Computer Security & Viruses PDF

Summary

This document provides an overview of computer security and different types of computer viruses. It explains concepts like virus types, typical symptoms, and various terminologies related to computer security.

Full Transcript

Computer Security & Computer Viruses Objectives: 1. Conceptualize computer security 2. Categorize computer viruses and its degree of effect 3. Paraphrase the concept of copyright and intellectual property rights. DID YOU KNOW? In 1980 a computer cracked a 3-character password within one min...

Computer Security & Computer Viruses Objectives: 1. Conceptualize computer security 2. Categorize computer viruses and its degree of effect 3. Paraphrase the concept of copyright and intellectual property rights. DID YOU KNOW? In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56-character password within one day. In 2004 a computer virus infected 1 million computers within one hour. A computer program Tells a computer what to do and how to do it. Computer Viruses VIRUS – (Vital Information Resource Under Siege) A program designed to attach itself to a file, reproduce and spread from one file to another, destroying data, displaying an irritating message or otherwise disrupting computer operations. TYPICAL SYMPTOMS  File deletion  File corruption  Visual effects  Pop-Ups  Erratic (and unwanted) behavior  Computer crashes Types of Computer Viruses 1.Resident Viruses Is a permanent which dwells in the RAM memory. 2. Direct action Viruses the main purpose is to replicate and take action when it is executed. 3. Overwrite Viruses it deletes the information contained in the files that it infects. Types of Computer Viruses 4. Boot Sector Viruses A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. 5. Macro Viruses infect files that are created using certain applications or programs that contains macros. 6. Directory Viruses change the paths that indicate the location of the file. Types of Computer Viruses 7.Polymorphic Viruses encrypt and encode themselves in a different way. 8. File infector / File Viruses a type of virus that infect the programs or executable file (.exe or.com). 9. Companion Viruses can be considered file infector viruses like resident or direct action type. Types of Computer Viruses 10. FAT(File Allocation Table) Viruses dangerous, by preventing access to certain sections of the disk. Examples: WORM(Write Once Read Many) A software program designed to enter a computer system, usually a network, through security "holes" and replicate itself. Trojans or Trojan Horses A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password. Examples: Logic Bomb A computer program that is triggered by the appearance or disappearance of specific data (for example, when the word "terminated" appears in an employee's record or when a pass- word begins with the letters "DB"). Payload The disruptive instructions or message delivered by a computer virus. Terminologies to Remember Crackers - People who break into a computer system with intent to damage files or steal data. Cyberpunks – People who break into computers, especially Internet computers, to steal data modify files or plant viruses. Hackers - People who are once meant as computer hobbyists or computer novice. Today they are referred to as people who has gained illegal access in a computer system. Other terminologies Time bomb – a type of computer program that stays in a computer system undetected until it is triggered at a certain date or time. Antivirus – A computer program used to scan a computer’s memory and disks to identify, isolate, and eliminate viruses. Data security Other terminologies Biometrics – Biological measurements, such as fingerprinting, that are used in the context of computers to verify a person’s identity. User rights - Rules that specify the directories and files that an individual user can access. Key - In the context of data encryption, a key is the method used to encrypt or decipher information as in which numbers in a code match each letters of the alphabet. Other terminologies Trap door - A way to bypass the normal security precautions and enter a computer system. It is often created during computer installation and testing but should be removed before the computer is placed into service. Encryption - The process of scrambling or hiding information so that it cannot be understood without the key necessary to change it back into it’s original form. Other terminologies Pretty Good Privacy (PGP) - A popular public key encryption system. Public key encryption (PKE) - An encryption method that uses a pair of keys, a public key (known to everyone) that encrypts the message and a private key (known only to the recipient) that decrypts it. Firewall - A method for preventing hostile pro – grams, such as Java applets, from entering a network usually by installing firewall software that filters out suspicious packets. Safe computing TIPS 1. Never boot from any devices unless you are sure that it is virus free 2. Check all new software for the presence of viruses 3. If you own laptop, make sure that it is stored in a safe place 4. Keep storage devices containing important information in a safe place. 5. Make it to habit to backup regularly 6. Know the computer that you are using 7. Keep your password secured 8. Avoid letting just anyone use your computer Reasons / Causes 1. Inserting of any devices without scanning of anti virus 2. Downloading of information in the internet 3. Networking Law of Computer System 1. Contract Law Software license agreements, including “shrink-wrap” Business transactions in cyberspace Contracts for data processing services Contracts for development of custom software or hardware Law of Computer System 2. Copy right Law Copyright protection for computer software Copyright protection for text or pictures on Internet 3. Trademark Law Domain name disputes Infringement or dilution of trademarks on Internet Law of Computer System 4. Patent Law Patent for novel software Patents for computer hardware 5. Tort Law Defamation Trade disparagement, unfair competition law Duty to maintain secure data Law of Computer System 6. Computer crime Unauthorized use of services Denial of services attacks on websites Larcency, malicious mischief, vandalism etc. Fraud (scam) Malicious computer programs(computer viruses,trojan,worm) Obscenity, harassment by e-mail Law of Computer System 7. Utility Law or Telecommunication Law Tariffs for Internet traffic via long-distance telephone carrier Possible regulation of Internet Services Providers 8. Constitutional Law Freedom of Speech on the Internet Search and Seizure Law

Use Quizgecko on...
Browser
Browser