 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer security By Isabelle Cooper.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Chapter Objectives In this chapter, you will learn:
Lecture 8. Cyber Security, Ethics and Trust
COMPUTER VIRUSES Computer Technology.
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified the spread of malware  Most personal computer are being or have been infected by some malware  Most people think they are safe under the protection of anti-virus software  Malware, short for malicious software or malicious-logic program, consists of programs designed to disrupt computer operation, gather sensitive information, gain unauthorized access to, or even control computer systems remotely. › Virus  Disruption › Trojan  Gather information, gain unauthorized access › Rootkit  Hide other malware so that they are hard to detect even using anti-virus software. 2

 Computer virus: A program that can replicate itself, conceal itself and deliver the payload. › The payload: destructive event or prank  Some virus has the functionality of mutation. 3

 How it Spreads 4

 Execution phases › Infection  Replication  Concealment  Setting up Trigger › Delivery  Deliver the actual activity which may harm the infected computer or just display a prank 5

 Replication › Hide in one legal file  Macro(a way to create a shortcut for a task)  In macro language of document file: for example, word  Executable file  Change the instructions of an legal executable file  Master boot record  Load itself whenever the computer starts › Once the infected file is executed or opened, the virus copy itself and attach the copies to other legal files in the computer. 6

 Replication 7

 Concealment › Hide in fake code sections › Polymorphic virus: Can mutate by changing its own code. 8

 Setting up trigger › Purpose of virus  Display a prank  Disrupt your hard disk  Cause irregular screen behavior  Disable certain functionalities  And more….  May do nothing but copying themselves and kept spreading 9

 Setting up trigger › According to the purpose, the virus will be configured to activate under certain conditions.  Logic Bomb: Activate when virus detects certain condition  Example: If user is logging on, then display a message saying that the users are infected.(prank virus)  Time Bomb: Activate when it is certain time and date.  Example: If it is year 2012, then display a message saying that the doom day is coming. › A time bomb is also a logic bomb 10

 Execution phases › Infection  Replication  Concealment  Setting up Trigger › Delivery  Deliver the actual activity (in the payload) which may harm the infected computer or just display a prank. 11

 Worm › Resides in active memory and replicates itself over the network to infect machines  Trojan horses › disguise themselves as legal application, however providing unauthorized access or sensitive information to malicious remote users  Rootkit › is a program that easily can hide and allow someone to take full control of your computer from remote location, often for nefarious purposes. 12

 Comparisons 13 MalwareSoftware levelReplicationConceal existence Conceal behavior Deliver payload Infect local files Infect et network VirusApplicationYes NoYes No TrojanApplicationNoYes No WormsApplicationYesYes/NoNoYesNoYes RootkitOperating System NoYes No

 Tips › Install latest updates of your operating systems  Why updates are important. › Install a reputable anti-virus program › Update your anti-virus definitions frequently.  How does anti-virus applications work › Install personal firewalls program. › Be careful while visiting a web page that you are not familiar with, reading an from unknown address or inserting usb flash drive into your computer. 14

 Symptoms of malware attacks 15  Computer can’t boot up properly  Screen sometimes freezes  System frequently crashes  Abnormal hard disk activities  Computer runs slower than usual

 Solution 16  Run a fun disk scan using your anti-virus applications  If nothing was found  Look up the running processes  Ctrl-alt-delete open task manager  Regular process should have a regular name. (afege10x98.exe is obviously a suspicious process)  Look up the registry. (Don’t try if you are not familiar with it)

 Smalltalk: › Why anti-virus sometimes doesn’t work  Anti-virus application provides:  Specialists who are responsible for discovering new malware  For found malware, give it a signature and identify the characteristics of the code it will inject into the infected files.  These signature- characteristics pairs will be stored in the definitions of the anti-virus application.  Users download the definitions to their local machines and go over the files to see if any of them contains the characteristics  Problem: It can only detect known malware, but most of the spreading malware kept unknown! 17

 Protecting your computer requires 18

 References -Worm.Win32.Magistr.a ning-polymorphous-infected-files/en/