Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Текст к экзамену

.docx
Скачиваний:
1
Добавлен:
04.10.2024
Размер:
16.28 Кб
Скачать

Viruses

Слайд 1: тема, преподаватель, студент

Слайд 2: Plan: target and tasks, glossary, classification of viruses, antiviruses, virus attacks, hackers, conclusion, resources

Слайд 3: The purpose of the story is to inform students about viruses and their threats so that they will be more careful in the future.

The tasks of this presentation is to tell you about viruses, their varieties, what threats they can cause and which antiviruses are best to install.

Слайд 4: glossary 1) ILOVEYOU – a computer virus that successfully attacked millions of Windows computers in 2000;

2) watchmen – the filter program antivirus;

3) Simultaneously – (at once) – одновременно, сразу;

4) scary – (terrible) – страшный, жуткий, ужасный.

Слайд 5: Сomputer virus - a program that can be embedded in other programs and can reproduce itself

Слайд 6: classification of viruses

1) living environment – according to the habitat, viruses can be file, boot, macroviruses (viruses developed in macro languages embedded in software application packages such as Microsoft Office) and network viruses

2) the method of infection – there are resident ones - they leave their resident part, which then intercepts the operating system's access to the infected objects and are embedded in them, they will be active until the computer is turned off and there are non-resident ones - they do not infect the computer's memory and are active only for a while

3) the scale of the impact – they are simply divided into 3 types: non-dangerous, dangerous and very dangerous

4) algorithm features – protozoa(simple), invisible viruses, worm viruses

Слайд 7: A virus attack can start simultaneously or at different times on all affected computers. Usually, an attack begins by performing some communication for all computers.

Слайд 8:

1) Polyphages are the most common anti-malware tools. ((Kaspersky AntiVirus, Dr.Web).

2) Auditors are used to detect the fact of infection of the system. If the system is infected, then a policeman gets involved.

3) Blockers are programs that intercept "virus-prone" situations and inform the user about it.

4) Watchmen (or filter programs) are constantly located in the computer's RAM and perform protective functions.

Слайд 9: the best antivirus programs

1) Kaspersky Total Security – Protects your personal computer from external threats and warns about potentially dangerous Wi-Fi networks. The antivirus also hides banner ads and potentially dangerous ads from fraudulent sites.

2) Dr.Web antivirus protects funds, confidential data and the system from all kinds of attacks and threats. The program has a large updated database with data on viruses of all kinds, which is constantly updated by users and virus analysts.

3) A comprehensive antivirus created by Russian developers based on the Indian K7 Total Security. The manufacturer has also taken care of the security of the equipment: webcams, USB and Wi-Fi. PRO32 Total Security prevents attacks by viruses, malware

4) Antivirus from Finnish developers for comprehensive computer security on the global network, protection against viruses, Trojans and ransomware. Guarantees reliable operation of the Windows operating system, surfing the Internet and online payments.

Слайд 10:

1) the Morris worm – Computers were repeatedly infected with the worm, and each additional instance slowed down the computer to a state of denial of service, completely exhausting the computer's resources. Written by Cornell University graduate student Robert Tappan Morris

2) Win95.CIH – A computer virus written by Taiwanese student Chen Yinghao in June 1998. It is a resident virus that works only under the Windows 95/98/ME operating system

3) WannaCry – this virus got on the computer, encrypted almost all files with complex algorithms and demanded a ransom in bitcoins

4) ILOVEYOU – After opening the file attached to the email, the virus destroys or modifies some files on the infected machine.

Слайд 11:

1) Aaron Schwartz – a young programmer who took part in the creation of the social network Reddit, attracted attention for his active position on the principles of open science and the free Internet.

2) Kevin Poulsen – As a teenager, Kevin hacked into the Pentagon's ARPANET computer network. However, the security service of the Ministry of Defense, having caught the guy, decided to release him with a warning, due to the lack of damage caused. But Poulsen continued to practice and ten years after that he committed another hacker attack on government resources

3) Michael Kals – In the 2000s, Michael became famous for a series of distributed DDoS attacks on various corporate networks. He used several university computers to destroy Yahoo's leading search engine at the time, and shortly after attacked Dell, eBay, CNN and Amazon.

Слайд 12: фото хакеров

Слайд 13: conclusion.

Virus attacks are very scary and it often happens that it is difficult to get rid of them. Use antivirus programs, make frequent checks to protect your media and not lose many personal data.