SlideShare a Scribd company logo
Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10
Malware Viruses and spyware are often referred to as malware, short for malicious software. Malicious = vicious or mischievous A virus uses your computer as it likes. It can interfere with your computer use. It can damage files or software. Spyware uses your information. It can interfere with your computer use. It can steal your personal information.
Purpose Why would someone create a computer virus or spyware? Vandalism Money
Bogus Link Example Why should you not trust a message such as the one below, even if it comes from a friend?
Bogus Chat Message This one is trickier. Why not trust these chat messages?
How Computer Viruses Work A virus can spell doom for your computer. Viruses- A small piece of software that piggy backs on real programs. E-Mail Viruses- an email virus travels as an attachment to email messages. Trojan horses- A Trojan Horse is simply a computer program .  Worms- a worm is a small piece of software that uses computer networks and security holes to replicate itself.
How Viruses & Spyware Spread User clicks on an email attachment that downloads a virus or spyware. User clicks on downloadable file on a website that downloads a virus or spyware. User clicks on link in an email, on a website or on a social network. The link takes user to a website that attacks browser and forces virus or spyware download.
How Spyware works on your Computer
Symptoms Homepage changes (and you did not change it!) A lot of pop-up windows you cannot stop. Unexpected toolbars show up. Redirected to sites you did not request. Search results are provided by a different search engine than you used. Browser continues to crash inexplicably. Files disappear (because they have been erased.) Computer shuts down inexplicably. Computer extremely slow. A lot more junk email being received.
Prevention Tips Keep all your operating system and all software updated. Most virus and spyware attacks occur through security holes in popular software applications. For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, virus and spyware creators target security holes in IE. Don’t click on any pop ups or ads offering you anything for free.
Free Anti-Virus & Spyware Software Use an anti-virus software that scans as files are downloaded. Do not use more than one anti-virus software that runs in real time. Recommended -  AVG Free Anti-Virus Use a spyware software that scans periodically. Recommended -  Spybot Search & Destroy  and  Malwarebytes
Creative Commons License This module was created by Connect Your Community, a project of  OneCommunity , funded by the federal  Broadband Technology Opportunities Program . This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0

More Related Content

PPT
Computer Malware
PPTX
How to protect pc against Malware
PPT
Introduction to Malware
PPTX
Computer Viruses
PPTX
PPTX
List of Malwares
PDF
How to Uninstall Malwares-assistance.net from PC
PPT
Slideshow Alisha Schnapper
Computer Malware
How to protect pc against Malware
Introduction to Malware
Computer Viruses
List of Malwares
How to Uninstall Malwares-assistance.net from PC
Slideshow Alisha Schnapper

What's hot (20)

PPTX
Computer virus
PPT
Spyware Adware1
PPT
Anti-virus software and spyware
PPTX
Ch 3 computer malware ppt
PPTX
Ppt123
PPT
Dark Alleys/Internet Security
PPT
Spyware And Anti Virus Software Presentation
PPTX
Some basics of computer security
PPT
Malware
PPT
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
PPT
spyware
PDF
How To Protect From Malware
PPTX
IT viruses
PPTX
Computer virus
PPTX
Spyware-A online threat to privacy
PPTX
Computer virus
PPTX
PPTX
How to remove webhancer
PPTX
Computer virus 2015
Computer virus
Spyware Adware1
Anti-virus software and spyware
Ch 3 computer malware ppt
Ppt123
Dark Alleys/Internet Security
Spyware And Anti Virus Software Presentation
Some basics of computer security
Malware
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
spyware
How To Protect From Malware
IT viruses
Computer virus
Spyware-A online threat to privacy
Computer virus
How to remove webhancer
Computer virus 2015
Ad

Viewers also liked (6)

DOC
Sektör Haberleri 07-13 Ocak Haftası
DOCX
Security terms & definitions
PDF
Microsoft Office for iPad Product Guide - Atidan
PPTX
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
PPTX
John Aguirre, President
DOCX
Terms & definitions
Sektör Haberleri 07-13 Ocak Haftası
Security terms & definitions
Microsoft Office for iPad Product Guide - Atidan
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
John Aguirre, President
Terms & definitions
Ad

Similar to 4 a module virus and spyware (20)

