SlideShare a Scribd company logo
Viruses, Worms, and Trojan Horses By: Laurie Madison
“Computer Gremlin 2” by Larry Wentzel
Definition:
A virus is a piece of self-
replicating code embedded
within another program
called the host.
2
How does my computer
catch a virus?
What’s in your computer
Definition:
A Trojan horse is a program
with a benign capability
that conceals another,
sinister purpose.
How does my computer get a
Trojan horse?
What kind of malicious tasks
will a Trojan horse do?
Some examples of malicious tasks Trojan horse
programs have done are:
 opening an Internet connection that allows an
outsider to gain access to files
 logging the keystrokes of the user and storing
them in a file that the attacker can see
 looking for passwords stored on the computer
and emailing them to the attacker
 destroying files
 launching a denial-of-service attack on a
website
 turning the computer into a proxy server that
can be used to launch spam or stash
information from illegal activities.
How does my computer get
a worm?Definition:
A worm is a self-contained
program that spreads through
a computer network by
exploiting security holes in the
computers connected to the
network. Oh no, a Worm Hole!
• Infiltrate networks spreading all by
itself through holes in your operating
system security.
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
computer
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
There’s an overwhelming
list of products available.
• Trend Micro
• McAfee
• Norton
• Bitfender
• And on and on…
References
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson
Education, Inc.
• Wentzel, L. Computer Gremlin 2. Retrieved from
http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570
Thank you!
Microsoft Office Clip Art,
audiomicro.com/free-sound-effects, and
pixabay.com for the free audio and clip art

More Related Content

PPTX
Cyber Security Seminar Day 2
PPTX
Trojans and backdoors
PPT
Trojan backdoors
PPSX
Definition
PPTX
Access Controls Attacks
PPTX
Cyber warfare
PDF
Infosec
Cyber Security Seminar Day 2
Trojans and backdoors
Trojan backdoors
Definition
Access Controls Attacks
Cyber warfare
Infosec

What's hot (20)

PPTX
Malwares
PPTX
Internet security
PPTX
Ransomware attacks reveton
PPT
Virus
PDF
What is wanna cry ransomware attack
PPTX
computer virus ppt.pptx
PPT
internet security
PDF
What is a Hacker (part 2): How data is stolen
PPTX
Introduction To Ethical Hacking
PPTX
Computer security and ethics
PPTX
Ethical hacking introduction to ethical hacking
PDF
Security
PPT
Virus trojanworm
PPSX
Detection of running backdoors
PPTX
Internet Security in Web 2.0
PPSX
Hacker !
PPT
An Advanced persistent threats
PPTX
Security Pp Cis
PPTX
What is IT security[1]
PPTX
Spyware risk it's time to get smart
Malwares
Internet security
Ransomware attacks reveton
Virus
What is wanna cry ransomware attack
computer virus ppt.pptx
internet security
What is a Hacker (part 2): How data is stolen
Introduction To Ethical Hacking
Computer security and ethics
Ethical hacking introduction to ethical hacking
Security
Virus trojanworm
Detection of running backdoors
Internet Security in Web 2.0
Hacker !
An Advanced persistent threats
Security Pp Cis
What is IT security[1]
Spyware risk it's time to get smart
Ad

Viewers also liked (20)

PPTX
Computer security risks
PPTX
Kinds of Viruses
PPT
Virus
PPT
Wong Pau Tung-special-topic-02-Virus
PDF
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
PPTX
Security Awareness 9 10 09 V4 Virus Trojan
PPTX
Computer virus
PPTX
Different Types Of Computer Viruses
PPT
Ict Assignment
PPTX
Computer worms viruses and Prevention
PPTX
Malware ppt
PPTX
Trojan horse and salami attack
PPTX
Gopalfacultyphdthesys
PPTX
Materi of mini seminar (Speaking 4)
PPT
History Of P C
PPTX
Seminar On Trojan Horse
PPTX
What’s the first rule of Computer Club - talk about Computer Club!
PPTX
6 Infographics About Presentations
PPT
Trojan Horse Virus
PPTX
Presentation Virus (salami attack and trojan horse)
Computer security risks
Kinds of Viruses
Virus
Wong Pau Tung-special-topic-02-Virus
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
Security Awareness 9 10 09 V4 Virus Trojan
Computer virus
Different Types Of Computer Viruses
Ict Assignment
Computer worms viruses and Prevention
Malware ppt
Trojan horse and salami attack
Gopalfacultyphdthesys
Materi of mini seminar (Speaking 4)
History Of P C
Seminar On Trojan Horse
What’s the first rule of Computer Club - talk about Computer Club!
6 Infographics About Presentations
Trojan Horse Virus
Presentation Virus (salami attack and trojan horse)
Ad

