際際滷

際際滷Share a Scribd company logo
How to Protect your PC from Malware
 What is Malware
 Types of Malware
 How to prevent Malware
Malicious Software
 What is malware?
 Software designed to infiltrate a computer system and possibly
damage it without the users knowledge or consent
 Types of malware
 Viruses
 Adware
 Spyware
 Trojan Horse
 Worms
 Ransomware
 Logic Bombsand more
Spyware
 Malicious software that is either downloaded unwittingly from a
website
 or is installed along with some other third-party software
 It monitors the users activity without informing the user that it is
doing so
 It passes on users information to marketers or intercepts personal
data such as credit card numbers
 It always provides commercial gain
How Spyware comes to your computer?
 Downloading free games, utilities, media players
 Opening spam email
 Visiting corrupted websites
 Mainstream software applications
 File sharing programs
How to prevent Spyware?
 The first line of defense is Windows defender (Windows 8)
 Set your Internet security setting to high
 Follow your instincts, dont visit untrusted Websites
 Read before you click, uncheck the small boxes, and No, I do not accept
Adware
 Displays ads and generate revenue for the creator
 Adware collect data on which sites the user visits
 Sends this data back to the company and delivers ads based on the
information
 It can be included within some freeware or shareware
 A visit to an infected website can result in installation of adware
 Antivirus software can detect and remove adware
Trojan Horse
 Trojan horses are programs that enter a system or network under the
guise of another program
 It may be included as an attachment or as part of an installation program
 Appears to perform wanted functions but is actually performing malicious
functions behind the scenes
 The name is derived from the story of the Greek gift to the Trojans, hidden
with soldiers
How to prevent Trojan horse
 Not to allow them to enter your system
 Any software or operating system you install, back it up
 If Trojan horse suspected, then reinstall the original program
 It will delete Trojan horse
 A port scan may also reveal a Trojan horse
 Also, any Trojan Removal software will be helpful
Trojan Horse Removal Software
Worms
 A worm is similar to a virus by design and is considered to be a sub-class
of a virus
 Worms spread from computer to computer, but unlike a virus, it has the
capability to travel without any human action
 A worm takes advantage of file or information transport features on your
system, which is what allows it to travel unaided
 Worm has the capability to replicate itself on your system
 So your computer will be sending out hundreds or thousands of copies of
itself creating a huge devastating attack effect
Who Will Get Infected by Worms?
Ransomware
 Ransomware is often delivered through Trojan Horse
 Takes control of the system and demands a third party be paid
 Control can be accomplished by encrypting the hard drive, by changing
user password information or any other creative ways
 Users are assured that by paying the money they will be given the code
needed to revert their system to normal operations
Ransomware Sign
Logic Bombs
 Logic bombs are programs that executes when a certain predefined event
occurs
 A bomb may send a note to attacker when a user is logged on to the
Internet
 This message informs the attacker that the user is ready for an attack
 That the victim has meet the needed criteria for an attack to begin
 Victims system can be used to initiate an attack, such as DDOS attack
 Or can grant access at the time of the attackers choosing
Virus
 A virus is a piece of software designed to infect a computer system
 A computer virus attaches itself to another program
 or replaces it by overwriting it so that it can reproduce itself without you
knowing it
 It can quickly use up all the available memory on your computer and
seriously slow down the system, and even stop it completely
 Viruses can damage data files, destroy files, make disks unreadable
How viruses get into your computer
 From contaminated media, like DVD, USB, or CD-ROM
 Through email and social networking sites
 As part of another program
What viruses can do
 Damage data files
 Destroy files
 make disks unreadable
 Even cause damage they werent designed to
How to prevent viruses
 The primary method is antivirus software, like Symantec Endpoint
Protection, and Microsoft Security Essentials
 Symantec Endpoint Protection is provided for free to NOVA students
 NOVA students can download it from Blackboard using their myNOVA
username and password
 https://learn.vccs.edu/webapps/portal/execute/tabs/tabAction?tab_tab_gr
oup_id=_23_1
 Microsoft Security Essentials can be downloaded for free from Microsoft
Website
 http://www.microsoft.com/en-us/download/details.aspx?id=5201
What is Anti-Virus software
 Antivirus software is an application to protect your system and scan it for
viruses, worms and Trojan horses
 Most viruses have characteristics that are common to families of virus
 Antivirus software looks for these characteristics, or fingerprints, to
identify and naturalize viruses before they impact you
 More free Anti-Virus software, like Malwarebytes, Spybot, Trend Micro and
more
User Education
 The second method preventing viruses is user education
 Not to open suspicious files
 To scan every disk, email, and document they receive before they open
them
 The security settings should be on high within the application they use
 Update the antivirus software at all times
Symptoms of Virus Infection
 Programs of your system start to load more slowly
 Unusual files appears on your hard drive, or files disappear from your
system
 Many viruses delete key files in your system to make it inoperable
 Program size changes from installed version, because virus is attaching
itself to the program
 Browser, word processing application, or other software exhibit unusual
operating characteristics.
 System suddenly doesnt reboot or gives unexpected error messages
during startup
Hands-on Activity
 Scanning your system using Microsoft Baseline Security Analyzer
 Install the free Microsoft Baseline Security Analyzer
 Start Microsoft Baseline Security Analyzer
 Choose scan this computer
 You will have a choice which computer to scan
 Choose this computer
 Click on start Scan
 View the report details when the scan concludes
Resources
 CompTIA Security +, Deluxe Study Guide, Third Edition
 By: Emmett Dulaney