PPT
Computer saftey adware, spyware & viruses
PPTX
viruses.pptx
ODP
Computer Viruses & Management Strategies
PPTX
lecture-11-30052022-103626am.pptx
PPTX
Major Computer Virus Types to Watch Out
PPT
Viruses and Spyware
PPT
Computer virus 18
PDF
Malware and malicious programs
ODP
Computer virus
PPTX
athira m s.pptx
PPT
How Computer Viruses Work
PPTX
malware ppt.pptx
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
Malware part 1
PPTX
Trojan horse
PPT
PPTX
Computer virus
PPTX
Malware
PPTX
NS 2.pptx
Computer saftey adware, spyware & viruses
viruses.pptx
Computer Viruses & Management Strategies
lecture-11-30052022-103626am.pptx
Major Computer Virus Types to Watch Out
Viruses and Spyware
Computer virus 18
Malware and malicious programs
Computer virus
athira m s.pptx
How Computer Viruses Work
malware ppt.pptx
SECURITY THREATS AND SAFETY MEASURES
Malware part 1
Trojan horse
Computer virus
Malware
NS 2.pptx

More from Rozell Sneede (20)

DOCX
Excel & database terms & definitions
DOCX
Digital literacy terms & definitions
DOCX
Basic terms & definitions
DOCX
5 steps
DOCX
Removing virus tri fold - white
DOC
Cyc flyer chn with ob logo
PPT
Cyc module learning express library
PPT
Cyc module inf ohio
PPTX
Wordpress module 1 a
PPTX
9 word press 2c
PPTX
8 word press 2b
PPTX
7 word press 2a
PPTX
6 word press module 1f
PPTX
5 word press module 1e
PPTX
4 word press module 1d
PPTX
3 word press module 1c
PPTX
2 word press module 1b
PPTX
1 wordpress module 1 a
PPTX
1 wordpress module 1 a
PPTX
On line banking cur
Excel & database terms & definitions
Digital literacy terms & definitions
Basic terms & definitions
5 steps
Removing virus tri fold - white
Cyc flyer chn with ob logo
Cyc module learning express library
Cyc module inf ohio
Wordpress module 1 a
9 word press 2c
8 word press 2b
7 word press 2a
6 word press module 1f
5 word press module 1e
4 word press module 1d
3 word press module 1c
2 word press module 1b
1 wordpress module 1 a
1 wordpress module 1 a
On line banking cur

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
project resource management chapter-09.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hybrid model detection and classification of lung cancer
PPT
What is a Computer? Input Devices /output devices
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
August Patch Tuesday
PDF
STKI Israel Market Study 2025 version august
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
TLE Review Electricity (Electricity).pptx
NewMind AI Weekly Chronicles - August'25-Week II
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
project resource management chapter-09.pdf
Module 1.ppt Iot fundamentals and Architecture
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hybrid model detection and classification of lung cancer
What is a Computer? Input Devices /output devices
observCloud-Native Containerability and monitoring.pptx
Chapter 5: Probability Theory and Statistics
O2C Customer Invoices to Receipt V15A.pptx
Hindi spoken digit analysis for native and non-native speakers
Final SEM Unit 1 for mit wpu at pune .pptx
Getting Started with Data Integration: FME Form 101
August Patch Tuesday
STKI Israel Market Study 2025 version august
WOOl fibre morphology and structure.pdf for textiles
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
TLE Review Electricity (Electricity).pptx

4 a module virus and spyware

  • 1. Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10
  • 2. Malware Viruses and spyware are often referred to as malware, short for malicious software. Malicious = vicious or mischievous A virus uses your computer as it likes. It can interfere with your computer use. It can damage files or software. Spyware uses your information. It can interfere with your computer use. It can steal your personal information.
  • 3. Purpose Why would someone create a computer virus or spyware? Vandalism Money
  • 4. Bogus Link Example Why should you not trust a message such as the one below, even if it comes from a friend?
  • 5. Bogus Chat Message This one is trickier. Why not trust these chat messages?
  • 6. How Computer Viruses Work A virus can spell doom for your computer. Viruses- A small piece of software that piggy backs on real programs. E-Mail Viruses- an email virus travels as an attachment to email messages. Trojan horses- A Trojan Horse is simply a computer program . Worms- a worm is a small piece of software that uses computer networks and security holes to replicate itself.
  • 7. How Viruses & Spyware Spread User clicks on an email attachment that downloads a virus or spyware. User clicks on downloadable file on a website that downloads a virus or spyware. User clicks on link in an email, on a website or on a social network. The link takes user to a website that attacks browser and forces virus or spyware download.
  • 8. How Spyware works on your Computer
  • 9. Symptoms Homepage changes (and you did not change it!) A lot of pop-up windows you cannot stop. Unexpected toolbars show up. Redirected to sites you did not request. Search results are provided by a different search engine than you used. Browser continues to crash inexplicably. Files disappear (because they have been erased.) Computer shuts down inexplicably. Computer extremely slow. A lot more junk email being received.
  • 10. Prevention Tips Keep all your operating system and all software updated. Most virus and spyware attacks occur through security holes in popular software applications. For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, virus and spyware creators target security holes in IE. Don’t click on any pop ups or ads offering you anything for free.
  • 11. Free Anti-Virus & Spyware Software Use an anti-virus software that scans as files are downloaded. Do not use more than one anti-virus software that runs in real time. Recommended - AVG Free Anti-Virus Use a spyware software that scans periodically. Recommended - Spybot Search & Destroy and Malwarebytes
  • 12. Creative Commons License This module was created by Connect Your Community, a project of OneCommunity , funded by the federal Broadband Technology Opportunities Program . This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0

