口岸中心小学英语教学常规CreateTime.ppt
文本预览下载声明
Software Security:(Viruses, Trojans, Unwanted Access) Only install necessary and trusted software. Beware of *free* games, screen savers, and graphics. Run and UPDATE anti-virus software!! Keep a hard copy of the copyright release for all free products! 1988: Less than 10 known viruses 1990: New virus found every day 1993: 10-30 new viruses per week 1999: 45,000 viruses and variants Source: McAfee Examples of Nasty Stuff: Trojan Horse Viruses Worms Logic Bomb Trapdoors Trojan Horse: Trojan Horse: a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive. Viruses: Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. . ...what if the Greek soldiers in the Trojan Horse had the plague?? Worms: Worms: reproducing programs that run independently and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependant upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own will through network connections. Logic Bomb: Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, by a particular series of keystrokes, or at a specific time or date. Trapdoor: Trapdoors: allows access to a system by skipping the usual login routine. Mattel Example... Virus Information Activity Teach teachers to learn about viruses. Directions: Each of you has been given a keyword associated with a virus. Go to the McAfee virus information library (/) and search for information dealing with your s
显示全部