OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention
VIRUSWORM Ranges in severity Attaches to file or program ( ) Different effects Damaging/annoying Spread by human action Only works on executable programs Can be written to do specific tasks Ranges in severity Can come from anywhere Virus sub-class Can travel W/O humans Can replicate by hundreds of thousands Takes up bandwidth Can be written to do specific tasks
Virus When program runs, virus runs Attaches to other programs Sent via Can use list to spread Needs program to be effective Worm Uses computer network Reproduces itself Exploit holes in operating systems Can shut down networks
Started July 13, 2001 Attacked Microsoft’s IIS web server Called Code Red after Mountain Dew HELLO! Welcome to Hacked By Chinese! July 19, 2001, 359,000 computers July 28, 2001, CodeRed went to sleep Woke up in August Even affected IP address of white house
Website Defacement Computer running slow Same machine infected numerous times Can not share files with infected computer Attackers can control victims computer
Antivirus program informs you Computer runs slowly Take a long time to turn on Error messages Strange things come on screen Programs uninstall by themselves
Do not open s/attachments Update security regularly Turn on firewalls Purchase antivirus software if necessary Do not use file sharing software
6 th worst worm in history 359,000 computer infected Worm can move without humans Can be detected Can be prevented
horse.html horse.html asp asp vs-worm/ vs-worm/ d= d=