Page 17 - Computer Genius Class 06
P. 17

Code Red Worm  2  1   ould spread itsel   ith the message    ac ed  y  hinese
                    MyDoom Worm (2004) scraped addresses from infected machines, then sent copies of itself to
                    those addresses.

                    Storm  Worm   2      attac ed  millions  o   computers   ith  an  email  a out  approaching   ad
                    weather.
                    Zeus, also known as Zbot Trojan horse  2      as made  ith an intention to steal  an ing
                    information of United States Department of Transportation.
                    Emotet   2 1    is  considered  one  o   the  most  destructi e  and  dangerous  Tro ans.   t  spreads
                    through spam emails to steal banking information.

                    Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
                    trac s the de ice completely  or e ery action.
                 Harms Caused by Computer Malware

                  ifferent mal ares  ill affect your computer in different  ays.

                   They can crash your hard disk.

                   They can destroy all or some of your data.
                   They can decrease the processing speed of the computer.

                   They can reduce or block the memory of the computer or hard disk.

                   They can stop you from restarting your computer or keep on restarting your computer.

                   They can send e-mails from your account without your knowledge.
                 How does a Computer get infected?

                  omputer mal ares spread through se eral  ays.  ome o  them are

                   using in ected   tenal  ard  is   en dri es
                   opening an infected e-mail attachment

                   do nloading an in ected program  rom  nternet or   ternal  ard  is   en dri es
                   running an in ected program   hich can  e a game  screen sa er  etc.

                   through local computer networks














                               en dri e                     e-mail                      Computer game







                                                                                Safeguarding Your Computer     15
   12   13   14   15   16   17   18   19   20   21   22