You are on page 1of 16

MISRAK TVET College

Training, Teaching and Learning Materials Development (TTLM)


Learning Guide Date: 04-2014 Page 1 of 16
Author: MIKE, ICT MISRAK TVET College

ghh














ICT SUPPORT SERVICE
Level I





Unit of Competence: Protect Software or System Application
Module Title : Protecting Software or System Application
LG Code : ICT ITS1 L01 10
TTLM Code : ICT ITS1 TTLM 0414




LO 2: Detect and removed destructive software
















MISRAK TVET COLLEGE
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 2 of 16
Author: MIKE, ICT MISRAK TVET College






INTRODUCTION Learning Guide # 11

This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics

Computer Viruses
Virus Origin, History and Evolution
Virus Infection, Removal and Prevention
Anti-virus Software

This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to

Define and identify common types of destructive software
Select and install virus protection compatible with the operating system in use
Describe advanced systems of protection in order to understand further options
Install Software updates on a regular basis
Configure software security settings to prevent destructive software from infecting computer
Run and/or schedule virus protection software on a regular basis
Report detected destructive software to appropriate person and remove the destructive software
Learning Activities

1. Read the specific objectives of this Learning Guide.
2. Read the information written in the Information Sheets 1 in pages 3-4.
3. Accomplish the Self-check in page 5.
4. Read the information written in the Information Sheets 2 in pages 6-7.
5. Accomplish the Self-check in page 8.
6. Read the information written in the Information Sheets 3 in pages 9.
7. If you earned a satisfactory evaluation proceed to Operation Sheet on pages 10-14. However, if your
rating is unsatisfactory, see your teacher for further instructions or go back to Learning Activity # 1.
8. Do the LAP test in page 15 (if you are ready) and show your output to your teacher. Your teacher
will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice
you on additional work. But if satisfactory you can proceed to Learning Guide 11.




Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your
teacher shall advice you on additional work. But if satisfactory you can proceed to the next topic.

Information Sheet 1 Computer Viruses

What is a Virus?
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 3 of 16
Author: MIKE, ICT MISRAK TVET College

Virus is a small software program that is specifically designed to spread between computers and hinder
basic computer functions.

Viruses are commonly spread through email attachments or instant messages, so it's never a good idea
to open an attachment from a sender that you are not familiar with. They can also be inadvertently downloaded
through the Internet, as part of a file or program that might have come from a questionable website.
Computer viruses can cause serious damage to a computer system. They can slow down the computer's
overall performance and lead to a loss of data that could range from one single file to your entire hard drive.
These viruses have kept pace with new computer technology, evolving rapidly and increasing in complexity;
however, there are still many easy and often free ways to eliminate these destructive programs, while keeping
new ones from invading.
Here are the different kinds of viruses:
Virus - Can replicate and spread to other computers. Also attacks other program
Worm - A special type of virus that can replicate and spread, but generally doesn't attack other
programs
Trojan - Doesn't replicate, but can spread. Doesn't attack other programs. Usually just a way of
recording and reporting what you do on your PC
Viruses are split into different categories, depending on what they do.
Here are a few categories of viruses:
Boot Sector Virus
The Boot Sector of a PC is a part of your computer that gets accessed first when you turn it on.
It tells Windows what to do and what to load. It's like a "Things To Do" list. The Boot Sector is also
known as the Master Boot Record. A boot sector virus is designed to attack this, causing your PC to
refuse to start at all!

File Virus
A file virus, as its name suggests, attacks files on your computer. Also attacks entire programs,
though.


Macro Virus
These types of virus are written specifically to infect Microsoft Office documents (Word, Excel
PowerPoint, etc.) A Word document can contain a Macro Virus. You usually need to open a document
in an Microsoft Office application before the virus can do any harm.

Multipartite Virus
A multipartite virus is designed to infect both the boot sector and files on your computer

MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 4 of 16
Author: MIKE, ICT MISRAK TVET College

Polymorphic Virus
This type of virus alter their own code when they infect another computer. They do this to try
and avoid detection by anti-virus programs.





































