Terms 8 Definitions and Questions. Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
What is it, how does it work, and why is it important?
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 a crime committed on a computer network, esp. the Internet.
Computer Viruses.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Viruses can get onto your computer via:  Junk mail  Downloads  Pop-ups.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
The History of Computers Computers have been around for not that long at all but the first one was made in ll.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
DMCA Compliance: Adapting Strategies to Hit a Moving Target Jeff Gimbel
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Chapter 40 Internet Security.
Big Picture Consider this How many online threats might you be faced with a day?
computer virus infection & symptoms
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Terms 8 Definitions and Questions

Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. codecomputercopymemorysystemcodecomputercopymemorysystem Viruses were first invented in the early 1980s, but it wasn’t until that they actually became dangerous ‘in the wild’

Worm A computer worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. computer program computer viruscomputer program computer virus They are often designed to exploit the file transmission capabilities found on many computers. transmission The main difference between a computer virus and a worm is that a virus can not propagate by itself whereas worms can. computer viruscomputer virus A worm uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself.

Trojan A Trojan is a network software application designed to remain hidden on an installed computer. Trojans sometimes, for example, access personal information stored locally on home or business computers, then send these data to a remote party via the Internet. Alternatively, trojans may serve merely as a "backdoor" application, opening network ports to allow other network applications access to that computer. ports The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Virus / Worm / Trojan Q/A Q: One of the most famous of these is called “I Love You”, also known as “Love Letter” and “the Love Bug”. It cost business an estimated $8 billion. Was it a virus, worm, or trojan? A: It was a virus that spread through s labeled “I Love You”.

Anti-Virus Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). Anti-virus software typically uses two different techniques to accomplish this: Examining (scanning) files to look for known viruses matching definitions in a virus dictionary Examining (scanning) files to look for known viruses matching definitions in a virus dictionary Identifying suspicious behavior from any computer program which might indicate infection. Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods. Such analysis may include data captures, port monitoring and other methods. Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.

Virus Definition File Anti-virus software needs virus definition files to work These files hold the digital “signatures” of all the known viruses Virus definitions are what tell your antivirus product about the viruses that are out at this point in time. For example, if you have definitions from last week, but a new virus came out this week, then your AV product would not be able to find that new virus with your "old" definitions.

Palladium a set of hardware and software features which Microsoft and Intel (and AMD) intend to jointly add to future versions of the Windows operating system, probably in the timeframe. Palladium’s goal is to make computers more secure by a combination of hardware and software that identifies and authenticates machines to one another (not applications, data, or individuals) and prevents connections or transmissions that the enabled policy rules don’t allow. Much of the furor is about Microsoft (or Intel or another big software or content company) Controlling what may come onto your computer, rejecting anything that doesn’t fit its definition of trustworthy. Controlling what may come onto your computer, rejecting anything that doesn’t fit its definition of trustworthy. Associating individuals to detailed personal information. Associating individuals to detailed personal information.

DRM DRM (Digital Radio Mondiale) is the only universal, open standard digital AM radio system with near-FM quality sound available to markets worldwide. While DRM currently covers the broadcasting bands below 30 MHz, the DRM consortium voted in March 2005 to begin the process of extending the system to the broadcasting bands up to 120 MHz. The design, development and testing phases are expected to be completed by

DRM Digital Rights Management A system for protecting the copyrights of data circulated via the Internet or other digital media by enabling secure distribution and/or disabling illegal distribution of the data. copyrightsInternetcopyrightsInternet Typically, a DRM system protects intellectual property by either encrypting the data so that it can only be accessed by authorized users or marking the content with a digital watermark or similar method so that the content can not be freely distributed. encryptingdigital watermarkencryptingdigital watermark

Palladium / DRM Q/A Q: What is the Next-Generation Secure Computing Base (NGSCB) ? A: The "Next-Generation Secure Computing Base" (NGSCB), formerly known as Palladium, is Microsoft’s new trusted computing architecture. (The name was changed in Microsoft claimed it was because a book publisher of the same name wouldn't allow them to use "Palladium"; Critics charge that the change was a reaction to the negative publicity surrounding the Palladium operating system.)

Digital Watermarking Also referred to as simply watermarking, a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). The name comes from the faintly visible watermarks imprinted on stationery that identify the manufacturer of the stationery. The purpose of digital watermarks is to provide copyright protection for intellectual property that's in digital format. bitsdigitalbitsdigital Unlike printed watermarks, which are intended to be somewhat visible, digital watermarks are designed to be completely invisible, or in the case of audio clips, inaudible. Moreover, the actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. And finally, the digital watermark must be robust enough so that it can withstand normal changes to the file, such as reductions from lossy compression algorithms. lossy compressionlossy compression

Digital Watermarking Q/A Q: Who was caught in early 2004 releasing movie screeners, using digital watermarking ? A: Carmine Caridi. He distributed movie copies sent to him as an Academy Awards screener. opranos.html opranos.html

DMCA The Digital Millennium Copyright Act (DMCA) is a controversial United States copyright law which criminalizes production and dissemination of technology that can circumvent measures taken to protect copyright, not merely infringement of copyright itself, and heightens the penalties for copyright infringement on the Internet. CopyrightUnited StatescopyrightlawcircumventCopyrightUnited Statescopyrightlawcircumvent Passed on May 14, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended title 17 of the US Code to extend the reach of copyright, while limiting the liability of Online Providers from copyright infringement by their users. May Bill ClintonOctober US Code copyright infringementMay Bill ClintonOctober US Code copyright infringement

DMCA Q/A Q: What is deCSS, and how does it relate to the DMCA ? A: s-99-00/dmca-2k/css.html s-99-00/dmca-2k/css.html s-99-00/dmca-2k/css.html See also: management management management