Search Header Logo
Malicious Software

Malicious Software

Assessment

Presentation

Computers

7th Grade

Hard

Created by

Shalini Gulati

Used 4+ times

FREE Resource

3 Slides • 0 Questions

1

Malicious Software

Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware . Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent.

Slide image

2

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself.It is a type of malware .It is designed to steal your personal information, money, or simply to be annoying.

3

Symptoms of a virus attacck

  • Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you to download antivirus or other software programs

  • Changes to your homepage. Your usual homepage may change to another website, for instance. Plus, you may be unable to reset it.

  • Mass emails being sent from your email account. A criminal may take control of your account or send emails in your name from another infected computer.

  • Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to freeze or crash. It may also prevent your device from coming back on.

  • Unusually slow computer performance. A sudden change of processing speed could signal that your computer has a virus.

  • Unknown programs that start up when you turn on your computer. You may become aware of the unfamiliar program when you start your computer. Or you might notice it by checking your computer’s list of active applications.

  • Unusual activities like password changes. This could prevent you from logging into your computer.

Malicious Software

Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware . Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent.

Slide image

Show answer

Auto Play

Slide 1 / 3

SLIDE