OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Types of Electronic Infection
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Unit 3 Section 6.4: Internet Security
Computer Viruses Author: Alyse Allen.
Chapter 40 Internet Security.
Three steps to prevent Malware infection
Three Things About Malware
Computer Virus’s.
Intro to Malware Attacks
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Computer Viruses Latifah alabdulkarim
COMPUTER VIRUSES Computer Technology.
SEMINAR ON PC SECURITY FROM VIRUSES
Computer Worms & Viruses
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
VIRUSES and DESTRUCTIVE PROGRAMS
Virus And Malware Causes And Troubleshoot By I FIX PC
Computer Viruses.
Computer Technology Day 21
Code-red worm Attack on Computers.
Internet Security Submitted to Professor Mort Anvari
Forensics Week 12.
UNIT 18 Data Security 1.
Viruses and Virus Protection
Viruses.
Brad Karp UCL Computer Science
Computer Viruses Standard A-4 (Safety Unit)
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention

VIRUSWORM Ranges in severity Attaches to file or program ( ) Different effects Damaging/annoying Spread by human action Only works on executable programs Can be written to do specific tasks Ranges in severity Can come from anywhere Virus sub-class Can travel W/O humans Can replicate by hundreds of thousands Takes up bandwidth Can be written to do specific tasks

Virus When program runs, virus runs Attaches to other programs Sent via Can use list to spread Needs program to be effective Worm Uses computer network Reproduces itself Exploit holes in operating systems Can shut down networks

Started July 13, 2001 Attacked Microsoft’s IIS web server Called Code Red after Mountain Dew HELLO! Welcome to Hacked By Chinese! July 19, 2001, 359,000 computers July 28, 2001, CodeRed went to sleep Woke up in August Even affected IP address of white house

Website Defacement Computer running slow Same machine infected numerous times Can not share files with infected computer Attackers can control victims computer

Antivirus program informs you Computer runs slowly Take a long time to turn on Error messages Strange things come on screen Programs uninstall by themselves

Do not open s/attachments Update security regularly Turn on firewalls Purchase antivirus software if necessary Do not use file sharing software

6 th worst worm in history 359,000 computer infected Worm can move without humans Can be detected Can be prevented

horse.html horse.html asp asp vs-worm/ vs-worm/ d= d=