Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.
-
Upload
david-pratt -
Category
Documents
-
view
212 -
download
0
Transcript of Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.
![Page 1: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/1.jpg)
Viruses & Spyware
A Module of the CYC Course – Computer Security
8-28-10
![Page 2: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/2.jpg)
Malware
• Viruses and spyware are often referred to as malware, short for malicious software.
• Malicious = vicious or mischievous• A virus uses your computer as it likes. It can
interfere with your computer use. It can damage files or software.
• Spyware uses your information. It can interfere with your computer use. It can steal your personal information.
![Page 3: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/3.jpg)
Purpose
• Why would someone create a computer virus or spyware?– Vandalism– Money
![Page 4: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/4.jpg)
Bogus Link Example
• Why should you not trust a message such as the one below, even if it comes from a friend?
![Page 5: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/5.jpg)
Bogus Chat Message
• This one is trickier. Why not trust these chat messages?
![Page 6: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/6.jpg)
How Viruses & Spyware Spread
• User clicks on an email attachment that downloads a virus or spyware.
• User clicks on downloadable file on a website that downloads a virus or spyware.
• User clicks on link in an email, on a website or on a social network. The link takes user to a website that attacks browser and forces virus or spyware download.
![Page 7: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/7.jpg)
Symptoms
• Homepage changes (and you did not change it!)• A lot of pop-up windows you cannot stop.• Unexpected toolbars show up.• Redirected to sites you did not request.• Search results are provided by a different search
engine than you used.• Browser continues to crash inexplicably.• Files disappear (because they have been erased.)• Computer shuts down inexplicably.• Computer extremely slow.• A lot more junk email being received.
![Page 8: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/8.jpg)
Prevention Tips
• Keep all your operating system and all software updated. Most virus and spyware attacks occur through security holes in popular software applications.
• For your browser, use Firefox, Chrome or Safari rather than Internet Explorer (IE). Because IE is so popular, virus and spyware creators target security holes in IE.
• Don’t click on any pop ups or ads offering you anything for free.
![Page 9: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/9.jpg)
Free Anti-Virus & Spyware Software
• Use an anti-virus software that scans as files are downloaded. Do not use more than one anti-virus software that runs in real time. Recommended - AVG Free Anti-Virus
• Use a spyware software that scans periodically. Recommended - Spybot Search & Destroy and Malwarebytes
![Page 10: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/10.jpg)
Additional Resources
• How Computer Viruses Work• How Spyware Works
![Page 11: Viruses & Spyware A Module of the CYC Course – Computer Security 8-28-10.](https://reader036.fdocuments.us/reader036/viewer/2022082917/5514d5a5550346935c8b50b2/html5/thumbnails/11.jpg)
11
Creative Commons License
• This module was created by Connect Your Community, a project of OneCommunity, funded by the federal Broadband Technology Opportunities Program.
• This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0