More Related Content

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
Middle East International School
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
Malware
MalwareMalware
Malware
Anoushka Srivastava
Application software
Application softwareApplication software
Application software
Balpreet Singh
Usage Of Application Software
Usage Of Application SoftwareUsage Of Application Software
Usage Of Application Software
'Atikah Khalil
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
OECLIB Odisha Electronics Control Library
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
Application software
Application softwareApplication software
Application software
Rana Usman Sattar
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
Computer virus
Computer virusComputer virus
Computer virus
Utchi
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
Spyware
SpywareSpyware
Spyware
Kardan university, kabul , Afghanistan

Similar to How to Protect your PC from Malware (20)

Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
Sitamarhi Institute of Technology
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
Sitamarhi Institute of Technology
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
Softex Software House
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
Virus
VirusVirus
Virus
Mukul Kumar
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
krunal gandhi
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
Computer virus
Computer virusComputer virus
Computer virus
karniksingh
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
krunal gandhi
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
Computer virus
Computer virusComputer virus
Computer virus
karniksingh
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig

Recently uploaded (20)

Adventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil SirAdventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil Sir
GUJARATCOMMERCECOLLE
How to Modify Existing Web Pages in Odoo 18
How to Modify Existing Web Pages in Odoo 18How to Modify Existing Web Pages in Odoo 18
How to Modify Existing Web Pages in Odoo 18
Celine George
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptxPOWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
MarilenQuintoSimbula
How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18
Celine George
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1
Information Technology for class X CBSE skill Subject
Information Technology for class X CBSE skill SubjectInformation Technology for class X CBSE skill Subject
Information Technology for class X CBSE skill Subject
VEENAKSHI PATHAK
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptxTRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
PoojaSen20
Essentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok SonawalaEssentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok Sonawala
Association for Project Management
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
Kaun TALHA quiz Finals -- El Dorado 2025
Kaun TALHA quiz Finals -- El Dorado 2025Kaun TALHA quiz Finals -- El Dorado 2025
Kaun TALHA quiz Finals -- El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Prelims - El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAMDUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
vlckovar
Adventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil SirAdventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil Sir
GUJARATCOMMERCECOLLE
How to Modify Existing Web Pages in Odoo 18
How to Modify Existing Web Pages in Odoo 18How to Modify Existing Web Pages in Odoo 18
How to Modify Existing Web Pages in Odoo 18
Celine George
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptxPOWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
MarilenQuintoSimbula
How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18
Celine George
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1
Information Technology for class X CBSE skill Subject
Information Technology for class X CBSE skill SubjectInformation Technology for class X CBSE skill Subject
Information Technology for class X CBSE skill Subject
VEENAKSHI PATHAK
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptxTRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
TRANSFER OF PATIENTS IN HOSPITAL SETTING.pptx
PoojaSen20
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
APM People Interest Network Conference - Oliver Randall & David Bovis - Own Y...
Association for Project Management
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAMDUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
vlckovar

