INTRODUCTION TO VIRUS Prepaid by ParthPatel(06ce69)

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Trojan Horse Program Presented by : Lori Agrawal.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
THREATS TO MOBILE NETWORK SECURITY
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Seminar On Cellular Virus
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
D. Beecroft Fremont High School VIRUSES.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
AUG 2006 COMPUTER VIRUS.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Security Issues, Ethics, & Emerging Technologies in Education
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
COMPUTER VIRUS.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Viruses Author: Alyse Allen.
Operating Systems Services provided on internet
Seminar On Cellular Virus
Viruses and Other Malicious Content
Computer Viruses.
Chap 10 Malicious Software.
Viruses.
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Presentation transcript:

INTRODUCTION TO VIRUS Prepaid by ParthPatel(06ce69)

Introduction of Virus  Len Adleman – Give the name “Virus”  Definition  Two types of Virus : Computer Virus Mobile Virus

Computer Virus  Motives Psychology Fascination Challenge

Computer Virus  List Of Different Viruses 1981-First Virus in the wild 1983-First Documental virus 1986-Brain,PC-Write Trojan & Virdem 1987-File Infectors,Lehigh,Christmas worm 1988-MacMag,Scores,Internet Worm 1989-AIDS Trojan 1990-VX BBS,Little Black Book 1991-Tequila 1992-Michelangelo,DAME

Computer Virus  List Of Different Viruses 1995-Year Of Hacker 1996-Boza,Laroux,Stog 1998-Strange Brew,Back Orifice 1999-Melissa,Corner,Tristate,Bubbleboy 2000-DDos,Love Letter,Timofonica,Liberty 2001-Gnuman,LogoLogic-A and many more… 2002-LFM-926,Sharp-A,SQL spider etc Sobig,Lovegate,Fizzer,Blaster Trojan.Xombe,MP3Concept,Symb/Cabir-A and many more

Computer Virus  Types Of Virus  Virus  Melissa,ILOVEYOU  Worms  Code Red  Trojan Horses  NetBus and BackOrifice  Subseven  Boot Sector Virus  Form,Disk Killer,Michelangelo

Computer Virus  Types Of Virus  Program Virus  Sunday Cascade  Multipartite viruses  Invader, Flip, and Tequila  Stealth viruses  Frodo, Joshi, Whale

Computer Virus  Execution Of Virus Code attached to a common Program Run when legitimate program gets executed Infection phase – Replication,Floppy,Specific date Compromise or Loss of Data Loss of Productivity Denial of Service Data Manipulation Loss of Credibility Loss of Revenue Embarrassment

Computer Virus  Protection Against Virus Operating System – UNIX Virus Protection Software Macro Virus Protection Précising use of Internet, -attachment

Mobile Virus  WAP Threats Wireless Application Protocol Fidentiality,Privacy,Data integrity checking No Content Security

Mobile Virus  CABIR First Mobile phone Virus Discovered by French Arm of Kaspersky Labs Developed by Global group “No Technology is reliable and safe from their attack” Nokia,Siemens,Sony Erickson

Mobile Virus  CABIR How it works?  Symbian OS  Caribe.sys  Bluetooth  No harmful Effect Wake up call to Mobile Industry

Mobile Virus  Motives Curiosity Challenge To gain wide attention

Mobile Virus  Virus Action Three Logical Components of WAP Network a.The WAP Client(Mobile Terminal) b.The WAP Gateway c.The Origin Server More Functionality means more risk Making phone calls Accessing & Modifying Phone Book Data Sending SMS Restart phones

Mobile Virus  Protection Against Virus Antivirus Software : F-Secure Web Site Nokia 6670 – First mobile with Virus Protection Estimated Retail Price $613 Two Tri-Band Optimized for GAM Networks in the EMEA Pricing plan for F-Secure Antivirus Protection Protection License - $3.62 per month Nokia offer additional Security VPN & SSL

Mobile Virus  Protection Against Virus Shutting the Stable Door Gateway Level Solution WML Script Scanner Detect and Remove malicious code Requiring no client software