Similar to What’s in your computer (20)

PPTX
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PPTX
PPT
Presentation
PPTX
Dickmaster
PDF
Information security
PPT
Ethical Hacking
PPSX
Ids 007 trojan horse
PPTX
Types of Malware (CEH v11)
DOCX
trojon horse Seminar report
PPT
Cyber security and detailed informat.ppt
PPTX
MALWARES.pptx
PPTX
Computer security
PDF
attack vector in cyber security access to a computer
PPTX
Network Security.pptx
PPT
Computer Security
PPT
Computer Security
PPT
3.2.1 computer security risks
PDF
table of Malware Attack an information security lesson.pdf
PPT
Cyber-Security-20211013105857.ppt
PPT
CyberSecurity presentation for basic knowledge about this topic
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
Presentation
Dickmaster
Information security
Ethical Hacking
Ids 007 trojan horse
Types of Malware (CEH v11)
trojon horse Seminar report
Cyber security and detailed informat.ppt
MALWARES.pptx
Computer security
attack vector in cyber security access to a computer
Network Security.pptx
Computer Security
Computer Security
3.2.1 computer security risks
table of Malware Attack an information security lesson.pdf
Cyber-Security-20211013105857.ppt
CyberSecurity presentation for basic knowledge about this topic

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf

What’s in your computer

  • 1. Viruses, Worms, and Trojan Horses By: Laurie Madison
  • 2. “Computer Gremlin 2” by Larry Wentzel Definition: A virus is a piece of self- replicating code embedded within another program called the host. 2 How does my computer catch a virus?
  • 4. Definition: A Trojan horse is a program with a benign capability that conceals another, sinister purpose. How does my computer get a Trojan horse?
  • 5. What kind of malicious tasks will a Trojan horse do? Some examples of malicious tasks Trojan horse programs have done are:  opening an Internet connection that allows an outsider to gain access to files  logging the keystrokes of the user and storing them in a file that the attacker can see  looking for passwords stored on the computer and emailing them to the attacker  destroying files  launching a denial-of-service attack on a website  turning the computer into a proxy server that can be used to launch spam or stash information from illegal activities.
  • 6. How does my computer get a worm?Definition: A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. Oh no, a Worm Hole!
  • 7. • Infiltrate networks spreading all by itself through holes in your operating system security. • Use up your bandwidth • Slow computer processing down • Open a “back door” to infiltrate your computer • Can cause denial-of-service attacks interrupting web services • Deleting subscribers from Web hosts • May be used to control your computer or steal information
  • 8. There’s an overwhelming list of products available. • Trend Micro • McAfee • Norton • Bitfender • And on and on…
  • 9. References • Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson Education, Inc. • Wentzel, L. Computer Gremlin 2. Retrieved from http://phodyr.deviantart.com/art/Computer-Gremlin-2-323640570 Thank you! Microsoft Office Clip Art, audiomicro.com/free-sound-effects, and pixabay.com for the free audio and clip art

Editor's Notes

  • #3: What is a Virus? No, it’s not the kind we as humans are apt to acquire. According to Quinn, a virus is a piece of self-replicating code embedded within another program called the host. A virus can be on any device that has an executable program such as a flash drive, your hard disk, a CD or DVD, email attachments, but the biggest culprit is in your downloads. When you execute the program the virus also executes and does what ever it is programmed to do.
  • #4: These days most viruses are programmed to replicate occupying disk space and consuming your computers CPU time. Others are programmed to do damage to your file system or uses your email’s address book to spread the virus ridden message to your contacts.
  • #5: Don’t look a gift horse in the mouth.
  • #7: We’re not talking about those fat juicy night crawlers you bait your hook with in order to catch a trout; no, we are talking about those sneaky programs that squirm into your computer from the network through security holes in your software. According to Quinn, A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. This could be hard wire or WiFi. Is your computer hooked up to a network? Then your computer is vulnerable.
  • #8: Worms are different from viruses in the way that they replicate. Worms do not need a host program to execute itself. It comes through the network by way of holes in your operating system security. It’s replication of itself may slow your computer and any network traffic. Some are designed to open a back door to your computer in order for other malware to access your information. Worms have been used to delete subscribers from web hosts and cause denial-of-service attacks.
  • #9: If you are hooked up to a network, or use storage devices to load things to your computer, use protection.