Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
We are here to help you… Fight something like this Brownies !
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Malicious Software.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
3.6 Fundamentals of cyber security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Page 1 Viruses

Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately, those tasks are often used to against us.

Page 3 What Is a Virus A virus may do any of the following: install itself on a computer in a way that makes it difficult to detect and remove replicate itself from the infected computer to other computers perform routine system file management processes such as file deletion and boot record modification copy information across a network link carry out its activities without any regard for the system or network resources it is utilizing.

Page 4 In the past, viruses were usually spread via floppy disks and computer modems. Today, most viruses are spread by USB memory sticks, CDs, DVDs, network shares, or . viruses are now the most common type of virus. What Is a Virus

Page 5 Types of Viruses There are three main types of viruses: A virus is malicious software which attaches to another program to execute a specific unwanted function on a computer. A worm executes arbitrary code and installs copies of itself in the memory of the infected computer, which then infects other hosts. A Trojan Horse is an application written to look like something else. When a Trojan Horse is downloaded and opened, it attacks the end user computer from within.

Page 6 Virusus Most viruses require end user activation and can lay dormant for an extended period and then activate at a specific time or date. Viruses can be harmless, such as those that display a picture on the screen, or they can be destructive, such as those that modify or delete files on the hard drive. Viruses can also be programmed to mutate to avoid detection.

Page 7 Worms are a particularly dangerous type of hostile code. They replicate themselves by independently exploiting vulnerabilities in networks. Whereas a virus requires a host program to run, worms can run by themselves. They do not require user participation and can spread very quickly over the network. Worms

Page 8 Worms are responsible for some of the most devastating attacks on the Internet. The SQL Slammer Worm of January 2003 slowed global Internet traffic as a result of Denial of Service. Over 250,000 hosts were affected within 30 minutes of its release. A patch for this vulnerability was released in mid-2002, so the servers that were affected were those that did not have the update patch applied. Worms

Page 9 Most worm attacks have three major components: Enabling vulnerability - A worm installs itself using an exploit mechanism ( attachment, executable file, Trojan Horse) on a vulnerable system. Propagation mechanism - After gaining access to a device, the worm replicates itself and locates new targets. Payload - Any malicious code that results in some action. Most often this is used to create a backdoor to the infected host. Worms

Page 10 The term Trojan Horse originated from Greek mythology. Greek warriors offered the people of Troy (Trojans) a giant hollow horse as a gift. A Trojan Horse in the world of computing is malware that carries out malicious operations under the guise of a desired function. A Trojan Horse contains hidden, malicious code that exploits the privileges of the user that runs it. Trojan Horses

Page 11 The term Trojan Horse originated from Greek mythology. Greek warriors offered the people of Troy (Trojans) a giant hollow horse as a gift. A Trojan Horse in the world of computing is malware that carries out malicious operations under the guise of a desired function. A Trojan Horse contains hidden, malicious code that exploits the privileges of the user that runs it. Trojan Horses

Page 12 The Trojan Horse concept is flexible. It can cause immediate damage, provide remote access to the system (a back door), or perform actions as instructed remotely, such as "send me the password file once per week." Trojan Horses

Page 13 Trojan Horses are usually classified according to the damage that they cause: Remote-access Trojan Horse - enables unauthorized remote access Data sending Trojan Horse - provides the attacker with sensitive data such as passwords Destructive Trojan Horse - corrupts or deletes files Proxy Trojan Horse - user's computer functions as a proxy server FTP Trojan Horse -opens port 21 Security software disabler Trojan Horse - stops antivirus programs or firewalls from functioning Denial of Service Trojan Horse - slows or halts network activity Trojan Horses

Page 14 The primary means of mitigating virus and Trojan Horse attacks is antivirus software. Antivirus software helps prevent hosts from getting infected and spreading malicious code. It requires much more time to clean up infected computers than it does to maintain up-to-date antivirus software and antivirus definitions on the same machines. Antiviruses

Page 15 Antivirus software is the most widely deployed security product on the market today. Several antivirus software companies, such as Symantec, Computer Associates, McAfee, and Trend Micro, have been in the business of detecting and eliminating viruses for more than a decade. Antivirus products have update automation options so that new virus definitions and new software updates can be downloaded automatically or on demand. Antiviruses

Page 16 How does antivirus software work? The three basic ways in which anti-virus software works are: 1.scans for viruses 2.removes viruses 3.offers limited protection against the installation of new viruses. The Antivirus ability to do these tasks depends on how up-to-date it is. Antiviruses

Page 17 A scan checks if software has not been altered by a virus. It will also check the computer’s RAM, hard disk drive (HDD) boot sector and each file on the drive. The anti-virus program will scan for patterns of bits, called signatures, which are known to match the program code of a virus. These ‘bit patterns’ are stored in a database called a Virus Definition File. Scanning for viruses

Page 18 Some anti-virus software will check for viruses passively. This means that when a file or document is accessed, the anti-virus program will automatically scan it. Scanning for viruses

Page 19 Methods for removing viruses vary greatly. Many virus programs come equipped with procedures to remove common viruses from the system. The type of actions required to remove a virus is different for each version of a virus. The most common methods of virus removal are: 1.Removal by the anti-virus program that detected it 2.Removal by a software utility from the anti- virus software support site 3.Manual removal following a written procedure. Removing viruses

Page 20 If you cannot remove a virus using the software the first place you should go is the company's website to check if a removal method has been found. If a virus has completely destroyed files on your computer and you can’t remove it the best action is to restore a backup or format your hard drive. Removing viruses