Zach Thompson Mike May Ben Abernathy

Slides:



Advertisements
Similar presentations
Brief Introduction to Java and C# Dahai Guo Oracle Certified Java Programmer (SCJP) Associate Professor and Program Director Software Engineering Program.
Advertisements

Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
CVI / PRS Computer Virus Information / Propagation Research System Eric Miller and Brian Schill CS 522.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Backing Up a Database You make a backup copy of a database to protect your database against loss or damage. You can make the backup copy using one of several.
Presentation by Neil Schmidt. Before You Start, Get Organized! On your old computer: Create “Music”, “Pictures” & “Videos” folders (if they don’t already.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Space Science and Engineering Center University of Wisconsin-Madison Virtual Machines: A method for distributing DB processing software Liam Gumley.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Microsoft ® Official Course Module 13 Troubleshooting and Recovering Windows 8.
SOFTWARE.
M1G Introduction to Programming 2 4. Enhancing a class:Room.
Computer Lab Teachers are welcome to change or add slides within this presentation to suit the needs of their students or better accommodate the structure.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
1 8/29/05CS360 Windows Programming Professor Shereen Khoja.
LINUX System : Lecture 3 Vmware, Cygwin, LINUX installation Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang University.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Windows Enterprise Admin Course Section Introduction Chris Redford
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Small Business Security Keith Slagle April 24, 2007.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Why should I run Disk Cleanup Remove temporary Internet files Remove temporary Internet files Delete downloaded program files, such as Microsoft ActiveX.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Computer virus Done: Aaesha Mohammed ID: H
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
windows
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Chapter 6 Protecting Your Files
Using Virtualization in the Classroom
Managing Windows Security
Three steps to prevent Malware infection
Deep Serucity 7.0 Training
Done By: Ashlee Lizarraga Ricky Usher Jacinto Roches Eli Gomez
Chapter 8 Operating Systems and Utility Programs.
© 2015 Air Force Association
Computer Viruses Latifah alabdulkarim
Introduction to Web programming
Why Computer Security Need???
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Outlook Recovery Freeware is the professional tool to fix Outlook Error and PST corruption.
Chapter 2. Malware Analysis in VMs
Chap 10 Malicious Software.
Chapter 6 System and Application Software
King Saud University- College OF Applied Studies
Bethesda Cybersecurity Club
Chap 10 Malicious Software.
King Saud University- College OF Applied Studies
16. Account Monitoring and Control
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
IBM Tivoli Storage Manager
Presentation transcript:

Zach Thompson Mike May Ben Abernathy CVI/PRS Zach Thompson Mike May Ben Abernathy

Goal Computer Virus Infection/Propagation Research System Implement a system for safe and effectice studying of computer viruses in their natural environment. Develop software to aid in the study. Start the collection of computer viruses.

Topics to be discussed: Wiper Virus Database Program Viruses Outline Topics to be discussed: Wiper Virus Database Program Viruses

Wiper wiper.uccs.edu Running Red Hat 8.0 VMWare Workstation Windows 98 SE No networking options were enabled (for the virtual machine) while conducting tests, but can be reactivated 2GB disk image for the virtual machine

Wiper The restoration of the machine is fairly simple. Just restore the image using a backup. The virus is free to roam inside the virtual machine, but it cannot get out. Allows us to study the characteristics of viruses form a safe distance.

Virus Database Program Allows the user to create incident reports. Lists and saves multiple reports and tracks record of viruses involved. Gives the person studying viruses an easy way to share reports with others.

Virus Database Program Lists viruses Lists official virus name as well as file name. Gives the date of record. Allows the user to describe events. Allows for the removing and deleting of recrods. Written in Java, portable.

Curent Viruses Focused on the collection of compiled and disassembled i-worm class viruses. i-worm viruses are worms that use the internet as their means of infection and propagation. This class holds many famous viruses such as LoveLetter and Melissa. Total of 25 viruses archived so far.

i-worm Characteristics Most are written in Visual Basic and only attack Windows systems with Microsoft Outlook installed. Some are implemented in Win32 ASM or C/C++. Some of them provide simple polymorphic functions as well as tools to help in their propagation such as a simple SMTP engine.

Future Studies A method of correctly dissassembling the viruses needs to be developed. Need to increase the size of the virus collection and branch out to other classes of viruses.