Viruses, Spyware , Malware and Phishing

16
Viruses, Spyware, Malware and Phishing

description

Viruses, Spyware , Malware and Phishing. Understand what a virus is and the different types of viruses which can infect a computer Know how to avoid viruses Understand how to remove a virus from a PC. Computer Virus. - PowerPoint PPT Presentation

Transcript of Viruses, Spyware , Malware and Phishing

Page 1: Viruses,  Spyware ,  Malware  and  Phishing

Viruses, Spyware, Malware and Phishing

Page 2: Viruses,  Spyware ,  Malware  and  Phishing

• Understand what a virus is and the different types of viruses which can infect a computer

• Know how to avoid viruses

• Understand how to remove a virus from a PC

Page 3: Viruses,  Spyware ,  Malware  and  Phishing

Computer Virus

A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can replicate

themselves.

Page 4: Viruses,  Spyware ,  Malware  and  Phishing

How do viruses spread?

You often download the virus without realising, it might be attached to a

another file, for example a picture or program you actually want.

Page 5: Viruses,  Spyware ,  Malware  and  Phishing

How do viruses spread?

Viruses can be downloaded by opening an email attachment, never open an

email attachment from someone you do not know!

Page 6: Viruses,  Spyware ,  Malware  and  Phishing

Spyware

Spyware monitors user activity on the Internet and transmits that information in

the background to someone else. Spyware can gather information about e-mail addresses

and even passwords and credit card number

Page 7: Viruses,  Spyware ,  Malware  and  Phishing

Phishing

Phishing is when you receive an e-mail falsely claiming to be a legitimate

company in an attempt to scam the user into surrendering private information that will be

used for identity theft. Often the e-mail directs you to visit

a website where you are asked to update personal information, such as passwords and credit card, social security, and bank account

numbers. The Website, however, is bogus and set up only to steal your information.

Page 8: Viruses,  Spyware ,  Malware  and  Phishing

Worms> Self replicating malware

>Uses a computer network to make copies of itself and infect computers

Page 9: Viruses,  Spyware ,  Malware  and  Phishing

Trojan horse

• Software that will be downloaded for a useful purpose, e.g. Free software

• However, it also steals information or harms the system

Page 10: Viruses,  Spyware ,  Malware  and  Phishing

How can you protect your PC?

• Install an anti-virus program

• Update software regularly

• Use strong passwords and keep them secret

• Never turn off your firewall

• Be cautious when downloading software or files fro the internet

Page 11: Viruses,  Spyware ,  Malware  and  Phishing

ActivityChoose one of the viruses below. Use the internet to

find out:

• How is spread• What it did• How many computers were infected

Love bug worm Melissa computer virusNimda virusCode Red Bugbear Blaster

Page 12: Viruses,  Spyware ,  Malware  and  Phishing

Quick Questions

Page 13: Viruses,  Spyware ,  Malware  and  Phishing

Q1:What is a firewall?

A – Antivirus software

B – Software that logs internet activity

C – A filter for a internet connection

Page 14: Viruses,  Spyware ,  Malware  and  Phishing

Q2:What is phishing?

A - decryption method that uses complex algorithms

B - A method of online identity theft

B - A way to send spam mail to millions of people at once

Page 15: Viruses,  Spyware ,  Malware  and  Phishing

Q3: What is the best way to protect your PC?

A – To avoid using a USB drive with the computer

B - To install an up to date anti virus program from a trusted source

C – To avoid emails

Page 16: Viruses,  Spyware ,  Malware  and  Phishing

KeywordsPhishing

Spam

Firewall

Virus

Network

Anti-virus

Malware

Spyware

Worm