Computer Viruses and Worms By: Monika Gupta Monika Gupta.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Types of Electronic Infection
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Technology Competency Computer Infestations Mr. Locke.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Computer Viruses Author: Alyse Allen.
Computer Viruses Standard A-4 (Safety Unit)
Presentation on Computer Virus
SEMINAR ON PC SECURITY FROM VIRUSES
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Technology Day 21
Computer Viruses Standard A-4 (Safety Unit)
Technology Mrs. Huddleston
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Computer Viruses and Worms By: Monika Gupta Monika Gupta

Overview TYPES OF INFECTION DEFINITIONS DIFFERENCE BETWEEN VIRUS AND WORM ORIGINS TYPES OF VIRUSES WORMS

Overview Cont… MELISSA VIRUS I LOVE YOU VIRUS CODE RED (WORM) SYMPTOMS OF AN INFECTION PROTECTION MEASURES CONCLUSION REFRENCES

Types of Infection VIRUSES VIRUSES WORMS TROJAN HORSES

Viruses A virus is a small piece of software that piggybacks on real programs. 2 main characteristics of viruses  It must execute itself.  It must replicate itself.

Virus Virus might attach itself to a program such as spreadsheet. Each time the spreadsheet program runs, the virus runs too and replicate itself.

Viruses Moves around in messages Usually replicate itself by automatically mailing itself to dozens of people in the victim’s address book. Example “MELISSA VIRUS” Example “I LOVE YOU VIRUS”

WORMS Small piece of software that uses computer networks and security holes to replicate itself. Copy of the worm scans the network for another machine that has a specific security hole. Copy itself to the new machine using the security hole and start replicating. Example “CODE RED”

Trojan Horses A simple computer program It claim to be a game Erase your hard disk No way to replicate itself.

Difference between Virus and Worm The difference between a worm and a virus is that a virus does not have a propagation vector. i.e., it will only effect one host and does not propagate to other hosts. Worms propagate and infect other computers. Majority of threats are actually worms that propagate to other hosts.

Why do people do it ? For some people creating viruses seems to be thrill. Thrill of watching things blow up.

Viruses Viruses show us how vulnerable we are A properly engineered virus can have an amazing effect on the Internet They show how sophisticated and interconnected human beings have become.

–File infector virus Infect program files –Boot sector virus Infect the system area of a disk –Master boot record virus infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. –Multi-partite virus infect both boot records and program files –Macro virus infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access files Types of Viruses

Melissa Virus (March 1999) Melissa virus spread in Microsoft Word documents sent via . How it works ? Created the virus as word document Uploaded to an internet newsgroup Anyone who download the document and opened it would trigger the virus. Send friendly messages to first 50 people in person’s address book.

Melissa Virus Melissa Virus was the fastest spreading virus ever seen. Forced a number of large companies to shut down their systems.

I Love You Virus (May,2000) Contained a piece of code as an attachment. Double Click on the attachment triggered the code. Sent copies of itself to everyone in the victim’s address book Started corrupting files on the victim’s machine.

Code Red (Worm) Code Red made huge headlines in 2001 It slowed down internet traffic when it began to replicate itself. Each copy of the worm scanned the internet for Windows NT or Windows 2000 that don’t have security patch installed. Each time it found an unsecured server, the worm copied itself to that server.

Code Red Worm Designed to do three things  Replicate itself for the first 20 days of each month.  Replace web pages on infected servers with a page that declares “Hacked by Chinese”  Launch a concreted attack on the White House Web server

Symptoms of Infection Programs take longer to load than normal. Computer’s hard drive constantly runs out of free space. The floppy disk drive or hard drive runs when you are not using it. New files keep appearing on the system and you don’t know where it come frm.

Symptoms of Infection Cont.. Strange sounds or beeping noises come from the computer. Strange graphics are displayed on your computer monitor. Unable to access the hard drive when booting from the floppy drive. Program sizes keep changing.

Protection TO protect yourself you need to be “Proactive” about Security issues. Being reactive won’t solve anything; Specially at crunch time and deadlines!! In matter of fact it can make the problem much more complex to solve, and the situation much worse, resulting in a complete Nightmare!! Best Measures are the preventative ones.

Protection Measures You need to basically to do four steps to keep your computer and your data secure: 1. Get the latest Anti-Virus Software. 2. Make sure you have the latest security patches and hot fixes using Windows Update. 3. Use a Host-Based Firewall. 4. BACKUP your Important Files.

Conclusion Be aware of the new infections out there. Take precaution measures. Always backup your data. Keep up-to-date on new Anti virus software. Simply avoid programs from unknown sources.

References wall.asphttp:// wall.asp Dewdney, A. K. The New Turing Omnibus. New York: Henry Holt and Company, 2001