COMPUTER VIRUSES By Gobetti Andrea & Salvestrini Luca.

Slides:



Advertisements
Similar presentations
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Advertisements

Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Jeopardy Computer Technology Vocabulary 2 Template By Carl Lyman © September 2001.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Viruses & Destructive Programs
Computer Security, Ethics and Privacy Chapter 11.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses, Hacking and Backups By Katie Louise Bieber!
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Computer Crimes Career & Technology Education Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Topic 5: Basic Security.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Operating Systems Services provided on internet
Viruses and Other Malicious Content
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

COMPUTER VIRUSES By Gobetti Andrea & Salvestrini Luca

HISTORY OF VIRUSES Virus appeared in 1988 on Machintosh In 1989 appeared on IBM/MS-DOS systems.

STRUCTURE OF A VIRUS The virus is written to self-replicate Two parts: replication engine and payload The origin is external to the computer

TYPES OF VIRUS File infectors Boot-recors infectors Macro viruses Trojan horses Worms Logic Bombs

MACRO VIRUSES Infect using macro utilities Application-specific Not specific to OS

WORMS (rabbits) Resides in active memory (RAM) Network worms: different segments One coordinates the others (octopuses) Send copies via or IRC

LOGIC BOMBS Wait for a trigger Can be used by ethical hackers

TROJAN HORSES Looks a useful software but it’s a virus Can also be a spyware Can create back doors Composed by two parts: Client part on the attacker system Server part on the victim system

VLADIMIR VETROV ( ) He was a KGB spy but worked also for the NATO (double agent) Code named Farwell by the french intelligence service The soviet union needed computer control systems for the trans-Siberian gas pipeline trojanned software > largest non-nuclear explosion ever