Top-Rated Free Essay
Preview

Computer Threats

Good Essays
944 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Threats
My speech will be related to an important echo that face technology with is computer threats. I will cover some of important threats that face most of us; I will tell you how to protect your computer from threats, how to deal with hackers, crackers and what to do if your computer was attacked.

The most popular threat that face computers are viruses,
A virus is a program written intentionally to change the way your computer operates without your permission or knowledge. Their behavior is similar to how real-life biological viruses work, and the ways of dealing with them can be quite similar as well!
A virus attaches copies of it to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk.
Maybe all of you know these information about computer viruses ,but do you know what was the first virus appeared in the world , who created it
He is Richard Skrenta( showing his picture in the powerpoint)

Other type of threats are Worms

They are the most effective and dangerous threats because they replicate and spread by them self without even opening the file, hackers often use this type to gain access to the computers that they infect. Worms can also spread by copying themselves from disk to disk or by email.
The most dangerous worm ever created is I LOVE YOU worm. It was first noticed in Philippines on May 4 2000 and then spread all over world in just one day!
Affecting 10% internet users all around the world and causing loss of about $5.5 billion.
It arrives in email inbox with subject “ILOVEYOU”. It had an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”.
Also, it sent the worm to everyone on victim contact list. Although, worm spread very fast. Only windows users were affected.

The other type of threats is Trojan horse;
Trojan horses are programs that appear to serve some useful purpose or provide entertainment; it looks like an interesting program with a beautiful link. It’s mostly annoying but some times it damages files.
I will show you how it’s done briefly…( in the computer)

I talked to you about some of the threats; and know I will tell you how to protect your self from them

1. Never open an e-mail, attachment, or click on an e-mail link from any unknown source.

2. Use antivirus software that includes e-mail scanning. I recommend Kaspersky Anti-Virus 2010(have a sample and show the students) or Shield Deluxe anti virus

3. Install a firewall on your computer.

4. Change your password regularly and create a smart password with different characters.
5. Always back up your system in case your computer was attacked you not lose your data.

But what if your computer was attacked, what you will do if you faced a hacker or your e-mail was stolen. Don’t worry I will tell you what to do

Bad news—you've suffered a virus attack. Take a few seconds to get over the initial shock, but only a few seconds. =)
It can quickly go through your system, destroying files, corrupting data, rendering applications useless, and in general causing many problems. You need to act immediately. Follow the steps below to remove the virus and restore your. - First of all disconnect the machine from the network to not infect other computer. - Once the computer has been disconnected, you need to remove the virus by cleaning up the system Use virus removal tools written for the specific virus causing the damage. - If your operating system is completely destroyed, you'll need to reinstall. Use the 'quick restore' CD that came with your computer to restore your computer to its original configuration. - Scan for viruses. After restoring, scan your entire network from viruses.

It is very easy to deal with a virus but what if you had to deal with a haker a person who breaks into computers or a cracker a person who steals passwords.
But just be aware that not all hackers are dangerous or have bad intention some times they just do it for fun.
I am going to try (only trying) to come up with some good ways to either force the hacker to leave or have them leave legally.
- First off all, just try to avoid them
- When you are not using your computer, disconnect it from the Internet. One of the worst things that can happen is when a hacker breaks into your computer and you don't even know it
- Never post your IP address in a public place. This is like inviting a hacker to your door. Once they know your Internet Protocol address (four numbers divided by periods e.g. 168.320.001.01) they can begin hacking you.
- but if your computer is already been hacked , just report hacking by taking a recording and screenshots. Don't be afraid of being targeted.

In conclusion , computer threats maybe not as important as some of other topics discussed . but still just as real ! will viruses kill anyone?..probably not. Will they cause an epidemic? I doubt it. But computer threats are larger threats to society than most people realize.
Therefore , weather you are writing a college report or your saving your best friend picture, just remember what are the threats that can in a blink destroy everything . so write away protect yourself because you never know when you'll be attacked.

[pic]

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 4222-265

    • 923 Words
    • 4 Pages

    A virus is a small infectious agent that can replicate only inside the living cells of organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea.…

    • 923 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    A virus is a small infectious agent that replicates only inside the living cells of other organisms. A virus is a small parasite that cannot reproduce by itself. Once it infects a susceptible cell, however, a virus can direct the cell to produce many more viruses. Viruses can infect all types of life forms, such as animals and plants to microorganisms, including bacteria and archaea.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    * A boot sector virus will corrupt the boot sector to make the computer inoperable, or it can do as little as change the name of your hard drive.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Viruses are a small infectious agent that can only multiply inside the cells of living organisms although unlike bacteria, fungi and parasites viruses are not living organisms. Viruses can infect any living organism such as humans, plants and animals. Viruses multiply by spreading from organism to organism for example viruses can be spread from human to human by coughing or sneezing.…

    • 1674 Words
    • 7 Pages
    Better Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Although computer viruses and biological viruses are not related in any way, they are very similar in many aspects. Both viruses need a host to replicate for a means of survival. Similarly, both enter their hosts passively. Biological hosts are infected by breathing, ingestion, or direct contact while infected software, email attachments and transfers infect the cyber host. Another notable similarity is the fact that both computer and biological viruses need the proper host as well as software and tissue specificity to reproduce efficiently. Computer viruses spread by inserting copies of itself in executable code and documents. Computer viruses can reduce the rate of computer performance, make files inaccessible, or completely wipes out the computer. In comparison, biological viruses replicate at the cost of the host by inserting itself into their cells which can result in pain, fever, and in the worse case, death.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Worms and Trojan Horses

    • 985 Words
    • 4 Pages

    Gregg Keizer Techweb News June 2004. http://www.informationweek.com/worst-caseworms.com Research work done by Nicholas Weaver & Vern Paxon two security researches who worked in collaboration with ICSI and University of California at Berkley…

    • 985 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Viruses and Anti-Virus

    • 3458 Words
    • 14 Pages

    A virus causes several deleterious effects in a computer. A virus might delete or corrupt…

    • 3458 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Effect of Computer Virus

    • 2000 Words
    • 8 Pages

    These viruses fix themselves in the computer memory and get activated whenever the OS runs and infects all the files that are then opened.…

    • 2000 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Computer Virus Expository

    • 639 Words
    • 3 Pages

    Second kind is the worm, is has a self replicating ability that spreads itself through computer network. It search for loopholes in the network copies itself and reaches another computer in the network. This kind of virus invades the kernel of the computer that makes it halt and become slow. It replicates in drastic number that make duplicates of files that cause confusion in the computer user.…

    • 639 Words
    • 3 Pages
    Good Essays