Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
For any query mail to or BITS Pilani Lecture # 1.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
By John Keirs. Distinction between an operating system and an program with examples of eachDistinction between an operating system and an program with.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Chapter Objectives In this chapter, you will learn:
Presentation on Computer Virus
War between Good and Evil.
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses.
Chap 10 Malicious Software.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh installation of or upgrading from a previous piece of software, checking your hardware and software for compatibility is a must. The main factors to consider are: Memory requirements – How much RAM do I need? Storage requirements – Do my application programs generate large files? Operating System – Will an application run on an older OS?

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 2 Viruses A virus is a programming code that causes some undesirable and unexpected event to happen in a computer. Viruses can be quite harmful and erase data or close down a system.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 3 Viruses A virus is a programming code that causes some undesirable and unexpected event to happen in a computer. Viruses can be quite harmful and erase data or close down a system.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 4 File Viruses File viruses attach themselves to program files such as.exe or.com files. When the program is loaded, the virus is also loaded. A file viruses can also take the form of a complete program, or script, attached to something else, e.g. an .

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 5 Boot Sector Viruses These viruses infect executable code found in certain system areas on a disk. They attach to the boot sector on disks or the master boot record on hard disks. To infiltrate the boot sector, the virus is read while the system is running and then activated the next time the operating system is loaded.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 6 Macro Viruses Macro viruses infect applications and typically cause a sequence of actions within the application e.g. inserting unwanted words or phrases in a document.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 7 Virus Code Actions - Replication A computer virus has the unique ability to replicate. Like a biological virus they can spread quickly and can be difficult to control. They can attach themselves to almost any type of file and spread as files are copied and sent between computer users. A virus can take a long time to replicate itself before activation. This gives it time to be spread over many computers before being discovered.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 8 Virus Code Actions - Camouflage It is possible for a virus to avoid detection by taking on the characteristics that detection software is programmed to look for and ignore.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 9 Virus Code Actions - Watching A virus can lie in wait and ambush a computer when something routine is carried out e.g. opening a particular application. The damage routines will activate when certain conditions are met, e.g. on a certain date, or when the infected user performs a particular action may trigger the virus.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 10 Virus Code Actions - Delivery Infected disks brought in from the outside used to be the main source of viruses until provided the ideal delivery vehicle.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 11 WORMs A worm is a self-replicating virus that does not alter any files but takes up residence in the computer's active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks. Worms tend to use the parts of the computer's operating system that is not seen by the user until it is too late.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 12 Trojan Horse A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage. Trojan horses may even claim to be anti-virus in order to get the user to install it.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 13 Anti-virus Techniques Anti-virus software can screen attachments, Web downloads, and checks all of your files from time- to time removing any viruses that are found. Techniques used by anti-virus software to detect a virus include:

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 14 Anti-virus Techniques - Checksum This technique involves adding together the numeric values contained in the file. A calculation (checksum) is carried out on this total and it is placed as a 16-bit number at the end of the block. The receiver of the data performs the same calculation on the data and compares its checksum with the transmitted checksum. If they match, data transfer successful. If not, there is a possibility that the file is infected.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 15 Anti-virus Techniques – Virus Signatures A virus signature is a unique pattern of bits within a virus. It can be used to detect and identify specific viruses. Once known, the anti-virus software uses the virus signature to scan for the presence of malicious code and removes it.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 16 Anti-virus Techniques – Heuristic Detection Heuristic techniques work on the probabilities of a file being infected i.e. it will give a percentage likelihood of a file being infected by weighing up the file behaviour. For example, if a file attempts to access your address book then that might be suspicious. If the same file includes code that checks a date, then the suspicion rises. There will come a point when a warning is issued on the possibility of a virus.

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 17 Anti-virus Techniques – Memory Resident Monitoring Some anti-virus software is memory resident and is loaded on start up. It actively monitors the system for viruses whilst the computer is switched on and checks programs for infection every time they run. The price to be paid with memory resident programs is that they can cause delays in program loading and execution whilst the checks are being carried out.