Seminar On Cellular Virus

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Operating Systems Chapter 4.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
Introduction Our Topic: Mobile Security Why is mobile security important?
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
THREATS TO MOBILE NETWORK SECURITY
Unit 2 - Hardware Computer Security.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
INTRODUCTION TO VIRUS Prepaid by ParthPatel(06ce69)
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
The Android Operating System I- Introduction II- History III- Features IV- Competitors V- References.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Mobile Device Security Management Leyna Belinsky.
Seminar On Cellular Virus
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Presentation transcript:

Seminar On Cellular Virus

INTRODUCTION Viruses in the cell-phone arena are new but there are many parallel between computer and mobile phones in terms of mallicious code. The first cell-phone viruse been sited is CABIR-A. CABIR-A is a virus written specially for Nokia Series 60 mobile phones running on the Symbian operating system. The virus spreads as a .sis package,named as Caribe.sis. This topic will discuss the virus affecting the cellular phones and what all remedies can be taken to overcome this problem.

VIRUS It is a computer program that is designed to replicate itself by copying itself into other programs. Mobile Virus-It is an electronic virus that targets mobile phones.

HISTORY The first instance of a mobile virus occurred in August 2004. In July 2004, computer scientists released a proof-of-concept mobile virus named Cabir . In March 2005 it was reported that a computer worm called Commwarrior-A has been infecting Symbian series 60 mobile phones.

COMMON MOBILE VIRUSES CABIR- Infects mobile phones running on Symbian OS. DUTS -A parasitic file infector virus and is the first known virus for the PocketPC platform. SKULLS- A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. COMWARR- First worm to use MMS messages in order to spread to other devices .

MOTIVE TO CREATE VIRUS Challenge Some antivirus companies want to enter new market To gain wider attention

VIRUS ACTION Damage by deleting or modifying the phone book. Starting to make phone calls to pay-per- minute numbers . Send SMS text messages to all the numbers found within cell phone.

SPREADING VECTORS Bluetooth MMS Web downloads Memory cards

WAP SECUIRITY PROBLEM WAP gateway security Operating system Use of SMS

WAP GATEWAY SECURITY

SYMBIAN OPERATING SYSTEM It is mainly designed for mobile devices. It has associated libraries,user interface frameworks and reference implimeatations.

CURRENT THREAT CABIR Symb/Cabir-A is a virus written specifically for N-Gage, 3650, or other Nokia Series 60 mobile phones running in the Symbian operating system. The virus spreads as a .sis package, named as Caribe.sis.

CABIR REQUIRES Approving receiving a file from unknown device. Approving receiving a application from unknown device. Approving connections from unknown devices.

REASONS TO CREATE CABIR There are two reasons behind Cabir creators Some antivirus companies want to enter new market. May be Microsoft wants to show how insecure Symbian OS is compared to their MS Smart phone.

WORKING OF CABIR caribe.app: 11932 / 11944 bytes in size When launched, the worm displays a message on the screen: either 'Caribe' or 'Caribe - VZ/29a' . worm itself is an SIS format file, called caribe.sis, of 15092 or 15104 bytes in size . This file contains three objects: caribe.app: 11932 / 11944 bytes in size flo.mdl: 2544 bytes in size caribe.rsc: 44 bytes in size

PRECAUTIONS IF is your bluetooth on and you are receiving file be REALLY careful . Never download cell phone applications from file sharing networks . NEVER install any UNEXPECTED application received by MMS message from ANY senders (including your friends!). Accustom yourself to disable bluetooth if you don't use it .

CONCLUSION Virus can not install & it can’t run without user’s knowledge & conscious acceptance. Virus can be avoided by taking precautions.

THANK YOU

ANY QUESTION ?