 Fundamental terms  Diseases vs. Diseases transmitted by a network  Branching Process  The SIR epidemic model  The SIS epidemic Model  5 Worst Computer.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Presented by Jamie Leben IT-Works Computer Services
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Nasca Internet Networking and Security viruses.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses, Worms & Trojan Horses
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
Online Social Networks and Media Epidemics and Influence.
Viruses.
Unit 2 - Hardware Computer Security.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Lecture 16 Epidemics University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CS 791 Special Topics: Network Architectures and.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Chapter 40 Internet Security.
Computer Virus’s.
Instructor Materials Chapter 7 Network Security
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
njh
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
Computer Applications Unit B
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Virus S a F E T y.
Computer Security.
Presentation transcript:

 Fundamental terms  Diseases vs. Diseases transmitted by a network  Branching Process  The SIR epidemic model  The SIS epidemic Model  5 Worst Computer Viruses of All Time

Network Internet (compared to network) Epidemic = spread of infectious disease Neighbors Worm (will be explained) Trojan horse (will be explained)

Ebola How the virus spread: Ebola death toll:

Types of Diseases o Virus o Worm o Trojan Horse Melissa (David L. Smith, 1999)- a worm( worm)

Virus It is a program which can destroy or cause damage to data stored on a computer system Virus program must be executed in order to infect a computer system. Viruses can attach themselves to other programs in order to ensure that this happens.

Computer virus symptoms: Hardware Troubles – It’s Alive! computer, printer, etc. started acting up on its own, without you requesting any action by means of keyboard or mouse No Response – Is Anyone Home? Slow Performance Slow Startup Crashing Missing files Extra Files – Who Sat In My Chair? You may visually notice extra pop ups and extra programs that seem to be running on your computer.

Worm Worms operate differently to viruses Worms can spread themselves to other computers without needing to be transferred as part of a host program. The first time a user may notice the presence of a worm is when the computers memory UNEXPECTEDLY fills up Mimail.I and Mimail.F

Trojan Horse Short history lesson It describes a list of computer threats (malware) that appear to perform good functions, but actually performs malicious functions that allow unauthorized access to the hosting machine Can open a gateway for hackers

is a model of disease-spreading It works as follows: (for a ‘sick’ node with k neighbors) First wave- this k nodes are the first wave of the epidemic Second wave - k · k = k^2 nodes Subsequent waves

can be applied to any network structure (unlike branching process ) p - the probability of contagion tI - the length of the infection How it works: Initially, some nodes are in the I state and all others are in the S state. Each node v that enters the I state remains infectious for tI steps. During each of these tI steps, v has a probability p of passing the disease to each of its susceptible neighbors. After tI steps, node v is no longer infectious or susceptible to further bouts of the disease; we describe it as removed (R).

This describes the full model we refer to it as the SIR model, after the three disease states that nodes experience. after being infected, a node is removed either because it has acquired lifetime immunity or because the disease has killed it

In an SIS epidemic, nodes can be infected, recover, and then be infected again. The mechanics of the model follow the SIR process very closely. (Aside from the lack of an R state) How it works: Initially, some nodes are in the I state and all others are in the S state Each node v that enters the I state remains infectious for tI steps During each of these tI steps, v has a probability p of passing the disease to each of its susceptible neighbors. After tI steps, node v is no longer infectious, and it returns to the S state.

In fact it is possible to represent some of the basic variants of the SIS model as special cases of the SIR model An SIS epidemic can be represented in the SIR model by creating a separate copy of the contact network for each time step: a node at time t can infect its contact neighbors at time t + 1. To represent the SIS epidemic using the SIR model, we use a “‘time-expanded” contact network

SIS epidemic: SIS as an SIR epidemic:

MYDOOM(2004)  managed to shut down Google for almost a day Damages: $38,000,000,000 PC infected: 2,000,000 What was it- a worm How it worked How it spread

SOBIG.F(2003) Damages: $37,100,000,000 PC infected: 2,000,000 What was it How it worked How it spread

ILOVEYOU(2000)- Not very loving Damages: $15,000,000,000 PC infected: 500,000 What was it How it worked How it spread

Code Red(2001) Damages: $2,600,000,000 PC infected: 1,000,000 What was it How it worked How it spread

SLAMMER(2003) Damages: $1,200,000,000 PC infected: 200,000 What was it How it worked How it spread

The viruses spread in :

How it really works: