Lecturer: Fadwa Tlaelan

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
STARTER 1 1. What stories do you think followed these headlines? A. Web phone scam The scheme to make money illegally using Web phones CANKAYA UNIVERSITY.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
Jeopardy Computer Technology Vocabulary 2 Template By Carl Lyman © September 2001.
VIRUSES and DESTRUCTIVE PROGRAMS
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Malicious Software.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Computer Viruses Author: Alyse Allen.
Lecture 8. Cyber Security, Ethics and Trust
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

Lecturer: Fadwa Tlaelan UNIT 18 Data Security 1 Lecturer: Fadwa Tlaelan

Introduction

Introduction There are a variety of different crimes that can be committed in computing such as: Spreading viruses: distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way. Hacking: gaining unauthorized access to a network system.

Introduction Salami shaving: manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are unaware of the crime because the amount taken from any individual is so small. Denial of service attack: swamping a server with large number of requests.

Introduction Trojan horse: a technique that involves adding concealed instructions to a computer program so that it will still work but it will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background. Trapdoors: a technique that involves leaving, within a completed program, an illicit program that allows unauthorized and unknown entry.

Introduction Mail bombing: swamping an email address with thousands of messages, slowing or even crashing the server. Piggybacking: using another person’s identification code or using that person’s files before he has logged off (disconnected from a network account) Defacing: changing the information shown on another person’s website.

Introduction Software piracy: unauthorized copying of a program for sale or distributing to other users. Phishing: tricking a user to revealing confidential information such as an access code or a credit card number. Hijacking: redirecting anyone trying to visit a certain site elsewhere.

Introduction A computer virus is a program that can reproduce itself and is written with the purpose of causing damage or causing the computer to behave in an unusual way. It infects other programs – attaches itself to other programs known as host programs and therefore reproduces itself.

Introduction It operates by replacing the first instruction in the host program with a JUMP command. This is a command that changes the normal instruction sequence in a program causing the virus instructions to be executed (processed by the processor) before the host program instructions. When the virus has been executed, the host program is executed in the normal way.

Introduction When it attaches to operating systems programs to integrate itself with the operating system ( the set of programs that control the basic functions of a computer and provide communication between the applications programs and the hardware), it is said to have patched the operating system.

Introduction Viruses normally attach themselves to programs that have a COM extension (e.g. command.com) that are known as command files or COM files. They also attach themselves to programs that have the EXE extension (e.g. explorer.exe) that are known as executable files or EXE files.

Introduction A virus is loaded into memory (copied from the storage media into memory) when a program that it has attached itself to is run or executed (processed by the processor). It then becomes memory resident i.e. it stays in the memory until the computer is switched off. When a virus is triggered by a predetermined event, it operates the payload (the part of the virus that causes the damage).

Introduction Viruses usually have four main parts: A misdirection routine that it enables it to hide itself. A reproduction routine that allows it to copy itself to other programs A trigger that causes the payload to be activated at a particular time or when a particular event takes place A payload that may be a harmless joke or may be very destructive

Introduction A program that has a payload but does not have a reproduction routine is known as a Trojan. Each virus is given a name and can be classified as a particular type of virus.

Introduction Virus types are: Logic bombs that destroy data when triggered. Boot sector viruses that stores themselves in the boot sector of a disk ( the part of a disk containing the programs used to start up the computer). File viruses that attach themselves to COM files. Macro viruses that are small macro programs that attach themselves to wordprocessor files and use the macro programming facilities provided in some wordprocessing programs.

Assignment Writing 10 on page 129. (Only Crime B on page 193). Specialist Reading, Question B.