Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Computer Viruses.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
E-Safety Challenge College. Learning Objectives To analyse computer viruses and their potential danger to your (school) work.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
CSCS 100 Shamoon Bashir Joshua Siddqui
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
COMPUTER VIRUS.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Venugopal reddy 07R91A05b7.  Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Malware and Computer Maintenance
SEMINAR ON PC SECURITY FROM VIRUSES
VIRUSES and DESTRUCTIVE PROGRAMS
Malicious Software Network security Master:Mr jangjou
Presentation transcript:

Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008

Symptoms Computer functions slower than normal Computer responds slow and freezes Computer restarts itself often Uncommon error message, distorted menus and dialog boxes Fail to print correctly Applications fail to work properly

Backdoor Program Installed on computer by disk, internet, etc. Permits access to computer Bypasses normal authentication process Results in spam to protect creator

Trojan Program Not a virus rather type of malware Does not self-replicate Usually found to be utility Accidentally ran

Virus Replicating itself onto saved files or programs Delete or destroy system files and formatting disks Uses large amounts of computer resources to slow it down

Types of Viruses Boot sector viruses Program viruses Stealth viruses Macro viruses Active X and Java control

Most Dangerous Virus Hoax Virus claiming to be gov, microsoft, etc. Says just discovered new virus Virus reformats hard drive or other harm In itself saying forward to all people

Effects of Hoax Clogs your server Decreases productivity drastically

Top Viruses June 2008 TYPE Kind Percentage TYPE Kind Percentage -Worm.Win32.NetSky.q Trojan.generic 34.15% -Worm.Win32.NetSky.q -Worm.Win32.Nyxem.e Trojan.generic 13.16% -Worm.Win32.Nyxem.e -Worm.Win32.NetSky.y Trojan.generic 8.20% -Worm.Win32.NetSky.y Net-Worm.Win32.Mytob.t Worm.P2P.generic 5.40% Net-Worm.Win32.Mytob.t

Worms Self replicating like viruses Does not attach itself to programs or files Self contained program More prominent then viruses because of internet and does not need help to spread

Effects Large amounts of bandwidth Deleting files Sending s Creating backdoor paths to computer

Types of Worms Kak Worm Bagle Code Red II Melissa Sober Supernova Worm

Rootkits Type of trojan that can monitor traffic What goes in and out of computer Monitor keystrokes Captures passwords Compromise system by altering system files and drivers This allows computer to “run normal”

Catching Rootkits Reboot computer from cd of flash drive Also has to have scan and detect tools Removing rootkits make difficult because alters your normal computer files

Anti-Virus Software AVG free (deluxe model) Norton McAfee Bit Defender

Rootkit Scanners AVG free (Deluxe) Panda Daimondcs Stopzilla