How to Protect your PC from Malware

  • 1. How to Protect your PC from Malware What is Malware Types of Malware How to prevent Malware
  • 2. Malicious Software What is malware? Software designed to infiltrate a computer system and possibly damage it without the users knowledge or consent Types of malware Viruses Adware Spyware Trojan Horse Worms Ransomware Logic Bombsand more
  • 3. Spyware Malicious software that is either downloaded unwittingly from a website or is installed along with some other third-party software It monitors the users activity without informing the user that it is doing so It passes on users information to marketers or intercepts personal data such as credit card numbers It always provides commercial gain
  • 4. How Spyware comes to your computer? Downloading free games, utilities, media players Opening spam email Visiting corrupted websites Mainstream software applications File sharing programs
  • 5. How to prevent Spyware? The first line of defense is Windows defender (Windows 8) Set your Internet security setting to high Follow your instincts, dont visit untrusted Websites Read before you click, uncheck the small boxes, and No, I do not accept
  • 6. Adware Displays ads and generate revenue for the creator Adware collect data on which sites the user visits Sends this data back to the company and delivers ads based on the information It can be included within some freeware or shareware A visit to an infected website can result in installation of adware Antivirus software can detect and remove adware
  • 7. Trojan Horse Trojan horses are programs that enter a system or network under the guise of another program It may be included as an attachment or as part of an installation program Appears to perform wanted functions but is actually performing malicious functions behind the scenes The name is derived from the story of the Greek gift to the Trojans, hidden with soldiers
  • 8. How to prevent Trojan horse Not to allow them to enter your system Any software or operating system you install, back it up If Trojan horse suspected, then reinstall the original program It will delete Trojan horse A port scan may also reveal a Trojan horse Also, any Trojan Removal software will be helpful
  • 10. Worms A worm is similar to a virus by design and is considered to be a sub-class of a virus Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided Worm has the capability to replicate itself on your system So your computer will be sending out hundreds or thousands of copies of itself creating a huge devastating attack effect
  • 11. Who Will Get Infected by Worms?
  • 12. Ransomware Ransomware is often delivered through Trojan Horse Takes control of the system and demands a third party be paid Control can be accomplished by encrypting the hard drive, by changing user password information or any other creative ways Users are assured that by paying the money they will be given the code needed to revert their system to normal operations
  • 14. Logic Bombs Logic bombs are programs that executes when a certain predefined event occurs A bomb may send a note to attacker when a user is logged on to the Internet This message informs the attacker that the user is ready for an attack That the victim has meet the needed criteria for an attack to begin Victims system can be used to initiate an attack, such as DDOS attack Or can grant access at the time of the attackers choosing
  • 15. Virus A virus is a piece of software designed to infect a computer system A computer virus attaches itself to another program or replaces it by overwriting it so that it can reproduce itself without you knowing it It can quickly use up all the available memory on your computer and seriously slow down the system, and even stop it completely Viruses can damage data files, destroy files, make disks unreadable
  • 16. How viruses get into your computer From contaminated media, like DVD, USB, or CD-ROM Through email and social networking sites As part of another program
  • 17. What viruses can do Damage data files Destroy files make disks unreadable Even cause damage they werent designed to
  • 18. How to prevent viruses The primary method is antivirus software, like Symantec Endpoint Protection, and Microsoft Security Essentials Symantec Endpoint Protection is provided for free to NOVA students NOVA students can download it from Blackboard using their myNOVA username and password https://learn.vccs.edu/webapps/portal/execute/tabs/tabAction?tab_tab_gr oup_id=_23_1 Microsoft Security Essentials can be downloaded for free from Microsoft Website http://www.microsoft.com/en-us/download/details.aspx?id=5201
  • 19. What is Anti-Virus software Antivirus software is an application to protect your system and scan it for viruses, worms and Trojan horses Most viruses have characteristics that are common to families of virus Antivirus software looks for these characteristics, or fingerprints, to identify and naturalize viruses before they impact you More free Anti-Virus software, like Malwarebytes, Spybot, Trend Micro and more
  • 20. User Education The second method preventing viruses is user education Not to open suspicious files To scan every disk, email, and document they receive before they open them The security settings should be on high within the application they use Update the antivirus software at all times
  • 21. Symptoms of Virus Infection Programs of your system start to load more slowly Unusual files appears on your hard drive, or files disappear from your system Many viruses delete key files in your system to make it inoperable Program size changes from installed version, because virus is attaching itself to the program Browser, word processing application, or other software exhibit unusual operating characteristics. System suddenly doesnt reboot or gives unexpected error messages during startup
  • 22. Hands-on Activity Scanning your system using Microsoft Baseline Security Analyzer Install the free Microsoft Baseline Security Analyzer Start Microsoft Baseline Security Analyzer Choose scan this computer You will have a choice which computer to scan Choose this computer Click on start Scan View the report details when the scan concludes
  • 23. Resources CompTIA Security +, Deluxe Study Guide, Third Edition By: Emmett Dulaney