Professional Documents
Culture Documents
Portfolio ELC (Latest)
Portfolio ELC (Latest)
PREPARED BY :
MUHAMMAD SYARIFUDDIN BIN KASSIM
PREPARED FOR :
MADAM AINUL RUSMIN BINTI GHAZALI
DATE :
16TH NOVEMBER 2020
INFORMATIVE SPEECH DRAFT TEMPLATE
(Describing chart[s] and/or graph[s])
This exercise requires you to provide an outline for your informative speech by filling in the
following template.
In this exercise, you need to choose at least one chart and/or graph related to your topic.
Describe the important data (facts and figures) and the salient features of the data from the
chosen chart(s) and/or graph(s). You are also required to choose at least one article related
to your topic. Select relevant information from the chosen article(s) to provide some
supporting information for the data.
Introduction
Introduce topic Most of the people nowadays must have their own personal
computer as we are living in the cyber era. I assume that everyone
have known the term computer virus. I am sure that all of you had
experienced this problem at least once in your lifetime and it can be
a really big deal.
Background of topic I did a research about the first academic work published entitled
‘Theory of self reproducing Automata’ by Von Neumann states that
computer programme can copy and alter themselves automatically.
The theory proved that computer virus can multiply themselves by
executing the code to another device.
Central Idea We will look through two types of computer virus which are the ‘I
Love You’ virus and the Stuxnet virus.
Body
(Describing chart[s] and/or graph[s])
Description of data 1. This graph shows different types of computer virus and their
impacts on money ($).
(Chart 1)
Analysis of data 2. There are three types of computer virus that cause the
highest loss of money ($).
(Chart 1)
3. One of them is the ‘I Love You’ virus.
Conclusion
Conclusion Today, I have shared about two types of computer virus
which are the ‘I Love You’ virus and the Stuxnet virus.
Chart 1
Chart 2
Graph shows number of new malware specimen versus year
Articles used
Article 1
Alison Grace Johansen (2020, July 23) What is computer virus - US.Norton
Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-computer-
virus.html
Once a virus has successfully attached to a program, file, or document, the virus will
lie dormant until circumstances cause the computer or device to execute its code. In order
for a virus to infect your computer, you have to run the infected program, which in turn
causes the virus code to be executed.
This means that a virus can remain dormant on your computer, without showing
major signs or symptoms. However, once the virus infects your computer, the virus can
infect other computers on the same network. Stealing passwords or data, logging
keystrokes, corrupting files, spamming your email contacts, and even taking over your
machine are just some of the devastating and irritating things a virus can do.
While some viruses can be playful in intent and effect, others can have profound and
damaging effects. This includes erasing data or causing permanent damage to your hard
disk. Worse yet, some viruses are designed with financial gains in mind.
Article 2
CJ Robles (2020, May 3) ILOVEYOU Virus: 20 Years After the Malware Caused $10B
Losses Worldwide – Techtime
Retrieved from https://www.techtimes.com/articles/249312/20200503/remembering-
iloveyou-virus-20-years-after-the-destructive-virus-caused-10b-losses.htm
At the start of the millennium, a different virus has once baffled the world. With just
an email, the I Love You virus has spread immediately, crashing computers, deleting files,
and causing about $10 billion of damage in a glance.
On May 4, 2000, people worldwide received emails with "ILOVEYOU" on the subject.
The message read: "kindly check the attached LOVELETTER coming from me."
Unsuspecting victims then opened the text file. Unfortunately, it was "an executable
program" that allowed the virus to take control. It is a worm that replicated itself and sent
copies of itself to all in the victim's email address book.
The cycle kept on, recipients continued to open the attachment and dispersed it further.
Soon after, office email servers were clogged as thousands of love letters went back and
forth.
"This wasn't something that people were used to as a concept, they didn't realize that
email could be so dangerous," Michael Gazeley told CNN as he recounted his experiences
when the virus broke out. Gazely is a part-owner of the information security firm, Network
Box, located in HongKong.
It was worse than just a chain letter. The ILOVEYOU virus soon destroyed the
victim's hard drive and scrubbed numerous files
Article 3
The existence of such deadly virus which is powerful enough to destroy a nuclear
centrifuge was discovered in June 2010. It is basically a 500KB computer worm which
infected many industrial plants in Iran including the Uranium enrichment plant. The virus
was designed in a way such that it can spread rapidly from one computer through other with
or without the Internet unlike the normal computer viruses. Stuxnet was crafted in such a way
that it is quite impossible to predict and stop. StuxNet stealthily spreads between the
computers running on windows even without Internet connection, through USB drives. Since
it is much unsuspected that anyone could spread a worm in this way, it was unpredictable till
the actual damages were reported. The virus becomes functional in three different stages:
1. First : It targets the loopholes in windows (operating system) machines and networks and
quickly replicates itself in a deeper(Penetrating deep into the system) and broader(targeting as
many as such vulnerable systems) manner.
2. Second : Then it penetrated into the Siemens step7 software (which again is a windows
based
software), which is used to program industrial control systems.
3. Third: It compromises the logic controllers which give the creators of the virus the access
to spy on industrial systems and also they get to control the whole system.
More technically speaking the careful evaluation of this weapon in the cyber-terrorism world,
it exploits five different vulnerabilities [2] : LNK (MS10-046), Print Spooler (MS10-061),
Server Service (MS08-067), Privilege escalation via Keyboard layout file, Privilege
escalation via Task
Scheduler.
References
1. Alison Grace Johansen (2020, July 23) What is computer virus - US.Norton
Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-computer-
virus.html
2. CJ Robles (2020, May 3) ILOVEYOU Virus: 20 Years After the Malware Caused $10B
Losses Worldwide – Techtime
Retrieved from https://www.techtimes.com/articles/249312/20200503/remembering-
iloveyou-virus-20-years-after-the-destructive-virus-caused-10b-losses.htm
4. David Kushner (2013, February 26) The real story of Stuxnet - Spectrum
Retrieved from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet