ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
D. Beecroft Fremont High School VIRUSES.
computer Viruses Ever MAde To Protect What Matters
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses, Hacking and Backups By Katie Louise Bieber!
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
By: Angelica Jurczak Anna Rog David Brackett
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Computer Viruses Author: Alyse Allen.
Computer Virus’s.
War between Good and Evil.
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Technology Day 21
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work

Introduction  Downloading files exposes you to viruses  Written for specific types of computers  Programs that  Delete data  Erase programs  Wipe hard drives  Install spyware  Display messages

Introduction  Get viruses from  Downloaded files & programs   Commercial products  Web sites  Viruses  Infect your computer  Replicate themselves  Distribute themselves  Inflict damage

Introduction  Attack four parts of your computer  Executable programs  File directory system  Boot & system areas  Data  Two major types  Trojan horses  Worms

Introduction  Trojan horse  Appears to be something else  Worm  Designed to infect networks  Robert Morris  Melissa

Robert Tappan Morris  Released in 1988  Grad student at Cornell  1 st computer worm on Internet  Intended to gauge the size of the Internet  Design flaw caused it to replicate too much  Infected thousands of computers  $ million in damages estimated

Robert Tappan Morris  1989 – Indicted under the Computer Fraud and Abuse Act  1 st person  1990 – Convicted  Three years probation  400 hours community service  $10,050 fine  Tenured professor at MIT

Melissa  David L. Smith  Released March 1999  Aberdeen Township, NJ  Posted an infected document to alt.sex Usenet newsgroup  Passwords to 80 Internet porn sites  Named after a lap dancer he knew in Florida

Melissa  Spread via  Forwards itself to 1 st 50 addresses in Outlook  Inserted Simpsons references into documents  Cost more than $80,000,000 in damages  Microsoft, Intel, Lockheed-Martin shut down  Originally sentenced to 10 years  Served 20 months, $5,000 fine  Worked for FBI

Examining FAT Disks  Allocate 1 cluster (8 sectors)  Record data  Write End-of-File marker …… Data Slack Cluster (an indivisible unit) Allocated to a file Unallocated