0% found this document useful (0 votes)
32 views19 pages

L3 ALP 2 Computer Threats - Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views19 pages

L3 ALP 2 Computer Threats - Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Computer Threats

22nd January 2024


Learning Outcome
Learners will be able to

• Describe what a computer virus, types and


mode of transmission

• Explain computer hacking

• Explain measures on how to prevent viruses


and hacking
Computer Virus
A computer virus is a type of malware
(malicious software) that attaches
itself to legitimate programs or files,
replicates, and spreads to other files
or systems.
Computer Virus

These malicious programs are


created by individuals with
malicious intent, such as
cybercriminals or hackers.
Types of Computer Viruses:
• Malware: A broad term encompassing various
types of malicious software, including viruses.
• Ransomware: Encrypts files and demands
payment for their release.
• Trojans: Disguises itself as legitimate software but
contains a malicious payload.
• Worms: Self-replicating programs that spread
across networks without human intervention.
• Spyware: Collects information without the user's
knowledge.
Types of Computer Viruses:
• Malware: Malware viruses can:

• Seize applications
• Send infected files to contact lists
• Steal data
• Launch DDoS attacks
• Launch ransomware attacks
Types of Computer Viruses:
Worm malware: Worm malware can:

• Delete or modify files


• Steal data
• Install backdoors for hackers
• Launch DDoS attacks
• Launch ransomware attacks
• Create botnets
• Infect many computers at once
Types of Computer Viruses:
Trojan : Trojan malware can:

• Delete, modify, or steal data


• Spy on users
• Access networks
• Launch DDoS attacks
• Take remote control of devices
Types of Computer Viruses:
Ransomware : Ransomware can:

• Hold devices hostage


• Make data inaccessible through encryption
• Result in financial loss
Types of Computer Viruses:
Spyware : Spyware can:

• Breach personal privacy


• Collects confidential data, including by logging
keystrokes
• Steal data
• Result in identity theft or credit card fraud
Modes of Transmission
Email Attachments: Viruses often
spread through email attachments,
tricking users into opening infected
files.

Infected Websites: Visiting


compromised websites or
downloading files from untrusted
sources can lead to virus infections.

Removable Media: USB drives and


other removable media can carry
viruses from one computer to
another
Behavior and Impact
•Data Corruption: Viruses can corrupt or
delete files, leading to data loss.

•System Instability: They may cause system


crashes, slow performance, or unexpected
errors.

•Unauthorized Access: Some viruses aim to


provide remote access to the infected
system for malicious purposes.
Symptoms of Infection
•Slow Performance: Sluggish response times
and delays in executing commands.

•Pop-ups and Advertisements: Unwanted


advertisements or pop-ups appearing on
the screen.

•Unusual Behavior: Unexpected system


behavior or changes to settings.
Preventative Measures:
• Antivirus Software: Install reputable antivirus
programs to detect and remove viruses.
• Regular Updates: Keep operating systems,
software, and antivirus databases up-to-date.
• Email Safety: Exercise caution with email
attachments and avoid clicking on suspicious links.
• Firewalls: Use firewalls to monitor and control
incoming and outgoing network traffic.
• User Education: Educate users about safe online
practices and the risks associated with
downloading or opening unknown files.
Detection and Removal:
•Scanning Tools: Antivirus programs use
scanning tools to detect and remove viruses.
•Manual Removal: In some cases, manual
removal may be necessary, involving
identifying and deleting infected files.
Computer Hacking
Computer hacking involves the unauthorized
access, manipulation, or interference with
computer systems, networks, or data.

Hackers, also known as cybercriminals, engage


in hacking activities for various reasons,
including financial gain, political motives,
ideological reasons, or simply for the challenge.

Hacking can have both legal and illegal


implications, depending on the intent and
actions of the individual involved
Preventative Measures:
•Firewalls and Intrusion Detection Systems:
Implementing firewalls and intrusion
detection systems helps monitor and control
network traffic.

•Regular Security Audits: Conducting regular


security audits and vulnerability assessments
helps identify and address potential
weaknesses.

•User Education: Educating users about


cybersecurity best practices, such as using
strong passwords and being cautious with
email attachments, reduces the risk of
successful hacking attempts.
Conclusion
It's important to note that while hacking can
have negative connotations, ethical hacking
plays a crucial role in strengthening
cybersecurity defenses and protecting
against malicious activities. Organizations
invest in cybersecurity measures to
safeguard their systems and data from
unauthorized access and potential breaches.
Learning Outcome
Learners can

• Describe what a computer virus, types and


mode of transmission

• Explain computer hacking

• Explain measures on how to prevent viruses


and hacking

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy