Unit 2 Computer Systems 1wiki.computing.hct.ac.uk/.../btec/level3/antivirus.pdf · 2016. 11. 8. ·...
Transcript of Unit 2 Computer Systems 1wiki.computing.hct.ac.uk/.../btec/level3/antivirus.pdf · 2016. 11. 8. ·...
Anti Virus - MalwareUnit 2 Computer Systems
Todays session
• What is Anti Virus
• Why is it important
• Anti Virus Types
Virus
• What is a Computer Virus?
• A small software program that can be designed to spread from one computer to another and to interfere with computers operation.
Computer Virus
What are the impacts?
• Making your computer crash.
• Deleting important files.
• Deleting everything on your Hard Drive.
• Infecting your memory sticks.
• Hacking your e-mails (spamming contacts).
• Collecting sensitive data such as pin numbers or bank details.
• Possibly making your computer unusable.
Viruses
• Trojans
• Worms
• Botnets
• E-mail Viruses
In Pairs produce a presentation on
Viruses
• Trojans, Worms, Botnets, E-mail Viruses Etc….
• Your presentation must be 5 minutes long,
• Your presentation can be on any virus or a mixture of viruses, only put in what you think is relevant
Present to the class
Trojans• Trojans, as in 'Trojan Horse', are a
type of computer virus which can be installed on your computer without you realising.
• Trojans can install a ‘keystroke logger’, which records all the keys you press on your computer keyboard.
• Some try to capture passwords entered at certain web sites by capturing keystrokes or taking a picture of the screen. This information is then sent to the fraudsters.
• Trojans are malicious programs which look innocent, fool you into accepting them, and then more or less take over your computer.
• You can go on using your PC or laptop while a criminal is also using it, remotely, for illegal purposes.
• Criminals have also designed programs called ‘rootkits’, which hide the fact that your computer has been
Worms• A computer worm is a self-
replicating computer program that penetrates an operating system with the intent of spreading malicious code.
• Worms utilise networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email.
• Worms can also install backdoors on computers.
• Worms are often confused with computer viruses; the difference lies in how they spread.
• Computer worms self-replicate and spread across networks, exploiting vulnerabilities, automatically; that is, they don’t need a cybercriminal’s guidance, nor do they need to latch onto another computer program.
Botnets • The term bot is short for robot.
• Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie)
• When this occurs, your computer can perform automated tasks over the Internet, without you knowing it.
• Criminals typically use bots to infect large numbers of computers. These computers form a network, or a botnet.
• Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud.
• If your computer becomes part of a botnet, your computer might slow down and you might inadvertently be helping criminals.
E-mail Virus • An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be re-mailed to everyone in your address book.
Notable viruses and worms
• ILOVEYOU (2000) One of the most widespread ILOVEYOU and rapidly spreading viruses via e-mail, posing as an executable attachment sent by a friend from the target's contact lists.
• MYDoom-Also known as W32.MyDoom@mm , MyDoom is the most destructive computer virus in history.
• Spotted first in January 2004, the virus rapidly spread through emails, exceeding previous records set by any other worm.
• Email messages containing the worm were often masked as delivery failures, prompting many to open the message and investigate it.
• The worm carried two payloads- one was a backdoor entrance from where the intruder can actually control the infected computer, and the other one was a DDos attack.
THERE ARE THOUSANDS MORE
Other methods of Attack
Spyware, tracking cookies adware and pop ups.
How to Prevent Viruses
• Install an antivirus program.
• keep it up-to-date because, New viruses can appear daily.
• Scan your pc and memory sticks often.
• Don't open email messages from unfamiliar senders, or email attachments that you don't recognize.
• E-mail attachments may contain viruses.
• Use a pop-up blocker with your browser.
• This will help prevent harmful pop ups that will prompt you to download possible viruses.
• Keep Windows updated.
• Microsoft releases special security updates that can help protect your computer.
• You can minimise the risks by turning on Windows automatic updating.
How to Prevent Viruses
• Use a firewall.
• A firewall program can alert you to suspicious activity if a virus or worm attempts to connect to your computer.
• Clear your Internet cache and your browsing history.
• Browsers store information about the websites you visit.
• Passwords and personal information are stored.
• It is important to clear this information in case you get infected.
• Use a secure Password
• Use an detailed encryption for any secure web browsing
• Such as Banking, Emails, College log on, Facebook, Skype, Twitter.
14
Task
Produce a booklet, using Publisher.
• The booklet should include,
• What is a computer virus.
• How it is detected.
• The effect it has on a computer (damage).
• How it can be passed on 3 examples in detail.
• How to prevent a virus on your pc.
• How to prevent passing a virus on 3 example in detail.
• And information on the virus your group investigated.
• How to remove it.
Anti Virus Software
What is antivirus software?
Microsoft say -
• Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as Microsoft Security Essentials.
Types of Antivirus
• Bitdefender Antivirus Plus
• Norton AntiVirus
• AVG AntiVirus FREE
• Mcafee
• BullGuard
• Kaspersky-lab
• Trend Micro
• Microsoft SE
• Windows Defender
Task
• From the list produce a table highlighting 3 Antivirus software's Pros and Cons.
• As a result you will grade your AV from 1-3
• Explain why you have chosen them to be in that order,
• Relating the order to your pros and cons this may include things like
• Functions
• Size
• Speed
• Credibility
• Cost
Table Example
PROS CONS BOTTOM LINE
Excellent protection against malware attack on a clean system. Effective malware clean-up. Toolbar offers secure search, Do Not Track, Facebook view, more. Includes secure deletion file shredder. Free!
Difficult installation on malware-infested test systems. Some users may object to numerous upsell attempts.
You'll get excellent free antivirus protection from AVG.over all rank 1
What do we know
• What is a computer Virus?
• How can it get on to our system?
• 3 ways we can protect ourselves
• How can we remove a Virus?