Top Banner
Virus & Hacker Lan Anh Linh (Pi) Thanh Huyen
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Virus and hacker

Virus&

Hacker

Lan Anh

Linh (Pi)

Thanh Huyen

Page 2: Virus and hacker

OUTLINE

Virus Hacker Prevention

Page 3: Virus and hacker

Virus

Definition ClassificationWorking Symptoms

Page 4: Virus and hacker

Definition

• A computer virus is a program that can copy itself and infect a computer

• A computer virus has 2 major characteristics:

the ability to replicate itself the ability to attack to anther file

Page 5: Virus and hacker

Working of virusesInfector copies

the viruses

Detonator performs

the virus’s main work

Computer is infected

with viruses

Page 6: Virus and hacker

Classification

Environment

Network virus File virus Boot virus File-boot virus

Page 7: Virus and hacker

Classification

Method of

infecting

• Resident• Non- resident

Page 8: Virus and hacker

Classification

Working algorithm

Parasitic Mutants Replicators Trojan horse Invisible

Page 9: Virus and hacker

Symptoms

Slow response and slow program execution

Random hard drive crash and restart

Distorted graphic and text

File have mysteriously vanished

Extensive pop-up ads

Inability to open file with existing password

Page 10: Virus and hacker

HACKER

Definition Purposes Hacking process ClassificationNegative effects

Page 11: Virus and hacker

Definition

• A hacker originally means someone who like to do new things with computers.

• In the computer security context, a hacker is a person who uses a computer to look at and/or change information on another computer without permission.

Page 12: Virus and hacker

Classification

Level of knowledge

Code Programmer

Admins

Script kiddie

Cap or characteristic

White Hat- Ethical Hackers

Black Hat- Malicious Hacker

Grey Hat, Blue Hat…

Page 13: Virus and hacker

Purposes

Credit Card Information(for money)

Identity TheftBusiness Information

Page 14: Virus and hacker

Hacking processFoot Printing

Scanning

Enumeration Gaining Access

Privilege Escalation

Pilfering Creating Backdoors

Covering Tracks

Stage 1 Stage 2 Stage 3

Page 15: Virus and hacker

Negative effects

Financial losses Loss of information

Page 16: Virus and hacker

mAndy Ám Ảnh

Lạnh

Lùng

Page 17: Virus and hacker

Prevention

Viruses Hacker

Page 18: Virus and hacker

Prevention virus

Page 19: Virus and hacker

Do not open unknown attachments in emails

How to prevent viruses

Page 20: Virus and hacker

Download files only from trusted sites

How to prevent viruses

Page 21: Virus and hacker

How to prevent viruses

Use Anti-virus Protection Software and update regularly

Page 22: Virus and hacker

How to prevent viruses

• replace files with your backup copy

• store your backup copy in a separate location from your work files

Create backup files

Page 23: Virus and hacker

Prevention hacker

Page 24: Virus and hacker

Install a firewall

Firewalls refer to either software or hardware:

block network traffic coming to and leaving a system

give permission to transmit and receive only to user-authorized software

How to prevent hacker

Page 25: Virus and hacker

Install Anti-spyware programs

How to prevent hacker

Advertising

Collecting personal information

Changing the configuration of

computer

Page 26: Virus and hacker

Use strong passwords

Don’t use:

real words or combinations thereof

numbers of significance

similar password for all your accounts

How to prevent hacker

Page 27: Virus and hacker

Virus Hacker Prevention

Conclusion

Page 28: Virus and hacker
Page 29: Virus and hacker