Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(www.presentationpoint.yola.com)

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Everything you wanted to know about Computer Viruses.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
SYSTEM SECURITY & ANTIVIRUS Chapter Dr. BALAMURUGAN MUTHURAMAN.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
computer virus infection & symptoms
Computer Technology Notes 5
Chap 10 Malicious Software.
Chap 10 Malicious Software.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point( Idea & Support by: Future IT( (CEO Future IT) (c) February, 2011

What is a Virus ? A virus is just a computer program. Like any other program, it contains instructions that tell your computer what to do. But unlike an application, a virus usually tells your computer to do something you don't want it to do, and it can usually spread itself to other files on your computer -- and other people's computers. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

In some cases, a virus will execute only a gentle "personality quirk," such as causing your computer to make seemingly random bleeps. But a virus can be very destructive; it could format your hard drive, overwrite your hard drive boot sector, or delete files and render your machine inoperable. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

General virus types While there are thousands of variations of viruses, most fall into one of the following general categories, each of which works slightly differently. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Boot Sector Virus : Replaces or implants itself in the boot sector. This kind of virus can prevent you from being able to boot your hard disk. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Macro Virus : Written using a simplified macro programming language, these viruses affect Microsoft Office applications, such as Word and Excel. A document infected with a macro virus generally modifies a pre-existing, commonly used command (such as Save) to trigger its payload upon execution of that command. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Multipartite Virus Infects both files and the boot sector-- a double whammy that can reinfect your system dozens of times before it's caught. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Polymorphic Virus : Changes code whenever it passes to another machine. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Stealth Virus : hides its presence by making an infected file not appear infected Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

viruses: viruses: An virus moves around in messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Worms : A worm is a computer program that has the ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Worms eat up storage space and slows down the computer. But worms don't alter or delete files. A worm is a computer program that has the ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Worms eat up storage space and slows down the computer. But worms don't alter or delete files. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Trojan horses : A Trojan horse is simply a computer program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). A Trojan horse is simply a computer program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

When loaded onto your machine, a Trojan horse can capture information from your system -- such as user names and passwords or could allow a malicious hacker to remotely control your computer. Trojan horses have no way to replicate automatically. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Origins of Viruses : P eople create viruses. A person has to write the code, test it to make sure it spreads properly and then release the virus. A person also designs the virus's attack phase, whether it's a silly message or destruction of a hard disk. P eople create viruses. A person has to write the code, test it to make sure it spreads properly and then release the virus. A person also designs the virus's attack phase, whether it's a silly message or destruction of a hard disk. In most of the cases people create viruses just for the thrill or fun. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

How They Spread ? Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from the internet or copy it from a floppy disk and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

The virus loads itself into memory and looks around to see if it can find any other programs on the disk. If it can find one, it modifies it to add the virus's code to the unsuspecting program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time either of those programs gets executed, they infect other programs, and the cycle continues. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to internet, then other programs get infected. This is how the virus spreads. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

The spreading part is the infection phase of the virus. Viruses wouldn't been so violently disliked if all they did was replicate themselves. Unfortunately, most viruses also have some sort of destructive attack phase where they do some damage. Some sort of trigger will activate the attack phase, and the virus will then "do something" -- anything from printing a silly message on the screen to erasing all of your data. The trigger might be a specific date, or the number of times the virus has been replicated, or something similar. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

SOME TRICKS THE VIRUSES PLAY : One important trick is the ability to load viruses into memory so that they can keep running in the background as long as the computer remains on. This gives viruses a much more effective way to replicate themselves. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Another trick is the ability to infect the boot sector on floppy disks and hard disks. The boot sector is a small program that is the first part of the operating system that the computer loads and tells the computer how to load the rest of the operating system. By putting its code in the boot sector, a virus can guarantee that it gets executed. It can load itself into memory immediately, and it is able to run whenever the computer is on. Boot sector viruses can infect the boot sector of any floppy disk inserted in the machine, and on campuses where lots of people share machines they spread like wildfire. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

In general, both executable and boot sector viruses are not very threatening any more. The first reason for the decline has been the huge size of today's programs. The programs are so big that the only easy way to move them around is in CDs. People certainly can't carry applications around on a floppy disk like they did in the early days. Compact discs cannot be modified, and that makes viral infection of a CD impossible. Boot sector viruses have also declined because operating systems now protect the boot sector. Both boot sector viruses and executable viruses are still possible, but they are a lot harder now and they don't spread nearly as quickly as they once could. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Run a secure operating system like UNIX or Windows NT. Install virus protection software. Avoid programs from unknown sources. Disable floppy disk booting Macro Virus Protection is enabled in all Microsoft applications. Never double-click on an attachment that contains an executable that arrives as an e- mail attachment. Prevention is the best cure : Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

How antivirus software works : Scanning software looks for a virus in one of two ways. If it's a known virus (one that has already been detected in the wild and has an antidote written for it) the software will look for the virus's signature -- a unique string of bytes that identifies the virus like a fingerprint -- and will zap it from your system. Most scanning software will catch not only an initial virus but many of its variants as well, since the signature code usually remains intact. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

In the case of new viruses for which no antidote has been created, scanning software uses methods that look for unusual virus like activity on your system. If the program sees any funny business, it quarantines the questionable program and broadcasts a warning to you about what the program may be trying to do (such as modify your Windows Registry). If you and the software think the program may be a virus, you can send the quarantined file to the antivirus vendor, where researchers examine it, determine its signature, name and catalog it, and release its antidote. It's now a known virus. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

If the virus never appears again -- which often happens when the virus is too poorly written to spread -- then vendors categorize the virus as dormant. But viruses are like earthquakes: The initial outbreak is usually followed by aftershocks. Variants (copycat viruses that emerge in droves after the initial outbreak) make up the bulk of known viruses. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Practice safe computing The best way to protect yourself from viruses is to avoid opening unexpected attachments and downloads from unreliable sources. Resist the urge to double-click everything in your mailbox. If you get a file attachment and you aren't expecting one, e- mail the person who sent it to you before you open the attachment. Ask them if they meant to send you the file, what it is, and what it should do. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

For added safety, you need to install reliable antivirus scanning software and download updates regularly. Major antivirus software vendors, including Symantec, Network Associates, Computer Associates, and Trend Micro, provide regular updates. (Computer Associates' InoculateIT is also free.) Some of the vendors also offer a service that will automatically retrieve updates for you from the company's Web site. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011

Regular updates are essential. Researchers at Computer Economics estimate that 30 percent of small businesses are vulnerable to viruses either because they don't keep their virus-scanning software updated or because they don't install it correctly. Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011