- 1、本文档共13页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Viruses,MaliciousCode,amp;amp;OtherNastyStuff.ppt
Viruses, Malicious Code, Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University dark@ 765.496.6762 /education/K-12 Software Security:(Viruses, Trojans, Unwanted Access) Only install necessary and trusted software. Beware of *free* games, screen savers, and graphics. Keep a hard copy of the copyright release for all “free” products! Run and UPDATE anti-virus software!! 1988: Less than 10 known viruses 1990: New virus found every day 1993: 10-30 new viruses per week 1999: 45,000 viruses and variants Source: McAfee Examples of Nasty Stuff: Trojan Horse Viruses Worms Logic Bomb Trapdoors Viruses: Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. . ...what if the Greek soldiers in the Trojan Horse had the plague?? Worms: Worms: reproducing programs that run independently and travel across network connections. Reproduction Differences: * A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread. * A worm can run completely independently and spread of its own will through network connections. Trojan Horse: Trojan Horse: a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive. Logic Bomb: Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date. Trapdoor: Trapdoors: allows access to a system by skipping the usual login routine. Mattel Example... Virus Information Activity(for students or teachers) Directions: Choose one of the keywords listed on the next slide. Go to the McAfee
您可能关注的文档
- Reading and ReviewChapter 12 Indexing and Hashing.ppt
- Reading and Thinking Tasks.ppt
- REGIONAL TIR SEMINAR Sofia, 11 and 12 May 2006.ppt
- Research themes.ppt
- RESSETDB应用.ppt
- Review of Units 1-6.ppt
- Review Unit Four.ppt
- Risk, Cost of Capital and Capital BudgetingChapter 12.ppt
- Roger A Rosenblatt February 12, 2004.ppt
- Running a race at 12,000 feet.ppt
- 2025年广西中考地理二轮复习:专题四+人地协调观+课件.pptx
- 2025年广西中考地理二轮复习:专题三+综合思维+课件.pptx
- 2025年中考地理一轮教材梳理:第4讲+天气与气候.pptx
- 第5讲+世界的居民课件+2025年中考地理一轮教材梳理(商务星球版).pptx
- 冀教版一年级上册数学精品教学课件 第1单元 熟悉的数与加减法 1.1.6 认识1-9 第6课时 合与分.ppt
- 2025年中考一轮道德与法治复习课件:坚持宪法至上.pptx
- 2025年河北省中考一轮道德与法治复习课件:崇尚法治精神.pptx
- 八年级下册第二单元+理解权利义务+课件-2025年吉林省中考道德与法治一轮复习.pptx
- 精品解析:湖南省娄底市2019-2020学年八年级(上)期中考试物理试题(原卷版).doc
- 2025年中考地理一轮教材梳理:第10讲+中国的疆域与人口.pptx
文档评论(0)