 Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus to spread  Virus show us.

Slides:



Advertisements
Similar presentations
Presented by: Melissa Dark CERIAS, Purdue University.
Advertisements

MACROS CS1100 Computer Science and its Applications CS11001.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses. Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
©2003 CNET Networks, Inc. All rights reserved. Virus Basics Created by: Robert L. Bogue, MCSE: Security, etc. Crowe Chizek.
1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Definition ÞVirus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Presented by : vijitha.k
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Viruses. Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Venugopal reddy 07R91A05b7.  Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Viruses Author: Alyse Allen.
Intro to Malware Attacks
War between Good and Evil.
Viruses and Other Malicious Content
Viruses, Malicious Code, & Other Nasty Stuff
Computer Viruses.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

 Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus to spread  Virus show us loopholes in software  Most virus are targeted at the MS Windows OS

Þ Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host

 Background  Symptoms  Classifying Viruses  Examples  Protection/Prevention  Conclusion

 There are estimated 30,000 computer viruses in existence  Over 300 new ones are created each month  First virus was created to show loopholes in software

 ANSI COBOL  C/C++  Pascal  VBA  Unix Shell Scripts  JavaScript  Basically any language that works on the system that is the target

 Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DoS)

 Virus Information Discovery Date: Origin: Length: Type: SubType: Risk Assessment: Category:

 Stealth  Polymorphic  Companion

 Trojan Horse  Worm  Macro

 Covert  Leaks information  Usually does not reproduce

 Back Orifice Discovery Date: 10/15/1998 Origin:Pro-hacker Website Length:124,928 Type: Trojan Subtype:Remote Access Risk Assessment: Low Category: Stealth

 About Back Orifice  requires Windows to work  distributed by “Cult of the Dead Cow”  allows remote access and control of other computers  once infected, runs in the background  by default uses UDP port TCP port  In Australia 72% of 92 ISP surveyed were infected with Back Orifice

 Features of Back Orifice  pings and query servers  reboot or lock up the system  display system information  logs keystrokes  edit registry  server control  receive and send files  display a message box

 Spread over network connection  Worms replicate  First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.

 Bubbleboy Discovery Date:11/8/1999 Origin:Argentina (?) Length:4992 Type:Worm/Macro SubType:VbScript Risk Assessment: Low Category: Stealth/Companion

 Bubbleboy  requires WSL (windows scripting language), Outlook or Outlook Express, and IE5  Does not work in Windows NT  Effects Spanish and English version of Windows  2 variants have been identified  Is a “latent virus” on a Unix or Linux system  May cause DoS

 How Bubbleboy works  Bubbleboy is embedded within an message of HTML format.  a VbScript while the user views a HTML page  a file named “Update.hta” is placed in the start up directory  upon reboot Bubbleboy executes

 How Bubbleboy works  changes the registered owner/organization ▪ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersi on\RegisteredOwner = “Bubble Boy” ▪ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersi on\RegisteredOrganization = “Vandalay Industry”  using the Outlook MAPI address book it sends itself to each entry  marks itself in the registry ▪ HKEY_LOCAL_MACHINE\Software\Outlook.bubbleboy = “OUTLOOK.Bubbleboy1.0 by Zulu”

 Specific to certain applications  Comprise a high percentage of the viruses  Usually made in WordBasic and Visual Basic for Applications (VBA)  The first macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995

 Melissa Discovery Date:3/26/1999 Origin:Newsgroup Posting Length:varies depending on variant Type:Macro/Worm Subtype:Macro Risk Assessment:High Category:Companion

 Melissa  requires WSL, Outlook or Outlook Express Word 97 SR1 or Office 2000  105 lines of code (original variant)  received either as an infected template or attachment  lowers computer defenses to future macro virus attacks  may cause DoS  infects template files with it’s own macro code

 How Melissa works  the virus is activated through a MS word document  document displays reference to pornographic websites while macro runs  1st lowers the macro protection security setting for future attacks  checks to see is it has run in current session before ▪ HKEY_LOCAL_MACHINE\Software\Microsoft\Office\Melissa = “by Kwyjibo”  propagates itself using the Outlook MAPI address book ( s sent to the first 50 addresses)

 How Melissa works  infects the Normal.dot template file with it’s own code  Lastly if the minutes of the hour match up to the date the macro inserts a quote by Bart Simpson into the current document ▪ “Twenty two points, plus triple word score, plus fifty points for using all my letters. Game’s over. I’m outta here.”

 Knowledge  Proper configurations  Run only necessary programs  Anti-virus software

 You know know more about virus and how:  viruses work through your system  to make a better virus  Have seen how viruses show us a loophole in popular software  Most viruses show that they can cause great damage due to loopholes in programming

THANK YOU