Editor's Notes

  • #4: And no, getting into the virus and spyware business is not a good idea. The Russian Mafia doesn’t like newcomers.  In the past most viruses were acts of vandalism. More and more, their purpose is financial.
  • #5: Have you heard the phrase there’s no such thing as a free lunch? Well, there’s also no such thing as a free iPad. Have you ever received a similar message? Maybe through email? Email and networking profiles get hijacked.
  • #6: Clues: Would your friend send a message like the ones in this chat? What is the top level domain of each link? Research it. Sending a non personalized message that encourages you to click on a link is a strategy of scammers. Be aware of their strategies.
  • #7: Strange as it may sound the computer virus is something of an age marvel on one hand viruses show us how vulnerable we are a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages . On the other hand they show us how sophisticated and interconnected human beings have really become. Viruses- For example a virus might attach itself to a program such as a spreadsheet program. Each time it runs the virus runs too. And it has the chance to reproduce by attaching to other program or wreak havoc! Email-and usually replicates itself by automatically mailing itself to dozens of people in the victims email address book. Trojan Horse- The program claims to do one thing ( it could even claim to be a game) but instead does damage when you run it ( it may erase your hard disk). Trojan Horses have no way to replicate automatically. Worms- a copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there as well.
  • #9: Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Perhaps  spyware  is to blame. Spyware is a category of computer programs that attach themselves to your  operating system  in nefarious ways. They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware.Here are some of the general ways in which spyware finds its way into your computer: Piggybacked software installation  - Some applications -- particularly  peer-to-peer file-sharing clients  -- will install spyware as a part of their standard installation procedure. If you don't read the installation list closely, you might not notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as alternatives to software you have to buy. As the old saying goes, there's no such thing as a free lunch. Drive-by download  - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would be your browser's standard message telling you the name of the software and asking if it's okay to install it. If your security settings are set low enough, you won't even get the warning. Browser add-ons  - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they'll do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered  browser hijackers  -- these embed themselves deeply in your machine and take quite a bit of work to get rid of. Masquerading as anti-spyware  -- This is one of the cruelest tricks in the book. This type of software convinces you that it's a tool to detect and remove spyware. At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging  RAM  and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser's home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your  search engine  practically useless. It can also modify the dynamically linked libraries (DLLs) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose. At its very worst, spyware can record the words you type, your Web browsing history, passwords and other private information. The point of all this from the spyware makers' perspective isn't always clear. One reason it's used is to pad advertisers' Web traffic statistics. If they can force your computer to show you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product. Another use of spyware is to steal affiliate credits. Major shopping sites like  Amazon  and  eBay  offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture your requests to view sites like Amazon and eBay and then take the credit for sending you there. Malware  -- a general term for any program that makes changes (does malicious or "bad" things) without your express permission Adware  -- programs designed specifically to deliver unrequested advertising Stealware  -- specific spyware designed to capture clicks or Web-site referral credits Browser hijacker  -- a malicious program that becomes deeply embedded in your browser's code and core functionality  
  • #11: Software updates often include security updates. The companies fix security holes as they learn of them. Use a spyware scanner. Use a pop-up blocker. Disable Active-X. Be suspicious of installing new software Use the "X" to close pop-up windows.
  • #12: If you will be participating in HomeConnect, you will learn more about virus and spyware software in the Computer Maintenance class.