Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
Presented by: Melissa Dark CERIAS, Purdue University.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Unit 18 Data Security 1.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Chapter Nine Maintaining a Computer Part III: Malware.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 22, 2008 Viruses

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Virus: Powerful Stuff  1981: 1 known computer virus  : > 70,000  invade all types of computers – including handheld VirusReachTime Michelangelo75,000 computers7 months Melissa3.5 computers10 hours I-Love_you72 million3 hours

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Malware  Malicious Code – program or a set of programs designed to surreptitiously enter a computer and disrupt its normal operations  Malicious Code include  viruses  worms  Trojan horses  Unleashed by hackers and crackers

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  A program that attaches itself to a file, reproduces itself, and spreads to other files  A computer virus behaves in a way similar to a biological virus, which replicate and spread by inserting itself into living cells.  A computer virus inserts itself into files (infected file) and then will replicate and spread from one file to another  Viruses can replicate themselves only on the host computer (and does not spread by jumping from one host to another)  Viruses spread because people distribute infected files by exchanging disks, sending attachments, exchanging music on file sharing networks and downloading software from the web  Key characteristic is their ability to “lurk” in a computer for days or months quietly replicating themselves What is a computer virus?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah virus  Many computer viruses infect files executed by your computer – files with extensions such as.exe and.vbs  When your computer executes an infected program, it also executes the attached virus instructions  These instructions then remain in RAM, waiting to infect the next program your computer run r the next disk it accesses  In addition to replicating itself, a virus may deliver a payload, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer's hard disk  A trigger event, such as a specific date, can unleash some virus, e.g. the Michelangelo virus triggers on March 6, the birthday of artist, Michelangelo  Your experience with viruses?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  A Trojan horse is a computer program that appears to do one thing (install a screen saver, for example) when in fact it does something entirely different, and potentially malicious, such as erase files.  Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an attachment or downloading and running a file from the Internet How is a Trojan horse different from a virus?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Trojan Horse  Notorious for stealing passwords  Papador Trojan Horse  watches your browser window for text strings such as “Sign In” and “Log in”  then displays a fake login screen (misleading heading like “security measures”) that collects name, birthday, cc number, ATM code  Don’t give our birth dates – https, lock  PictureNote Trojan – arrives as named picture.exe  leads you to believe that you have received some type of graphical software  However if you open the file, it searches for AOL user information and tries to steal your login and passwords

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  Proliferation of networks, the Internet, programs etc. – threat arises from worms  Virus: designed to spread from file to file  Worm is designed to spread from computer to computer  Mass mailing worms spread by sending themselves to every address in the address book of an infected computer (seems to be coming from a known sender)  Mass mailing worms often include an attachment that contains the worm  opening the attachment then unleashes the worm  Some mass mailing worms contains a weblink that installs a worm, Trojan horse, or virus  Wallon worm contains a link to a Web site (looks like it is coming from yahoo). Clicking the link downloads several files, including the worm, which then replicate itself by sending itself to addresses in your address book. Some come from enticingly legitimate sources – MS, your place of employment What’s a worm?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah What are the symptoms of a malicious code attack?  Delete and modify files  many viruses are designed to delete files from a hard disk – may cause system instability  Access confidential information  Trojan horses are notorious for using backdoors to steal passwords and CC numbers  Worms can also scan files and Web Sites for addresses  Performance degradation  Malicious code may require system resources to send mail and scan files. While a virus is active, your computer might seem to perform slower than normal  Disable antivirus and firewall software  some viruses – called retro viruses – are designed to attack antivirus software by deleting the files that contain virus descriptions or by corrupting the main executable virus-scanning program (anti-virus viruses)

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  Prevention is best  Keeping viruses, Trojan Horses and worms you o your computer is preferable to trying to eliminate these pesky programs after they have taken up residence  Certain viruses are particularly tenacious just the process of booting up your computer an trigger their replication sequence or send hem into hiding  3 top Steps to preventing your computer from becoming infected:  Use antivirus software on every computing devise you own  Keep software patches and operating system service packs up to date  Do not open suspicious attachments  Antivirus software is a set of utility programs that looks for and eradicates viruses, Trojan horses, and worms:  McAfee, VirusScan, Norton AntiVirus, F-Secure Anti Virus  Which do you use? Why? How often? Antivirus Software: How can I avoid viruses and worms?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  Antivirus software uses several techniques to find viruses  Let’s think about it  Some viruses attach themselves to an exiting program – the presence of such a virus often increases the length of the original program  The earliest antivirus software simply examined the programs on a computer and recorded their length – a change in the length of a program from one computing session to the next indicated the possible presence of a virus  To counter the early antivirus software, hackers became more cunning – they created viruses that insert themselves into the unused portions of a program file without changing its length  Antivirus software developers fought back  They designed software that examines the bytes in an uninfected application program and calculates a checksum. A checksum is a number calculated by combining the binary values of all bytes in a file. Each time you run an application program, antivirus software calculates the checksum and compares it with the previous checksum. If any byte in the application program, has changed, the checksum will be different and the antivirus software assumes a virus is present. How does antivirus software work?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  New viruses and variations of old viruses are unleashed just about everyday  Check Web site of antivirus software publisher for periodic updates  Some software periodically reminds you to check for updates How often should I get an update?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  Some viruses don’t really exists  A virus hoax arrives as an message containing dire warnings about a supposedly new virus that is on the loose  Recommends a strategy  Recommends forwarding the  Says no one has a fix for it yet  Many cases it is a fake  Don’t panic  You can ignore a virus hoax  You can validate the hoax by going to a reliable Web site that lists hoaxes and viruses Virus Hoaxes: What’s a virus hoax?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah What’s a virus hoax?