BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses, Worms & Trojan Horses
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting People and Information: Threats and Safeguards
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
--Harish Reddy Vemula Distributed Denial of Service.
Everything you wanted to know about Computer Viruses.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Viruses can get onto your computer via:  Junk mail  Downloads  Pop-ups.
Malicious Software.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
CYBER SECURITY...
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
NET 311 Information Security
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​ ~

Type of Computer Viruses

What is a computer virus? Exist over the past few years There are over 10,000 known computer viruses Over 200 new viruses are being discovered every month hidden program, which invades your computer Has the potential to cause damage and/or perform ​ unwanted/unauthorized functions.

How does a virus work? A computer virus performs two basic functions – It copies itself from machine to machine (self reproducing) – It executes the instructions the perpetrator has planned.

A computer virus exhibits three characteristics: a replication mechanism an activation mechanism an objective

What damage can a virus do? computer virus can cause unwanted alteration computer virus can loss of data annoy the user destroy all your data files your machine can even be rendered unusable

How do they spread? Viruses are usually spread by media/programs swapped.

Kind of viruses Encrypted Viruses : most difficult kind of bug to detect and the most difficult to stop Secret Viruses : make changes to files on your computer, or completely replace files Time Delay Viruses The Anti-Virus Virus The Multi-Headed Virus

Kind of viruses (continue) The Misdirection Virus A Cloning Virus The Author Virus The Bad Penny Virus Rewriting Virus The Melissa Virus End Type of Viruses

How to Know if Your Computer is Infected with a Virus

Viruses in USB Flash or Drive

Show file hid from USB Flash To unhide file in USB Flash Run=> cmd.exe F: or G: (Drive USB Flash) : => hit Enter F:> attrib -s -h /s /d *.* => hit Enter

Show file hid from USB Flash

Attack Techniques

What is attack ? In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an assetcomputercomputer networks

Unauthorized Access Attack Spoofing Hopping DoS DDoS Spam Mail Malicious Code Cross Site Scripting Attack

Spoofing Typical example Use of other people’s user IDs/passwords without permission

Dos Attack

Attack Cross Site Scripting Attack

Resource : Chapter03-Unauthorized.Access.Method

Q & A

Thank You For Listening And Join This Event !.. Good Luck !