types of viruses spyware and malware - chsjamaica.org  · web viewa computer virus operates in two...

6
INFORMATION TECHNOLOGY GRADE 9 C - A TOPIC: COMPUTER VIRUSES INSTRUCTION: Review the handout below and make notes in your notebook and complete the task at the end of the handout: A computer virus is a malicious program that self- replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them. How does a computer virus operate? A computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate. The second type plays dead until the trigger kick starts the malicious code. In other words, the infected program needs to run to be executed. Therefore, it is highly significant to stay shielded by installing a robust antivirus program. How are viruses spread? 1. Sending infected files via e-mail 2. From a Diskette or USB Flash Drive containing an infected file

Upload: others

Post on 18-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TYPES OF VIRUSES SPYWARE AND MALWARE - chsjamaica.org  · Web viewA computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate

INFORMATION TECHNOLOGYGRADE 9 C - A

TOPIC: COMPUTER VIRUSES INSTRUCTION: Review the handout below and make notes in your notebook and complete the task at the end of the handout:

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design

computer viruses with malicious intent and prey on online users by tricking them.

How does a computer virus operate?A computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate. The second type plays dead until the trigger kick starts the malicious code. In other words, the infected program needs to run to be executed. Therefore, it is highly significant to stay shielded by installing a robust antivirus program. How are viruses spread?1. Sending infected files via e-mail2. From a Diskette or USB Flash Drive containing an infected file3. Downloading programs and files from the Internet4. Infected CD-ROMs  TYPES OF VIRUSES SPYWARE AND MALWARE

Macro Viruses These are written in a macro language which is associated with an application such a Microsoft Word.  The macro virus is carried by a

Page 2: TYPES OF VIRUSES SPYWARE AND MALWARE - chsjamaica.org  · Web viewA computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate

document file and is executed when the document is opened.  Over half of the known viruses are macro viruses spread byE-mail attachments.

Malware

Malware is short for malicious software. Malware is the name given to any type of software that could harm a computer system, interfere with and gather a user's data, or make the computer perform actions without the owner's knowledge or permission.

Trojan horse

A type of malware that uses malicious code to install software that seems ok, but is hidden to create back doors into a system typically causing loss or theft of data from an external source.

Worm

Unlike a virus, a worm, is a standalone piece of malicious software that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security flaws on the target system to allow access.

Spyware

Spyware is software that aids in gathering information about a person or organization without their knowledge, they can monitor and log the activity performed on a target system, like log key strokes, or gather credit card and other information.

Adware

Adware is software which can automatically causes pop-up and banner adverts to be displayed in order to generate revenue for its author or publisher. A lot of freeware will use Adware but not always in a malicious way, if it was malicious, it would then be classed as spyware or malware.

HOW CAN A COMPUTER BE PROTECTED FROM VIRUSES?

Install an anti-virus program (Norton, McAfee, AVG, Avast, SMADAV etc.) and keep it up-to-date and regularly run scans.

Install an anti-malware program to stop software installing without your knowledge. Turn on program virus protection.

Page 3: TYPES OF VIRUSES SPYWARE AND MALWARE - chsjamaica.org  · Web viewA computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate

Never download and install software from the Internet unless you are certain it is from a trusted source.

Don’t open e-mail attachments unless you have scanned them first, even a picture can carry a virus.

Don’t trust cracked or hacked software as they often contain malware, Trojans.

ENTITY IMPACTED BY COMPUTER SYSTEMS MISUSE

1. Individual2. Organization3. Government

These entities suffer in many ways when they fall victim to such misuse. It can be hard for organizations and government to retain customers’ or workers’ trust especially if the breach was widespread or caused by caused by basic security errors. Breach of sensitive information can result in the affected individuals becoming emotionally distraught, fearful. For example, if an individual biometric information (fingerprint) is breeched it is not similar to a password that can be easily reset especially if the person is distance away.

Organization can face consequences such as:1. Lawsuits, where major sums of money is paid out to the victim(s).2. Damage to its reputations sometimes results in closure.3. Loss of customers/workers.4. Imprisonment(individual/s who committed the act)

It is therefore important for all entities to implement proper security mechanism and maintenance whether daily, weekly or monthly.

COUNTERMEASURES TO MITIGATE EFFECTS OF IDENTIFIED THREATS

Physical Measures

1. Backup and Recovery Procedures2. Hardware Firewall

Page 4: TYPES OF VIRUSES SPYWARE AND MALWARE - chsjamaica.org  · Web viewA computer virus operates in two ways. The first kind, as soon as it lands on a new computer, begins to replicate

3. Intrusion Detection Systems4. Biometrics

Software Measures

1. Effective Passwords and Authentication Systems2. Encryption of Data3. Firewall4. Biometrics5. Antivirus and Malware Detection

Some personal security practices include:

Verifying authenticity of email from companies or individuals. Assessing website URLs for authenticity. Limiting access to open Wi-Fi networks. Securing mobile devices Protection in an online environment (for example, social media)

Task

(Research and write legibly in your note book)

1. Differentiate between physical measures and software measures.2. Describe each physical and software measures listed.

Email your findings to [email protected]