Self-Check 1 Written Test

Instruction: Answer all the questions listed below, if you have some difficulty doing this self check, feel
free to ask your teacher for clarifications.

1. It is a small software program that is specifically designed to spread between computers and
hinder basic computer functions.
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 5 of 16
Author: MIKE, ICT MISRAK TVET College


2. What are three (3) different kinds of viruses



3. This virus doesn't replicate, but can spread.

4. It can replicate and spread to other computers. Also attacks other program

5. A special type of virus that can replicate and spread, but generally doesn't attack other
Programs

6. What are the five (5) categories of a virus?





7. This virus attacks files on your computer.


8. These viruses are written specifically to infect Microsoft Office documents
(Word, Excel PowerPoint, etc.)

9. This virus alters their own code when they infect another computer.

10. This is designed to infect both the boot sector and files on your computer.

11. It is design to attack boot sector, causing your PC to refuse to start at all.



You must able to get 11points to be competent otherwise youll take another test



Information Sheet 2 Virus Infection, Removal and Prevention
How do Viruses get on my computer?
The most common way that a virus gets on your computer is by an email attachment. If you open the
attachment, and your anti-virus program doesn't detect it, then that is enough to infect your computer. Some
people go so far as NOT opening attachments at all, but simply deleting the entire message as soon as it comes
in. While this approach will greatly reduce your chances of becoming infected, it may offend those relatives of
yours who have just sent you the latest pictures of little Johnny!
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 6 of 16
Author: MIKE, ICT MISRAK TVET College

You can also get viruses by downloading programs from the internet. That great piece of freeware you
spotted from an obscure site may not be so great after all. It could well be infecting your PC as the main
program is installing.
If your PC is running any version of Windows, and it hasn't got all the latest patches and updates, then
your computer will be attacked a few minutes after going on the internet! (Non Windows users can go into
smug mode!)
Nowadays, they utilized the use of removable storage devices to spread viruses. The most common is
the use of flash drive. Since removable drives like flash drive, CD/DVDs have the autorun functionality, a simple
command that enables the executable file to run automatically, they exploited and altered it so it will
automatically run the virus (normally with .exe, .bat, .vbs format) when you insert your flash drive or CD/DVDs.
Virus infected Symptoms
Common symptoms of a virus-infected computer include
unusually slow running speeds
failure to respond to user input
system crashes and constant system restarts that are triggered
automatically.
Individual applications also might stop working correctly,
disk drives might become inaccessible,
unusual error messages may pop up on the screen,
menus and dialog boxes can become distorted and peripherals like printers
might stop responding.
You can't access your disk drives Other symptoms to look out for are strange
Error messages, documents not printing correctly, and distorted menus and dialogue boxes. Try
not to panic if your computer is exhibiting one or two items on the list.
Keep in mind that these types of hardware and software problems are not always caused by
viruses, but infection is certainly a strong possibility that is worth investigating.

Removal
The first step in removing computer viruses is installing any updates that are available for your
operating system; modern operating systems will automatically look for updates if they are connected to
the Internet. If you do not already have anti-virus software on your computer, subscribe to a service and
use the software to do a complete scan of your computer. Since new computer viruses are constantly
being created, set your anti-virus program to automatically check for updates regularly.
Prevention
In order to prevent future computer infections:
use an Internet firewall,
check for operating system and anti-virus program updates,
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 7 of 16
Author: MIKE, ICT MISRAK TVET College

scan your computer regularly and exercise caution when handling email and Internet files.

A firewall is a program or piece of hardware that helps screen out viruses, worms and
hackers which are attempting to interact with your computer via the Internet. On modern computers,
firewalls come pre-installed and are turned on by default, so you probably already have one running in
the background. When opening email attachments, don't assume they are safe just because they come
from a friend or reliable source; the sender may have unknowingly forwarded an attachment that
contains a virus.






















Self-Check 2 Written Test

Instruction: Answer all the questions listed below, if you have some difficulty doing this self check, feel
free to ask your teacher for clarifications.

