Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Viruses & Destructive Programs
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Spyware, Viruses and Malware What the fuss is all about.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Logic Bomb Virus.  The first use of a time bomb in software may have been with the scribe markup language and word processing system, developed by Brian.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Malicious Software.
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Botnets A collection of compromised machines
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
COMPUTER VIRUSES Computer Technology.
Botnets A collection of compromised machines
Computer Technology Notes 5
Computer Applications Unit B
Chap 10 Malicious Software.
The Internet of Unsecure Things
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Presentation transcript:

Antivirus Software Technology By Mitchell Zell

Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious software  Definition of Malware:  Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Types of Malware  Virus  Worm  Trojan Horse  Logic Bomb  Rootkit  Spyware

:53-4:22

Virus  Small software programs that are designed to spread from one computer to another and to interfere with computer operation  Commonly spread through or instant messaging  Can be hidden in other software you download

Worm  A computer program that has the ability to copy itself from machine to machine  Commonly spread through networks

Trojan Horse  Dangerous programs that hide within other seemingly harmless programs  By downloading the intended program, the Trojan Horse has full access to the computer.  It can damage the computer  It can send important sensitive information over the internet and back to the creator of the Trojan Horse

Logic Bomb  A piece of computer code that executes a malicious task, such as clearing a hard drive or deleting specific files, when it is triggered by a specific event  Planted in the computer ahead of time  Triggered by the person who planted it  Positive triggers  Individual sends command to trigger Logic Bomb  Negative triggers  Lack of input from an individual triggers Logic Bomb

Rootkits  A Rootkit is a type of software designed to hide the fact that an operating system has been compromised  Disguised as necessary files which antivirus software overlooks

Spyware  A type of malware installed on a computer without the knowledge of the owner in order to collect the owner’s private information  Can save information such as passwords and other private information

Antivirus Software  Designed to detect, prevent, and remove malicious software  Scans for viruses by looking for the Virus Signature  Algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus

Antivirus Software (con’t)  Since virus signatures are becoming more complex, new technology is used  HIPS  Behavior Blocking

HIPS  Host Intrusion Prevention System  Monitors each activity a program attempts and prompts the user for action or responds based on predefined criteria  In basic terms, HIPS watches the activity of applications and declares that each application can do certain activities, but not others  It allows the application to function normally, but prevents it from performing tasks it is not authorized to perform

Behavior Blockers  Monitor and profile whole program behavior  When a collection of behaviors tips the scale, the behavior blocker will alert the user or take action against the entire program based on predefined criteria  Focus on entire program instead of individual actions  Determines that a program is harmful and quarantines it  Easier to use

Security  Virus Signatures are becoming more complex  Antivirus software passes over newer signatures  To counteract this, multiple layers of security should be used

Works Cited  Technology.htm Technology.htm         Software.htm Software.htm  