7e Chapter 9 Part 1

7e Chapter 9 Part 1 - MSIS 2103 Chapter 9 Part 1 1 Chapter...

Info iconThis preview shows pages 1–15. Sign up to view the full content.

View Full Document Right Arrow Icon
MSIS 2103 Chapter 9 – Part 1 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 9 Digital Lifestyle: Protecting Digital Devices and Data 2
Background image of page 2
Chapter Topics Keeping Your Data Safe Computer Viruses Computer Threats - Hackers Restricting Access to Your Digital Assets – Passwords and Firewalls Managing Online Annoyances 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Threats Cybercrimes are criminal acts conducted by cybercriminals through the use of computers A cybercriminal is an individual who uses computers, networks, and the Internet to commit crimes Cybercriminals get access to your computer from a remote location 4
Background image of page 4
Computer Threats: Viruses Virus: A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program Viruses are executable code 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What Do Viruses Do? Replicate themselves Slow down networks Secondary objectives Display annoying messages Bounce balls/other objects across your screen Make your computer run slow 6
Background image of page 6
Example This poor guy! He got a virus on his system. His data is toast! 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Viruses If your data or software is corrupted by a virus, it will cause you to Lose data and software Spend a lot of your time to re-install the OS and all of your software Spend time loading your data from your backup Computer users need to protect themselves 8
Background image of page 8
The First Virus “in the Wild” “in the wild” means that the virus appeared outside of the computer where it was created “Elk Cloner” was written in 1981 to attack the Apple II OS It displayed a poem on the screen 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Elk Cloner Display* Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes it's Cloner! It will stick to you like glue It will modify ram too 10 *http://www.skrenta.com/cl
Background image of page 10
The First Virus “in the Wild” The author was 15-year old named Richard Skrenta He had a reputation for giving computer games to his friends, but “tweaking” them first so that they didn’t work as advertised and displayed rude messages on their screens 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The First Virus “in the Wild” Any time a floppy was put into an infected computer, Elk Cloner was copied automatically onto the infected disk The virus moved from the infected disk to the memory of a computer that it was used on The virus spread from computer to 12
Background image of page 12
The First Virus “in the Wild” It was the predecessor of what we today call a “boot virus” It spread through floppy diskettes It started on an Apple II computer It continued to pop up on computers for years, even being reported ten years later on a computer used by a sailor in the first 13 *http://missoulian.com/business/article_607fb79a-fc0f-5c76-abad-
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The First PC Virus “in the Wild”* The first virus to hit computers running Microsoft Corp.'s operating system came in 1986 Two brothers in Pakistan wrote a boot sector program now called "Brain“ They said they did it to punish people who spread pirated software 14 *http://missoulian.com/business/article_607fb79a-fc0f-5c76-abad-
Background image of page 14
Image of page 15
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 53

7e Chapter 9 Part 1 - MSIS 2103 Chapter 9 Part 1 1 Chapter...

This preview shows document pages 1 - 15. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online