Study of Computer Virus Worms Sampath Yerramalla 04/17/02.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
We are here to help you… Fight something like this Brownies !
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Chapter Objectives In this chapter, you will learn:
Presentation on Computer Virus
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Viruses.
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Study of Computer Virus Worms Sampath Yerramalla 04/17/02

Survey  Virus Appearance –National Press –Faster than in papers Melissa The Love Letter Anna Kournikova  Vulnerabilities –Computer hardware based on single trusted user –Software loop-holes  Research : Any machine with almost any OS can support virus

Difference  Virus –A computer program that replicates by attaching itself to some other object –Usually small size programs ( 3-30k ) –Designed to evade detection  Worm –First reported ed by John Shoh and Jon Hupp of XEROX PARC –Sends itself to other systems –Bigger in size than virus –More abilities –Not easy to write

Virus Spread  Medium –Hard disk –Floppy disks –Tape –Optical media –Memory  Internet – attachments –.exe.bat.vbs  Incentive and trap –Money –Sex –Humor  Research : One in every five hundred messages contain a virus.

Types  Effect on OS, programming used and size. –Boot sector virus –Polymorphic virus –Time Bomb –Shell virus –Add-on virus –Trojan horse –Internet worms

Polymorphic virus  Mutates  Hard to detect  All parts of the multipartite virus needs to be cleaned  Different kinds of damages Amusing screen displays Unusual sound displays System reboots Reformatting the hard disk

Shell Virus Uninfected Program Infected Program

Add-on Virus Uninfected Program Infected Program

Trojan Horse  A program that hides it true intention  attachments  Trick into installing malicious software –Droppers –Backdoors  Hackers –Subseven –Back Orifice –Netbus

Internet Worms  Use complex e-mal functions and network software  Steals addresses from your address book  New hosts through un-protected system drives  W32/ska  VBS/Netlog  W32/Explorezip  W32/Qaz  W32/SaddamHussain,……  Virus Hackers

Hackers attack Microsoft

Virus programmers  Common languages to create virus –Assembler –C–C –Visual Basic –Java  Unfortunately, virus are created by people for all usual reasons –Dirty tricks –Make a living  Fortunately, not all virus programmers aren’t in “ boy or girl genius league ”.

Viral Signatures  Repeated infection – early detection  Unique virus signatures  Mixed blessing –Fake Viral signatures to protect against virus

Why should I care ?  Reproduce –Stealing addresses from your Address Book –Write files to a Local directory / Network computer –Appears to be done by you  Un-authorized Access –Passwords –Credit card numbers –Destroy the computer –Computer un-usable  Allow other people (anywhere on internet), to get control of your computer

Have I Been a Victim ?  Reproduction stage  Alert box  Too late  Virus hoax are common than virus itself

Getting Rid of Virus  Virus code is tagged at the end of a program  Placed in the empty slots of a program  Both types can be cleaned  Unfortunately, virus world doesn’t end here  Some virus replace the program code with their own code  Can’t be cleaned, hence deleted

Getting Rid of Virus…  Some can be removed  Others may require part or all of the OS to be removed or re-installed  Retrieval of files  Damage cannot be undone

Prevention better than any cure  Technical measures –Anti-virus software –Update  Check mail-servers  Reject all s of dangerous or unknown extensions  Suspect even safe extensions  Disabling functions  Removing windows script hosting

Do’s and Don’ts  A lways update your anti-virus software at least weekly  B ack up your important files and ensure that they can be restored  C hange the computer's boot sequence to always start the PC from its hard drive  D on't share Drive C: without a password and without read-only restrictions  E mpty floppy drives of diskettes before turning on computers, especially laptops  F orget opening unexpected attachments, even if they're from friends  G et trained on your computer's anti-virus software and use it

Do’s and Don’ts….  H ave multiple backups of important files  I nstall security updates for your operating system and programs as soon as possible  J ump at the chance to learn more about your computer. This will help you spot viruses  K nowledge is contagious, infect the truth

References  I’ll include them in the term paper ! Sampath Yerramalla