Computer Software

Application Software
Group of software whose purpose is to perform tasks.

Productivity

Group of software whose purpose is to perform tasks.
Examples: Word doc, Spreadsheet, data base, photo editors

Entertainment

Any software that supports a hobby or provides a form of amusement.
Examples: Video games, music players, video players, digital painting

Business

Deals with business records and customer information.
Examples: Finances, accounting, customer service, project management

Education/Reference

Any software that is made for an educational purpose.
Examples: Desmos, Encyclopedia Britannica, Scratch, google classroom

How to Protect yourself from Malware

Make sure data is up to date

Don’t click suspicious links or emails

Leave websites that that redirect you to another websites immediately

Get a good antivirus or ad-blocker

Back up your data just in case.

Timeline of computer viruses

a

1971 - Creeper

Created by: Bob Thomas.
An experiment to see if self replicating was possible. It did nothing bad to the computers it infected.

1974 - Rabbit

Created by: Unknown
Made copies of itself at high speeds and slowed down computers.

1986 - Brain

Created by: Basit and Amjad Farooq Alvi.
The intent was to protect their medical information from being copied without their permission.

1999 - Melissa

Created by: David Lee Smith.
Had an email attachment with pornographic websites, when opened it sent itself to the first 50 people in the user’s contact list.

2000 - ILOVEYOU

Created by: Onel de Guzman.
He wanted to steal other people’s passwords to log into their accounts without paying for the service.

2004 - Mydoom

Created by: A Russian programmer.
Allowed hackers to access an infected computer’s hard drive.

2010 - Stuxnet

Created by: USA and Iran programmers.
Aimed at Iran’s nuclear facilities and destroyed Natanz uranium enrichment facility.

2017 - WANNACRY

a

Created by: Eternal Blue.
It encrypts data and demands a payment of $300 worth of bitcoin to get data back. Raises up to $600 if the first demand wasn’t met in a few days.

Malware
Software that exists to be disruptive: Malicious Software

Virus

Spreads by copying itself. Can affect any type of computer functionality by changing existing programs

Trojan

Program or file that says it's one thing (like a video or game) and is really something else (like a virus or spyware)

Adware/Spyware

Collects information about the user and changes web searches or traffic to other sites

Worms

Any way around a security measure without authorization.

Backdoor

Any way around a security measure without authorization.

Klikk her for å sentrere kartet ditt.
Klikk her for å sentrere kartet ditt.