A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Computer Viruses.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Worms & Viruses ERICA SANTIAGO ASHLEY GUY DAVID HOLLAND ASHLEY WHITE JESSICA PUETTNER ERICA SANTIAGO ASHLEY GUY DAVID HOLLAND ASHLEY WHITE JESSICA.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
LittleOrange Internet Security an Endpoint Security Appliance.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Department Of Computer Engineering
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
What is it, how does it work, and why is it important?
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Viruses can get onto your computer via:  Junk mail  Downloads  Pop-ups.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
W elcome to our Presentation. Presentation Topic Virus.
SYSTEM SECURITY & ANTIVIRUS Chapter Dr. BALAMURUGAN MUTHURAMAN.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Some Great Open Source Intrusion Detection Systems (IDSs)
Computer Worms & Viruses
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically computer sabotage. What is a Virus?

How does a Virus Spread? First a programmer writes the virus most often being attached to a normal program; unknown to the user, the virus spreads to other software. Then the virus is passed by disk or network to other users who use other computers. The virus then remains dormant as it is passed on.

The types of Viruses Viruses are usually categorized as : –the boot virus which infects the boot sector of disk storage –the program virus which infects the executable programs –the multipartite virus which is a combination of the boot and program virus –the stealth virus which is able to avoid detection by a variety of means such as removing itself from the system registry, or masquerading as a system file

The types of Viruses Cont.. –the parasitic virus which embeds itself into another file or program such that the original file is still viable –the polymorphic virus which changes its code structure to avoid detection and removal –the macro virus which exploits the macro language of a program like Microsoft Word or Excel.

What is AntiVirus Software? Computer programs intended to identify and eliminate computer viruses. Antivirus software is considered to be an aid that detects, fixes and even prevents viruses and worms from spreading to your computer as well as connecting computers.

Why is software an issue? some antivirus software can considerably reduce performance there should not be more than one antivirus software installed on a single computer at any given time it’s sometimes necessary to temporarily disable virus protection when installing major updates

Types of AntiVirus there are different types of antivirus software for different computers some are designed for personal computers some are for servers and others for enterprises there are mainly two types of antivirus software: specific and generic

Specific Scanning specific scanning or signature detection the application scans files to look for known viruses matching definitions in a “virus dictionary” when the antivirus looks at a file it refers to a dictionary of known viruses and matches a piece of code (specific patterns of bytes) from the new file to the dictionary.

Specific scanning cont.. after recognizing the malicious software the antivirus software can take one of the following actions: (1): attempt to repair the file by removing the virus itself from the file (2): quarantine the file (3): or delete the file completely

Specific Scanning cont… however, specific scanning is not always reliable because virus authors are creating new ways of disguising their viruses so the antivirus software does not match the virus’ signature to the virus dictionary.

Generic Scanning generic scanning is also referred to as the suspicious behavior approach. generic Scanning is used when new viruses appear. in this method the software does not look for a specific signature but instead monitors the behavior of all applications.

Generic Scanning cont… if anything questionable is found by the software the application is quarantined and a warning is broadcasted to the user about what the program may be trying to do. if the software is found to be a virus the user can send it to a virus vendor.

About OfficeScan Trend Micro OfficeScan protects enterprise networks from malware, network viruses, web- based threats, spyware, and mixed threat attacks. An integrated solution, OfficeScan consists of the OfficeScan client program that resides at the endpoint and a server program that manages all clients. The OfficeScan client guards the computer and reports its security status to the server. The server, through the web-based management console, makes it easy to set coordinated security policies and deploy updates to every client.

Trend Micro OfficeScan For 64 bits machine - For 32 bits machine -

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services – only authorized traffic is allowed Auditing and controlling access – can implement alarms for abnormal behavior Itself immune to penetration Provides perimeter defence

Firewalls in Our Network Juniper SRX650 – For LAN Checkpoint 4800 – For Data Centre

NETWORK LAYOUT

Intrusion prevention systems Intrusion prevention systems are network security devices that monitor network and/or system activities for malicious activity (intrusion) Main functions of Intrusion Prevention System (IPS) are, – Identify intrusion – Log information about intrusion – Attempt to block/stop intrusion and – Report intrusion Intrusion Detection System (IDS) only detect intrusions

THANK YOU By : Mengu Kuotsu Security Administrator