Viruses and Malicious Code

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 18 Data Security 1.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Computer Technology Notes 5
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

Viruses and Malicious Code Chapter 6 Viruses and Malicious Code

Introduction Viruses are primarily spread over the internet through a variety of mechanisms including: e-mail, attachments, downloadable files, web pages, newsgroups, peer-to-peer file transfers, instant messaging, digital pictures, and several other techniques and tactics

Federal Survey 85% commercial users experienced some type of security breach in the prior year. An additional 35% of the responders claimed over $375,000,000 million dollars in losses to hacker and viruses. An average virus outbreak took approximately 20 person-days or less to recover and cost the company between $10,000 (median) and $120,000 (average) in estimated direct costs.

Experts Most people who claim to speak with authority about computer viruses have little or no genuine expertise. Some virus experts describe it as “False Authority Syndrome” – the person feels competent to discuss viruses because of his job title, or because of his expertise in another computer field, or simply because he knows how to use a computer.

Introduction Legend: experts around the world believe the ILoveYou virus in May 2000 caused $2.7 billion, $4.7 billion, $6.7 billion, or $8.7 billion in damages. Fallout: the antivirus industry can cite yet another plausible-sounding estimate.

Viruses and Malicious Code Viruses in the wild are those that are spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users. Two or more virus experts must report problems with the virus to be recognized as a virus in the wild. There are currently 303 viruses currently in the wild.

Viruses and Malicious Code The virus is executed by some type of payload trigger which causes the virus or malicious code to deliver its contents or execute its commands. The trigger can be something the user does: opening an e-mail attachment or downloading a file; triggered by a date or condition on a computer; it can self-execute based on code written into the virus program.

Virus Construction Tools The development of virus construction tools by virus writers allows a larger number of less sophisticated computer users to write and create viruses. A virus construction set is a utility program intended for creating new computer viruses. Virus construction sets allow generating of source code of the viruses, object modules and/or infected files themselves.

Viruses and Malicious Code Another tool developed by virus writers known as a mutation engine allows viruses to change their code each time they infect a new machine. Known as a polymorphic virus or malicious code, these programs do not have any constant section of code.

Viruses and Malicious Code One area of interest is termed the TSR (terminate and stay resident) capability of the virus. This essentially means that the virus is able to leave itself in system memory, intercept some events, and in the process run infecting routines on files and sectors of the disk.

Viruses and Malicious Code Another feature of the operating algorithm of a virus is the use of stealth algorithms. Stealth allows the virus to remain hidden on a system and cover its tracks during and after the infection process. Another virus is the use of self encryption and polymorphism. Polymorphic viruses are exceedingly difficult to detect and they have no permanent signatures, none of their code fragments remain unchanged.

History and Development Several things combined to aid the spread of viruses: Rapid growth of the internet Rapid growth and availability of personal computers Availability of the polymorphic engine Availability of virus creation tools that first hit in July of 1992

History and Development The main problem with trying to give the exact definition of a virus is that virtually all the unique features of a virus – such as stealth behavior, potential danger, and potential for spread – may be found in other nonvirus programs. A second difficulty is that viruses are operating-system and software-system specific.

Viruses Other types of malicious code include worms, Trojan horses, adware or spyware, logic bombs, denial of service attacks, and blended threats. Viruses operate in four primary environments: File viruses Boot viruses Macro viruses Network viruses

Viruses File viruses use a particular operating system to propagate, and they can infect virtually any type of executable file. Boot viruses attack either the boot sector of the system, the master boot record, or change the system pointer to an active boot sector

Viruses Macro viruses are most commonly associated with common business software and infect documents, spreadsheets, databases, and presentation files. Macro viruses transfer themselves from one infected file to another within a given system and cross over to other systems. Network viruses attack the networks themselves or e-mail systems of the networks in order to spread themselves.

Worms The worm is a stand-alone piece of code; although it may need to use another program to spread, it does not change that program in any way. They penetrate the computer’s memory from a computer network, calculate network addresses of other computers and send their own copies to these addresses.

Worms A work is self-propagating malicious code program that does not necessarily require user intervention to spread. A worm self-propagates and infects systems in a very short period of time. The Code Red worm infected more than 250,000 systems in just nine hours on July 19, 2001.

Trojan Horses Is commonly an unauthorized program contained within a legitimate program that performs functions unknown (and probably unwanted) by the user. Just like the Trojan horse of history, there is a hidden purpose and program hidden within the desirable file.

Trojan Horses Trojan horses can be viruses or remote control programs that provide complete access to a victim’s computer If a certain type of Trojan horse is installed and initialized on a system, that computer is now completely open to anyone who knows to connect to it using the Trojan horse as a server. Trojans use auto-starting methods, so even when you shut down your computer they’re able to restart and give the attacker access.

Trojan Horses Several types of Trojan horses: Remote Access Trojans The most common Password-Sending Trojans Steal all of the cached passwords Keyloggers Log the keystrokes of the victim Destructive Destroy and delete files

Trojan Horses Denial of Service Attack Trojans Proxy/Wingate Trojans Start attacking the secondary victim simultaneously, this will generate a great deal of traffic and access to the internet will be shut down Proxy/Wingate Trojans Turn the victim’s computer into a proxy/wingate server available to the whole world or to the attacker only Software Detection Killers Kill ZoneAlarm, Norton Antivirus, and many other popular anti-virus/firewall programs

Adware and Spyware Programs that can be contained in e-mail attachments, downloaded as part of another software program, or downloaded from a Web site. Adware is a type of program that is a pain to the user that manifests itself in several ways, including changes to the browser, redirecting startup pages on the internet browser, replacing the search function within the browser, and generating pop-up ads

Adware and Spyware Spyware typically takes advantage of the fact that many software users do not read the end user license agreement They would see legal disclaimers and permissions to share information and install the spyware There is now spyware killer software available.

Denial of Service Attacks A denial of service attack uses multiple systems to attack one or more victim systems or Web sits with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Blended Threats Combine the characteristics of viruses, worms, Trojan horses, and malicious code with server and internet vulnerabilities to initiate, transmit, and spread an attack.

Extent of Viruses and Malicious Code Attacks The number of known viruses surpassed 70,000 in January 2002.