We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19
Computer Threats
22nd January 2024
Learning Outcome Learners will be able to
• Describe what a computer virus, types and
mode of transmission
• Explain computer hacking
• Explain measures on how to prevent viruses
and hacking Computer Virus A computer virus is a type of malware (malicious software) that attaches itself to legitimate programs or files, replicates, and spreads to other files or systems. Computer Virus
These malicious programs are
created by individuals with malicious intent, such as cybercriminals or hackers. Types of Computer Viruses: • Malware: A broad term encompassing various types of malicious software, including viruses. • Ransomware: Encrypts files and demands payment for their release. • Trojans: Disguises itself as legitimate software but contains a malicious payload. • Worms: Self-replicating programs that spread across networks without human intervention. • Spyware: Collects information without the user's knowledge. Types of Computer Viruses: • Malware: Malware viruses can:
• Seize applications • Send infected files to contact lists • Steal data • Launch DDoS attacks • Launch ransomware attacks Types of Computer Viruses: Worm malware: Worm malware can:
• Delete or modify files
• Steal data • Install backdoors for hackers • Launch DDoS attacks • Launch ransomware attacks • Create botnets • Infect many computers at once Types of Computer Viruses: Trojan : Trojan malware can:
• Delete, modify, or steal data
• Spy on users • Access networks • Launch DDoS attacks • Take remote control of devices Types of Computer Viruses: Ransomware : Ransomware can:
• Hold devices hostage
• Make data inaccessible through encryption • Result in financial loss Types of Computer Viruses: Spyware : Spyware can:
• Breach personal privacy
• Collects confidential data, including by logging keystrokes • Steal data • Result in identity theft or credit card fraud Modes of Transmission Email Attachments: Viruses often spread through email attachments, tricking users into opening infected files.
Infected Websites: Visiting
compromised websites or downloading files from untrusted sources can lead to virus infections.
Removable Media: USB drives and
other removable media can carry viruses from one computer to another Behavior and Impact •Data Corruption: Viruses can corrupt or delete files, leading to data loss.
•System Instability: They may cause system
crashes, slow performance, or unexpected errors.
•Unauthorized Access: Some viruses aim to
provide remote access to the infected system for malicious purposes. Symptoms of Infection •Slow Performance: Sluggish response times and delays in executing commands.
•Pop-ups and Advertisements: Unwanted
advertisements or pop-ups appearing on the screen.
•Unusual Behavior: Unexpected system
behavior or changes to settings. Preventative Measures: • Antivirus Software: Install reputable antivirus programs to detect and remove viruses. • Regular Updates: Keep operating systems, software, and antivirus databases up-to-date. • Email Safety: Exercise caution with email attachments and avoid clicking on suspicious links. • Firewalls: Use firewalls to monitor and control incoming and outgoing network traffic. • User Education: Educate users about safe online practices and the risks associated with downloading or opening unknown files. Detection and Removal: •Scanning Tools: Antivirus programs use scanning tools to detect and remove viruses. •Manual Removal: In some cases, manual removal may be necessary, involving identifying and deleting infected files. Computer Hacking Computer hacking involves the unauthorized access, manipulation, or interference with computer systems, networks, or data.
Hackers, also known as cybercriminals, engage
in hacking activities for various reasons, including financial gain, political motives, ideological reasons, or simply for the challenge.
Hacking can have both legal and illegal
implications, depending on the intent and actions of the individual involved Preventative Measures: •Firewalls and Intrusion Detection Systems: Implementing firewalls and intrusion detection systems helps monitor and control network traffic.
•Regular Security Audits: Conducting regular
security audits and vulnerability assessments helps identify and address potential weaknesses.
•User Education: Educating users about
cybersecurity best practices, such as using strong passwords and being cautious with email attachments, reduces the risk of successful hacking attempts. Conclusion It's important to note that while hacking can have negative connotations, ethical hacking plays a crucial role in strengthening cybersecurity defenses and protecting against malicious activities. Organizations invest in cybersecurity measures to safeguard their systems and data from unauthorized access and potential breaches. Learning Outcome Learners can