be horses may appear to be useful or interesting useful or interesting programs (or at the very programs (or at the very least harmless) to an least harmless) to an unsuspecting user, but are unsuspecting user, but are actually harmful when actually harmful when executed.executed.

Page 6: Ict Assignment

A anti-Trojan scanner are A anti-Trojan scanner are available as a tool for prevention. available as a tool for prevention. Definite the origin of each Definite the origin of each program or file you download onto program or file you download onto your PC or when you open from your PC or when you open from you email program. you email program.

You may occasionally receive You may occasionally receive email message warning you of any email message warning you of any new Trojan horse malware. Unless new Trojan horse malware. Unless you recognize the source of where you recognize the source of where this email is coming from.this email is coming from.

Regularly check all your files Regularly check all your files and remove any viruses that are and remove any viruses that are found.found.

WAYS TO PREVENT YOUR PC FROM ATTACHING WAYS TO PREVENT YOUR PC FROM ATTACHING

TROJAN HORSETROJAN HORSE

Page 7: Ict Assignment

A salami attack is a series of A salami attack is a series of minor data-security attacks minor data-security attacks that together results in a that together results in a larger attack. For example, a larger attack. For example, a fraud activity in a bank fraud activity in a bank where an employee steals a where an employee steals a small amount of funds from small amount of funds from several accounts, can be several accounts, can be considered a salami attack. considered a salami attack.

Page 8: Ict Assignment

The amount of damage a virus can do The amount of damage a virus can do depends on how much the creator wants depends on how much the creator wants to cause. An easy way to stop most to cause. An easy way to stop most viruses is to get an anti virus program. viruses is to get an anti virus program. But they cannot always stop everything. But they cannot always stop everything. Allot of viruses are made to cripple Allot of viruses are made to cripple Microsoft programs. Which steers people Microsoft programs. Which steers people away from Microsoft. Viruses have away from Microsoft. Viruses have improved not only in ways of getting improved not only in ways of getting around but also in the damage that they around but also in the damage that they do. Technology has gone a long way and do. Technology has gone a long way and made it easier for these viruses to made it easier for these viruses to spread. In the beginning most viruses spread. In the beginning most viruses did not do that much damage and were did not do that much damage and were made out to be pranks and now they made out to be pranks and now they have turned into a criminal act.have turned into a criminal act.

Page 9: Ict Assignment

http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_virus

http://www.mum.edu/helpdesk/beginners/preventviruses.htmlhttp://www.mum.edu/helpdesk/beginners/preventviruses.html

http://www.cybertraveler.org/trojan_horse.htmlhttp://www.cybertraveler.org/trojan_horse.html

Page 10: Ict Assignment