0% found this document useful (0 votes)
30 views5 pages

Computer Viruses CNIB

Uploaded by

yaminelrust
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Computer Viruses CNIB

Uploaded by

yaminelrust
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

COMPUTER VIRUSES

Topic: Computer Viruses and Other Online Threats

When I am done this lesson, I will know:


 Some common online threats
 Some tips to avoid online threats
 What to do if my computer gets a virus

Pre and Post Self-Assessment


Pre Pre Post Post
Yes, I know No, I want to Yes, I know I still need
this learn this this more practice
to learn this
I know what
some
common
online threats
are.
I know how to
avoid online
threats.
I know what to
do if my
computer gets
a virus.

New Words and Terms

Malware
Adware
Trojan
Spyware
Ransomware
Worm

1 of 5
COMPUTER VIRUSES

There are many different kinds of online threats to computers. Some of the most
common terms are:
 Malware
 Virus
 Adware
 Trojan
 Spyware
 Ransomware
 Worm
Type of Threat Description
Malware Malware is short for malicious software. This means that while
most of us refer to these threats as viruses, the correct catch-
all term should indeed be malware. Malicious software comes
in many forms, but malware itself is a general term that could
be used to describe any number of things such as viruses,
worms, trojans, spyware, and others. It’s a program or file with
bad intentions. Luckily, malware is what all the most popular
antivirus programs look for.
Virus Viruses are malicious codes that infect a computer after you
install a software. This usually happens through USB drives,
internet downloads, or email attachments, but it can happen
other ways as well.

The infection doesn’t occur just from having the infected files
on your computer. The infection happens once the program
runs for the first time, whether through Autorun, a manual
install, or an executable file that the user opens. Once opened
– or run – the infection happens. From that point, it can be very
difficult to find and get rid of the virus.

Unlike other threats, viruses have no other purpose than


attempting to render your computer inoperable.
Adware Adware is usually harmless but it can be really annoying.
Adware is often bundled with apps or software, which makes
initial detection somewhat difficult.

A common example is the checkbox at the bottom of a


download link (often pre-checked) that asks if we want to
“Include X for free” – “X” is often the program containing the
adware. If you aren’t sure what these additional programs are,
or how they function, don’t download them.
Trojan Trojans were named after the Trojan Horse, which was a giant

2 of 5
COMPUTER VIRUSES

wooden horse used to conceal Greek soldiers as they entered


Troy during the Trojan War. Like Greek soldiers, a Trojan
damages your computer the same way. It hides a malicious
code inside a program or file in order to gain access to your
machine. Once inside, the program installs itself onto your
device, and communicates with a server in the background
without your knowledge. This gives an outside party access to
your computer and information on your computer through what
is called a backdoor.
Spyware Spyware is the most common piece of malware on the Internet.
While it’s quite deceptive in nature and a major annoyance,
most spyware is relatively harmless. Typically, spyware is used
to monitor your browsing behavior. This information is often
used to send you ads based on your browsing behavior.

While typical spyware is mostly used for ad-serving purposes,


there are other more malicious types of spyware that
communicate sensitive data back to another user, or a server.
This data can include emails, photos, log files, credit card
numbers, banking information, and/or online passwords.

Spyware is most often downloaded by the user as part of an


add-on to a legitimate download (such as a toolbar) or included
as part of a freeware or shareware program.
Ransomware The goal of ransomware is to collect money by manipulating
the user into believing something that’s often untrue.
After the malicious software is installed, it will lock down your
system except for the window that allows you to pay the
ransom in order to regain use of it.
Worm Worms are the most damaging form of malware. While a virus
attacks one computer and relies on a user to share infected
files in order for it to spread, a worm exploits security loopholes
in a network and can bring the entire network down.

Once the worm is in the network, it passes (often unnoticed)


from computer to computer. As it passes from one device to
another, the infection spreads until each machine is infected.
Source: all above definitions adapted from: https://www.makeuseof.com/tag/viruses-spyware-
malware-etc-explained-understanding-online-threats/ (last accessed April 19, 2019)

3 of 5
COMPUTER VIRUSES

Check Your Knowledge

1. What is a trojan named after?


2. What is the most damaging type of malware?
3. What is the goal of ransomware?

Review this tutorial to learn what to do if your https://edu.gcfglobal.org/en/


computer gets a virus. Source: GCFGlobal.org internetsafety/what-to-do-if-your-
computer-gets-a-virus/1/

Tips for Avoiding Online Threats

1. Keep your operating system and each of your programs up-to-date by


downloading updates as they become available.
2. Install an antivirus program and keep it up-to-date.
3. Use a firewall.
4. Do not download apps or programs from unknown and untrusted sources.
5. Use your antivirus program, or a malware detection program to scan
programs and links before opening them.
6. Avoid pirated (stolen or illegal) software.
7. Don’t open email attachments from people you don’t know.
8. The best option for accessible computer security software is actually already built-in
to Windows 10. Windows Defender, and the Windows firewall are both accessible
and rather effective, as long as all of the real-time protection features are enabled.
These applications can be navigated with tab, shift + tab, and the arrow keys as
usual, using the space bar or enter to activate options.

Discussion Questions

1. Can you think of any other ways to avoid online threats?

Optional: I want to learn more

Watch this to learn three https://www.youtube.com/watch?v=nvIXGeB1WgE


tips on how to spot
malware. Source: Google

4 of 5
COMPUTER VIRUSES

Help

Ontario Adult Literacy Curriculum Framework Connection


Competency Task Groups(s)
Find and Use Information  Read Continuous Text
 Interpret Documents
 Extract Information from films, broadcasts and
presentations
Communicate Ideas and  Complete and Create Documents
Information
Use Digital Technology n/a

5 of 5

You might also like