unit 2 computer systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · install an...

22
Unit 2 Computer Systems 1

Upload: others

Post on 02-Aug-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

Unit 2 Computer Systems 1

Page 2: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

TODAYS SESSION

What is Anti Virus

Why is it important

Anti Virus Types

2

Page 3: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

3

VIRUS

Page 4: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

VIRUS

What is a Computer Virus?

A small software program that can be designed to spread from one computer to another and to interfere with computers operation.

4

Page 5: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

COMPUTER VIRUSWhat are the impacts?

Making your computer crash.

Deleting important files.

Deleting everything on your Hard Drive.

Infecting your memory sticks.

Hacking your e-mails (spamming contacts).

Collecting sensitive data such as pin numbers or bank details.

Possibly making your computer unusable.

5

Page 6: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

VIRUSES

Trojans

Worms

Botnets

E-mail Viruses

6

Page 7: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

IN PAIRS PRODUCE A PRESENTATION ON

Viruses

Trojans, Worms, Botnets, E-mail Viruses Etc….

Your presentation must be 5 minutes long,

Your presentation can be on any virus or a mixture of viruses, only put in what you think is relevant

Present to the class

7

Page 8: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

TROJANS

Trojans, as in 'Trojan Horse', are a type of computer virus which can be installed on your computer without you realising.

Trojans can install a ‘keystroke logger’, which records all the keys you press on your computer keyboard.

Some try to capture passwords entered at certain web sites by capturing keystrokes or taking a picture of the screen. This information is then sent to the fraudsters.

Trojans are malicious programs which look innocent, fool you into accepting them, and then more or less take over your computer.

You can go on using your PC or laptop while a criminal is also using it, remotely, for illegal purposes.

Criminals have also designed programs called ‘rootkits’, which hide the fact that your computer has been

8

Page 9: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

WORMS

A computer worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code.

Worms utilise networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email.

Worms can also install backdoors on computers.

Worms are often confused with computer viruses; the difference lies in how they spread.

Computer worms self-replicate and spread across networks, exploiting vulnerabilities, automatically; that is, they don’t need a cybercriminal’s guidance, nor do they need to latch onto another computer program.

9

Page 10: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

E-MAIL VIRUS

An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be re-mailed to everyone in your address book.

10

Page 11: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

BOTNETS The term bot is short for robot.

Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie)

When this occurs, your computer can perform automated tasks over the Internet, without you knowing it.

Criminals typically use bots to infect large numbers of computers. These computers form a network, or a botnet.

Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud.

If your computer becomes part of a botnet, your computer might slow down and you might inadvertently be helping criminals.

11

Page 12: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

NOTABLE VIRUSES AND WORMS

ILOVEYOU (2000) One of the most widespread ILOVEYOU and rapidly spreading viruses via e-mail, posing as an executable attachment sent by a friend from the target's contact lists.

MYDoom-Also known as W32.MyDoom@mm , MyDoom is the most destructive computer virus in history.

Spotted first in January 2004, the virus rapidly spread through emails, exceeding previous records set by any other worm.

Email messages containing the worm were often masked as delivery failures, prompting many to open the message and investigate it.

The worm carried two payloads- one was a backdoor entrance from where the intruder can actually control the infected computer, and the other one was a DDos attack.

THERE ARE THOUSANDS MORE12

Page 13: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

OTHER METHODS OF ATTACK Spyware, tracking cookies adware and pop ups.

13

Page 14: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

HOW TO PREVENT VIRUSES

Install an antivirus program. keep it up-to-date because, New viruses can appear daily.

Scan your pc and memory sticks often.

Don't open email messages from unfamiliar senders, or email attachments that you don't recognize.

E-mail attachments may contain viruses.

Use a pop-up blocker with your browser. This will help prevent harmful pop ups that will prompt you to download

possible viruses.

Keep Windows updated. Microsoft releases special security updates that can help protect your computer.

You can minimise the risks by turning on Windows automatic updating. 14

Page 15: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

HOW TO PREVENT VIRUSES Use a firewall.

A firewall program can alert you to suspicious activity if a virus or worm attempts to connect to your computer.

Clear your Internet cache and your browsing history. Browsers store information about the websites you visit.

Passwords and personal information are stored.

It is important to clear this information in case you get infected.

Use a secure Password Use an detailed encryption for any secure web browsing

Such as Banking, Emails, College log on, Facebook, Skype, Twitter.

15

Page 16: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

TASKProduce a booklet, using Publisher.

The booklet should include, What is a computer virus.

How it is detected.

The effect it has on a computer (damage).

How it can be passed on 3 examples in detail.

How to prevent a virus on your pc.

How to prevent passing a virus on 3 example in detail.

And information on the virus your group investigated.

How to remove it.

SUBMIT TO YOURSPACE

16

Page 17: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

Got to here

DMMOperating Systems Security 17

Page 18: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

ANTI VIRUS SOFTWARE

What is antivirus software?

Microsoft say -

Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as Microsoft Security Essentials.

18

Page 19: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

TYPES OF ANTIVIRUS Bitdefender Antivirus Plus (2014)

Norton AntiVirus (2014)

Webroot Secure Anywhere AntiVirus (2014)

AVG AntiVirus FREE 2014

Avast

Mcafee

BullGuard

Kaspersky-lab

Trend Micro

Microsoft SE19

Page 20: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

TASK From the list produce a table highlighting 3 Antivirus

software's Pros and Cons.

As a result you will grade your AV from 1-3

Explain why you have chosen them to be in that order,

Relating the order to your pros and cons this may include things like Functions

Size

Speed

Credibility

Cost

Submit to Your space

20

Page 21: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

PROS CONS BOTTOM LINE

Excellent protection

against malware

attack on a clean

system. Effective

malware clean-up.

Toolbar offers

secure search, Do

Not Track, Facebook

view, more. Includes

secure deletion file

shredder. Free!

Difficult installation

on malware-infested

test systems. Some

users may object to

numerous upsell

attempts.

You'll get excellent

free antivirus

protection from AVG.

over all rank 1

21

Page 22: Unit 2 Computer Systems 1wiki.hct.ac.uk/_media/computing/btec/level3/antivirus.pdf · Install an antivirus program. keep it up-to-date because, New viruses can appear daily. Scan

WHAT DO WE KNOW

What is a computer Virus?

How can it get on to our system?

3 ways we can protect ourselves

How can we remove a Virus?

22