Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University 765.496.6762.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Presented by: Melissa Dark CERIAS, Purdue University.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Unit 18 Data Security 1.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses and Threats Section 1.03: Identify best practices for computer security and privacy Essential Question: What are the threats to your computer?
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
VIRUSES and DESTRUCTIVE PROGRAMS
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
War between Good and Evil.
COMPUTER VIRUSES Computer Technology.
Viruses and Other Malicious Content
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University

Software Security: (Viruses, Trojans, Unwanted Access) Only install necessary and trusted software. Beware of *free* games, screen savers, and graphics. Keep a hard copy of the copyright release for all “free” products! Run and UPDATE anti-virus software!!

1988: Less than 10 known viruses 1990: New virus found every day 1993: new viruses per week 1999: 45,000 viruses and variants Source: McAfee

Pikachu Worm: A K-12 Nightmare

This dialog box appears after the PIKACHUPOKEMON.EXE file has been activated. Worm: Accesses Outlook Address Book Embeds code to delete Windows and Windows Subfolders upon Restart. +: Does ask for permission to delete files with a “Y” command.

Examples of Nasty Stuff: Trojan Horse Viruses Worms Logic Bomb Trapdoors

Viruses: Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.....what if the Greek soldiers in the Trojan Horse had the plague??

Worms: Worms: reproducing programs that run independently and travel across network connections. Reproduction Differences: * A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread. * A worm can run completely independently and spread of its own will through network connections.

Trojan Horse: Trojan Horse: a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

Logic Bomb: Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. –Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date.

Trapdoor: Trapdoors: allows access to a system by skipping the usual login routine. Mattel Example...

Virus Information Activity (for students or teachers) Directions: Choose one of the keywords listed on the next slide. Go to the McAfee virus information library ( and search for information dealing with your selection. Skim through the choices and pick the best one to explore! Explain what the virus is, what it will do, and steps to fix it.

Virus Awareness Activity: Debriefing Pok Snoopy Love Backdoor Bud Frogs Anna Bob Pretty Cobra Sorry Funny Perrin Nim Code Red