viruses, spyware , malware and phishing
DESCRIPTION
Viruses, Spyware , Malware and Phishing. Understand what a virus is and the different types of viruses which can infect a computer Know how to avoid viruses Understand how to remove a virus from a PC. Computer Virus. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/1.jpg)
Viruses, Spyware, Malware and Phishing
![Page 2: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/2.jpg)
• Understand what a virus is and the different types of viruses which can infect a computer
• Know how to avoid viruses
• Understand how to remove a virus from a PC
![Page 3: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/3.jpg)
Computer Virus
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can replicate
themselves.
![Page 4: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/4.jpg)
How do viruses spread?
You often download the virus without realising, it might be attached to a
another file, for example a picture or program you actually want.
![Page 5: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/5.jpg)
How do viruses spread?
Viruses can be downloaded by opening an email attachment, never open an
email attachment from someone you do not know!
![Page 6: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/6.jpg)
Spyware
Spyware monitors user activity on the Internet and transmits that information in
the background to someone else. Spyware can gather information about e-mail addresses
and even passwords and credit card number
![Page 7: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/7.jpg)
Phishing
Phishing is when you receive an e-mail falsely claiming to be a legitimate
company in an attempt to scam the user into surrendering private information that will be
used for identity theft. Often the e-mail directs you to visit
a website where you are asked to update personal information, such as passwords and credit card, social security, and bank account
numbers. The Website, however, is bogus and set up only to steal your information.
![Page 8: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/8.jpg)
Worms> Self replicating malware
>Uses a computer network to make copies of itself and infect computers
![Page 9: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/9.jpg)
Trojan horse
• Software that will be downloaded for a useful purpose, e.g. Free software
• However, it also steals information or harms the system
![Page 10: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/10.jpg)
How can you protect your PC?
• Install an anti-virus program
• Update software regularly
• Use strong passwords and keep them secret
• Never turn off your firewall
• Be cautious when downloading software or files fro the internet
![Page 11: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/11.jpg)
ActivityChoose one of the viruses below. Use the internet to
find out:
• How is spread• What it did• How many computers were infected
Love bug worm Melissa computer virusNimda virusCode Red Bugbear Blaster
![Page 12: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/12.jpg)
Quick Questions
![Page 13: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/13.jpg)
Q1:What is a firewall?
A – Antivirus software
B – Software that logs internet activity
C – A filter for a internet connection
![Page 14: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/14.jpg)
Q2:What is phishing?
A - decryption method that uses complex algorithms
B - A method of online identity theft
B - A way to send spam mail to millions of people at once
![Page 15: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/15.jpg)
Q3: What is the best way to protect your PC?
A – To avoid using a USB drive with the computer
B - To install an up to date anti virus program from a trusted source
C – To avoid emails
![Page 16: Viruses, Spyware , Malware and Phishing](https://reader038.vdocument.in/reader038/viewer/2022102519/56812ddb550346895d932998/html5/thumbnails/16.jpg)
KeywordsPhishing
Spam
Firewall
Virus
Network
Anti-virus
Malware
Spyware
Worm