VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Cybersecurity Test Review Introduction to Digital Technology.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber security. Malicious Code Social Engineering Detect and prevent.
bitdefender virus protection
Managing Windows Security
What they are and how to protect against them
Three Things About Malware
Computer Virus’s.
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
COMPUTER VIRUSES Computer Technology.
Computer Security Std XI– Chapter 8.
Cyber Security By: Pratik Gandhi.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Security Elaine Munn Introduction to Computer Security.
Computer Technology Notes 5
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
McAfee.com/activate - Redeem McAfee Product Key to Activate McAfee
Computer Viruses.
Risk of the Internet At Home
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
Norton Internet Security is supposed to protect your computer while you are using the internet. That is the main purpose of Norton Internet security, but.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Week 7 - Wednesday CS363.
An overview over Botnets
Presentation transcript:

VIRUS HOAX + BOTS

Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad

Topics To Be Covered Virus Definition Kinds of Viruses Virus Hoax Popular Virus Hoaxes Protection Against Virus Hoax Virus Bots How BOTS Work ? Protection Against BOTS

Virus Definition In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.  

Kinds of Viruses Virus Hoax Malware Trojan Spyware Polymorphic Macro Viruses Boot Sector Viruses Cavity Viruses

Virus Hoax A virus hoax is a false warning about a computer virus. Typically, the warning arrives in an e-mail note or is distributed through a note in a company's internal network.

History of Virus Hoax The first Internet virus hoax appeared in 1988. Emails were sent out with the subject line stating that a Really Nasty Virus was on its way. In 1994, the Good Times Virus Hoax managed to scare quite a bit of people. The worst thing is that this same hoax is still floating around today, often under the same name.

Popular Virus Hoaxes Intel special offer hoax Internet flower hoax Happy new year hoax Windows 98 warning hoax ICE virus mobile phone hoax

How Virus Hoax Works? Virus Hoax travel through e-mails. These e-mails contain information e.g. false story circulated that Blue Mountain greeting cards contained a virus, and many people ceased to do business with this company based on a hoax.

Protection Against Virus Hoax Having knowledge about file origins Buy Antivirus programs that scan e-mails Scan e-mail attachments Report as spam unrecognized sender of virus notification e-mails

Protection Against Virus Hoax Don’t automatically assume that any email you receive is accurate. Finally, knowledge is the key to stopping hoaxes and myths. Stay information. Don’t believe everything you read or hear until you check it out with another source. Be a shepherd, not a sheep

Virus Bots "Bot" is derived from the word "robot" and is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being.

Virus Bots Bots are scripts that run and accomplish something. That something can be as benign as crawling websites and indexing information to something awful like an email harvester that will collect addresses to spam. 

History of Bots Eggdrop was one of the first Bot developed in 1993. Shortly after more malicious IRC bots emerged to attack other IRC users/servers

How BOTS Work ? A malicious bot is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." With a botnet, attackers can launch broad-based, "remote-control," flood-type attacks against their target(s).

Bots The distinction of Bots is not cleared. Bots can be both good and bad. Bots that were created for good purposes turn into surveillance bots. 

Protection Against BOTS Ensuring that your OS is up to date Install most recent patches and fixes provided by OS vendor Have an Antivirus program Frequently download and install latest antivirus updates Make sure that your antivirus program can scan e-mails and their attachments Buy a powerful Firewall program