Multipartite Viruses Wendy Bowman ETEC 562 General Information Payload Activation Hidden Transmission Removal.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Computer Viruses Computer viruses are a type of Malware that can infect other computer operating systems. They can do harmful things to the host it infected.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
For any query mail to or BITS Pilani Lecture # 1.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
SEMINAR ON PC SECURITY FROM VIRUSES
Computing Issues that Affect Us All
computer virus infection & symptoms
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Technology Day 21
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Presentation transcript:

Multipartite Viruses Wendy Bowman ETEC 562

General Information Payload Activation Hidden Transmission Removal

General Information A computer virus is defined as a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. htmlhttp:// html

Viral Facts Viruses can replicate. All computer viruses are manmade. Can infect other programs. Viruses do not infect plain text files. Viruses take up memory after replicating. Viruses can not exist without a host.

Types of Viruses Trojans and Stealth Boot Sector File Macros Worms Network and Multipartite viruses

Network Viruses Infect networks by making extensive use of network protocols. Network viruses are able to transfer code to a remote server or workstation. Reference

Network Virus Facts Separated into several segments that each run on a part of the network. Use automated functions such as to replicate. Use programming built into the macros to spread themselves. Called an octopus when it has one main segment that coordinates with what the other segments are doing. Can steal password info and send it to a malicious source. page=0

Multipartite Viruses A multipartite virus is defined as a virus that infects your boot sector as well as files.boot sector

Boot Sector The area of the hard drive that is accessed when the computer is first turned on. Back to Show

Multipartite Facts Can infect floppy disks. Hardest virus to clean. Are memory resident viruses. Harder to spread across networks but isn’t impossible. To spread across a network, the server must be infected and an infected program must be accessed. mputer-virus/alt-faq/part1/

Viral Payload Payload is defined as the action the virus performs on the computer. cillin/vinfo/virusencyclo/glossary.asp#payload

Possible Payloads Corrupts the hard disk Create files Delete files Modify files Formats the hard drive Hangs the system during rebooting Modifies available memory Modify available resources cillin/vinfo/virusencyclo/

Activation or Trigger Refers to the condition or date in which the payload of the virus will occur. Computer can be infected for months or years before the payload occurs. Holidays are the most popular trigger date. s.com/pc- cillin/vinfo/virusenc yclo/glossary.asp#tr igger_condition_or_ datehttp:// s.com/pc- cillin/vinfo/virusenc yclo/glossary.asp#tr igger_condition_or_ date

Hidden Dangers Decrease the size of memory in BIOS, cut the last MCB (memory control block), and replicate in the free space left by the MCB Disguise the virus as part of a downloadable shareware package Interrupting the DOS language just enough to “hook” a viral code onto existing language (hooking) until a floppy disk can be infected. Hooking on to the debugger.

From here to there… Floppy disks CD-ROMs Shareware New software Network server attachments Hackers Downloading material from the Internet us.ppt

Disposal Run anti-viral software Quarantine the virus (if possible) Replace the MBR (master boot record) Reboot computer from a clean disk then run anti-viral software Reformat the hard drive through DOS Costliest method, purchase a new memory chip

General Information Payload Activation Hidden Transmission Removal Click HereClick Here!

Anthrax Writes its viral code to the last sector of the hard drive while overwriting data there. Memory resident DOS platform Infects.COM,.EXE, MBR, and floppy boot sectors Multipartite Uses 1024 bytes (files) and 512 bytes (MBR)

Clisti 1025 and Clisti 1025 (b) No aliases Memory resident Uses encryption Wild ( Can be transmitted through networks Infects.COM, floppy boot sector, hard disk boot sector Mainly, transmitted through s

One Half Boot Infects.COM,.EXE, MBR Memory resident Slowly encrypts the hard drive Uses 3155 bytes (files) and 512 bytes (MBR) Multipartite, stealthing, and polymorphic Transmitted through s All encrypted data is lost when virus is removed

Is your computer a ticking time bomb?