Computer Viruses. Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus.

Slides:



Advertisements
Similar presentations
Presented by: Melissa Dark CERIAS, Purdue University.
Advertisements

MACROS CS1100 Computer Science and its Applications CS11001.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Unit 18 Data Security 1.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
©2003 CNET Networks, Inc. All rights reserved. Virus Basics Created by: Robert L. Bogue, MCSE: Security, etc. Crowe Chizek.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
D. Beecroft Fremont High School VIRUSES.
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
 Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus to spread  Virus show us.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Definition ÞVirus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Presented by : vijitha.k
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer Viruses. Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Venugopal reddy 07R91A05b7.  Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Viruses Author: Alyse Allen.
Intro to Malware Attacks
SEMINAR ON PC SECURITY FROM VIRUSES
Viruses and Other Malicious Content
Chapter 12: Social Implications of IT
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
Computer Viruses.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Computer Viruses

Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus to spread zVirus show us loopholes in software zMost virus are targeted at the MS Windows OS

Definition ÞVirus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host

Overview zBackground zSymptoms zClassifying Viruses zExamples zProtection/Prevention zConclusion

Background zThere are estimated 30,000 computer viruses in existence zOver 300 new ones are created each month zFirst virus was created to show loopholes in software

Virus Languages zANSI COBOL zC/C++ zPascal zVBA zUnix Shell Scripts zJavaScript zBasically any language that works on the system that is the target

Symptoms of Virus Attack z Computer runs slower then usual z Computer no longer boots up z Screen sometimes flicker z PC speaker beeps periodically z System crashes for no reason z Files/directories sometimes disappear z Denial of Service (DoS)

Virus through the Internet zToday almost 87% of all viruses are spread through the internet (source: ZDNet) zTransmission time to a new host is relatively low, on the order of hours to days z“Latent virus”

Classifying Virus - General zVirus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:

Classifying Virus - Categories zStealth zPolymorphic zCompanion zArmored

Classifying Virus - Types zTrojan Horse zWorm zMacro

Trojan Horse zCovert zLeaks information zUsually does not reproduce

Trojan Horse zBack Orifice Discovery Date: 10/15/1998 Origin:Pro-hacker Website Length:124,928 Type: Trojan SubType:Remote Access Risk Assessment: Low Category: Stealth

Trojan Horse zAbout Back Orifice yrequires Windows to work ydistributed by “Cult of the Dead Cow” ysimilar to PC Anywhere, Carbon Copy software yallows remote access and control of other computers yinstall a reference in the registry yonce infected, runs in the background yby default uses UDP port TCP port yIn Australia 72% of 92 ISP surveyed were infected with Back Orifice

Trojan Horse z Features of Back Orifice ypings and query servers yreboot or lock up the system ylist cached and screen saver password ydisplay system information ylogs keystrokes yedit registry yserver control yreceive and send files ydisplay a message box

Worms zSpread over network connection zWorms replicate zFirst worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.

Worms zBubbleboy Discovery Date:11/8/1999 Origin:Argentina (?) Length:4992 Type:Worm/Macro SubType:VbScript Risk Assessment: Low Category: Stealth/Companion

Worms zBubbleboy yrequires WSL (windows scripting language), Outlook or Outlook Express, and IE5 yDoes not work in Windows NT yEffects Spanish and English version of Windows y2 variants have been identified yIs a “latent virus” on a Unix or Linux system yMay cause DoS

Worms zHow Bubbleboy works yBubbleboy is embedded within an message of HTML format. ya VbScript while the user views a HTML page ya file named “Update.hta” is placed in the start up directory yupon reboot Bubbleboy executes

Worms zHow Bubbleboy works ychanges the registered owner/organization xHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\RegisteredOwner = “Bubble Boy” xHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\RegisteredOrganization = “Vandalay Industry” yusing the Outlook MAPI address book it sends itself to each entry ymarks itself in the registry xHKEY_LOCAL_MACHINE\Software\Outlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”

Macro zSpecific to certain applications zComprise a high percentage of the viruses zUsually made in WordBasic and Visual Basic for Applications (VBA) zMicrosoft shipped “Concept”, the first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995

Macro zMelissa Discovery Date:3/26/1999 Origin:Newsgroup Posting Length:varies depending on variant Type:Macro/Worm Subtype:Macro Risk Assessment:High Category:Companion

Macro zMelissa yrequires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000 y105 lines of code (original variant) yreceived either as an infected template or attachment ylowers computer defenses to future macro virus attacks ymay cause DoS yinfects template files with it’s own macro code y80% of of the 150 Fortune 1000 companies were affected

Macro zHow Melissa works ythe virus is activated through a MS word document ydocument displays reference to pornographic websites while macro runs y1st lowers the macro protection security setting for future attacks ychecks to see is it has run in current session before xHKEY_LOCAL_MACHINE\Software\Microsoft\Office\Melissa = “by Kwyjibo” ypropagates itself using the Outlook MAPI address book ( s sent to the first 50 addresses)

Macro zHow Melissa works yinfects the Normal.dot template file with it’s own code yLastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document x “Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”

Protection/Prevention zKnowledge zProper configurations zRun only necessary programs zAnti-virus software

Conclusion zYou know know more about virus and how: yviruses work through your system yto make a better virus zHave seen how viruses show us a loophole in popular software zMost viruses show that they can cause great damage due to loopholes in programming

Questions? Copies of the latest lovebug virus code are available…in print