Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.

Slides:



Advertisements
Similar presentations
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Computer Networks I Antivirus explained By: Daniel Josefsson Daniel Josefsson Kristoffer Wallin Kristoffer Wallin om>om>
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
What is it, how does it work, and why is it important?
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Hacker Zombie Computer Reflectors Target.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Everything you wanted to know about Computer Viruses.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Viruses can get onto your computer via:  Junk mail  Downloads  Pop-ups.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
COMPUTER VIRUSES. Definition Of a Computer Virus Computer Viruses Origin Types of Computer Viruses How Does Viruses Attack Computer. How Does a Viruses.
bitdefender virus protection
MALWARE.
Lecture 8. Cyber Security, Ethics and Trust
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Chap 10 Malicious Software.
مرکز فناوری اطلاعات دانشگاه رازی
Malicious Software Network security Master:Mr jangjou
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Computer Viruses

History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus

Historical Viruses Brain VirDem Lehigh Chameleon – Polymorphic DAME VCL

More History CDs make removal difficult Macro viruses Remote control becomes prevalent Spread via Downloading and file sharing

Virus Types and Descriptors Resident Direct Action Overwrite Boot Sector Macro Directory Encrypted

More Viruses Polymorphic Multipartite File Infector Companion FAT XSSV Sentinel

Even More Viruses Stealth Armored Sparse Infector Fast and Slow Infector Worms Trojan Horses Logic Bombs Hoaxes

Anti-Virus Searches for known viruses Requirements –Bit-level work –Good error handling –Fast, dynamic life cycle Also identifies suspicious behavior Scans incoming and outgoing behavior

Prevention and Aid Techniques –Deletion –Quarantine –Repair Polymorphic viruses make detection via dictionary difficult Suspicious behavior’s advantages Sandboxes and Blueprints

Other Methods Education filtering User knowledge

Spyware Definition Symptoms Methods of infection Results –Phone home –Remote access Zombie attacks

Spyware Rootkit –Sony Prevention –Anti-spyware programs Not always the most effective –Safe internet practices

Survey We surveyed 40 people on the Pace University Campus We asked questions related to demographic information and regarding virus preparedness

Male vs. Female

Preparedness

Conclusion Viruses and Spyware pose an increasing threat Prevention methods do not include software alone Many methods which are common knowledge to those familiar with computers are not common practice