1 / 16

Viruses, Spyware , Malware and Phishing

Viruses, Spyware , Malware and Phishing. Understand what a virus is and the different types of viruses which can infect a computer Know how to avoid viruses Understand how to remove a virus from a PC. Computer Virus.

Download Presentation

Viruses, Spyware , Malware and Phishing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Viruses, Spyware, Malware and Phishing

  2. Understand what a virus is and the different types of viruses which can infect a computer • Know how to avoid viruses • Understand how to remove a virus from a PC

  3. Computer Virus A programor piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can replicate themselves.

  4. How do viruses spread? You often download the virus without realising, it might be attached to a another file, for example a picture or program you actually want.

  5. How do viruses spread? Viruses can be downloaded by opening an email attachment, never open an email attachment from someone you do not know!

  6. Spyware Spyware monitorsuser activity on the Internet and transmitsthat information in the background to someone else. Spyware can gather information about e-mail addresses and even passwords and credit card number

  7. Phishing Phishing is when you receive an e-mail falsely claiming to be a legitimate company in an attempt to scam the user into surrendering privateinformation that will be used for identity theft. Often the e-mail directs you to visit a website where you are asked to update personal information, such as passwords and credit card, social security, and bank account numbers. The Website, however, is bogus and set up only to steal your information.

  8. Worms > Self replicating malware >Uses a computer network to make copies of itself and infect computers

  9. Trojan horse • Software that will be downloaded for a useful purpose, e.g. Free software • However, it also steals information or harms the system

  10. How can you protect your PC? • Install an anti-virus program • Update software regularly • Use strong passwords and keep them secret • Never turn off your firewall • Be cautious when downloading software or files fro the internet

  11. Activity Choose one of the viruses below. Use the internet to find out: • How is spread • What it did • How many computers were infected Love bug worm Melissa computer virus Nimda virus Code Red Bugbear Blaster

  12. Quick Questions

  13. Q1:What is a firewall? A – Antivirus software B – Software that logs internet activity C – A filter for a internet connection

  14. Q2:What is phishing? A - decryption method that uses complex algorithms B - A method of online identity theft B - A way to send spam mail to millions of people at once

  15. Q3: What is the best way to protect your PC? A – To avoid using a USB drive with the computer B - To install an up to date anti virus program from a trusted source C – To avoid emails

  16. Keywords Phishing Malware Anti-virus Spam Worm Network Firewall Spyware Virus

More Related