1. What is the most common way that a virus can get to your computer?


2. You can also get virus by what?


3. Nowadays what do the viruses utilize for them to spread?


4. What is a simple command that enables the executable file to run automatically?


MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 8 of 16
Author: MIKE, ICT MISRAK TVET College

5. Give at least five(5) Common symptoms of a virus-infected computer.





6. What is the first step in removing a virus to you computer?


7. What is another step you must do to in removing a virus to your computer?


8. It is a program or piece of hardware that helps screen out viruses, worms and hackers which
are attempting to interact with your computer via the Internet.


9. What are the 3 ways to prevent your computer to get infected with virus?





You must able to get 9 points to be competent otherwise youll take another test

Information Sheet 3 Anti-virus Software
Antivirus software
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not
limited to computer viruses, computer worm, trojan horses, spyware and adware. This page talks about the
software used for the prevention and removal of such threats, rather than computer security implemented by
software methods.
There are different anti-virus in the world because the virus is different as well as.
Some Example of anti-virus.

MacAfee anti vies
Avast anti virus
Semantic anti virus
AVG anti virus etc



MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 9 of 16
Author: MIKE, ICT MISRAK TVET College




























Operation Sheet 1 Protecting your computer from Viruses

You can protect yourself against viruses with a few simple steps:
If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a
more secure operating system like UNIX. You never hear about viruses on these operating systems
because the security features keep viruses (and unwanted human visitors) away from your hard disk.
If you are using an unsecured operating system, then buying virus protection software is a nice
safeguard.
If you simply avoid programs from unknown sources (like the Internet), and instead stick with
commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.
You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you
should NEVER run macros in a document unless you know what they do. There is seldom a good
reason to add macros to a document, so avoiding all macros is a great policy.
You should never double-click on an e-mail attachment that contains an executable. Attachments that
come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do
no damage (noting the macro virus problem in Word and Excel documents mentioned above).
However, some viruses can now come in through .JPG graphic file attachments. A file with an
extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it
wants. Once you run it, you have given it permission to do anything on your machine. The only
defense is never to run executables that arrive via e-mail.
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 10 of 16
Author: MIKE, ICT MISRAK TVET College

System Security Configuration
Security is a key for any hardware or software infrastructures which are either in stand alone or networked
environment.
Microsoft provides free support for virus- and security-related issues for Windows XP.
To open security center:
Step 1. Click start control panel security center.













Step 2. Click security center






















Step 3. Click on change the way security center alerts me on the left side of your screen.

MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 11 of 16
Author: MIKE, ICT MISRAK TVET College













Step 4. Check/uncheck the check boxes in order to set alerts.




How to turn on or off security center:

Step 1. Click start control panel performance and maintenance

















Step 2. Click on administrative tools
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 12 of 16
Author: MIKE, ICT MISRAK TVET College







Step 3. Double Click on services









Step 4. Find and double click on security center
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 13 of 16
Author: MIKE, ICT MISRAK TVET College









Step 5. Select Automatic from start up type drop down list.









MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 14 of 16
Author: MIKE, ICT MISRAK TVET College






Step 6. Click on apply













Step 7. Click on start and click on ok button.


Lap Test Practical Demonstration

Name: ________________________ Date: ___________

Time started: ___________________ Time finished: ________

Instructions: You are required to perform the following individually with the presence of your teacher.

1. Set the internet firewall on
2. Set the automatic updates on
3. Enable Macro Virus Protection on MS Word, MS Excel and MS Access
MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 15 of 16
Author: MIKE, ICT MISRAK TVET College

4. Install any Software Antivirus
5. Install Deepfreeze (optional)




















Your teacher will evaluate your output either satisfactory or unsatisfactory. If
Unsatisfactory, your teacher shall advice you on additional work. But if satisfactory, you can proceed to the next
topic.






















MISRAK TVET College
Training, Teaching and Learning Materials Development (TTLM)
Learning Guide Date: 04-2014 Page 16 of 16
Author: MIKE, ICT MISRAK TVET College

You might also like