网站大量收购独家精品文档,联系QQ:2885784924

Viruses, Malicious Code,amp; Other Nasty Stuff.ppt

  1. 1、本文档共13页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Viruses,MaliciousCode,amp;amp;OtherNastyStuff.ppt

Viruses, Malicious Code, Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University dark@ 765.496.6762 /education/K-12 Software Security: (Viruses, Trojans, Unwanted Access) Only install necessary and trusted software. Beware of *free* games, screen savers, and graphics. Keep a hard copy of the copyright release for all “free” products! Run and UPDATE anti-virus software!! 1988: Less than 10 known viruses 1990: New virus found every day 1993: 10-30 new viruses per week 1999: 45,000 viruses and variants Source: McAfee Examples of Nasty Stuff: Trojan Horse Viruses Worms Logic Bomb Trapdoors Viruses: Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. . ...what if the Greek soldiers in the Trojan Horse had the plague?? Worms: Worms: reproducing programs that run independently and travel across network connections. Reproduction Differences: * A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread. * A worm can run completely independently and spread of its own will through network connections. Trojan Horse: Trojan Horse: a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive. Logic Bomb: Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date. Trapdoor: Trapdoors: allows access to a system by skipping the usual login routine. Mattel Example... Virus Information Activity (for students or teachers) Directions: Choose one of the keywords listed on the next slide. Go to the McAfee

文档评论(0)

gshshxx + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档