Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 18 Data Security 1.
Computer Viruses.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Final Exam Wednesday, May 10th 1:15 am - 3:15 am Bring a blue bubble sheet. Room 304: lab sections 10, 11, 12 Room 306: lab sections 13, 14, 15 Room 308:
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
 Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus to spread  Virus show us.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
VIRUS.
Presented by : vijitha.k
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
Computer Viruses. Introduction zComputer virus have become today’s headline news zWith the increasing use of the Internet, it has become easier for virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Venugopal reddy 07R91A05b7.  Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus.
Intro to Malware Attacks
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
Computer Viruses.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Ethics.
Computer Technology Day 21
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT

About Virus Computer virus have become today’s headline news. With the increasing use of the internet, it has become easier for virus to spread. Virus show us loopholes in software. Most virus are targeted at the MS Windows OS

A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations. File Virus: A computer virus that infects executable files, that is programs with exe filename extensions Payload: The disruptive instructions or message delivered by a computer virus. Payloads can range from just being annoying to destroying data and files on a computer system. Boot Sector Virus: A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. The virus spreads every time the infected disk is in the computer when it boots. Macro Virus: A computer virus that infects the macros that are attached to documents and spreadsheets. Trojan Horse: A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.

Today almost 87% of all viruses are spread through the internet. Transmission time to a new host is relatively low, on the order of hours to days “Latent virus”

Computer no longer boots up. Screen sometimes flicker. Computer runs slower then usual. PC speaker beeps periodically. System crashes for no reason. Files/directories sometimes disappear. Denial of service (dos)….. & Many More.

A virus runs first when a legitimate program is executed. The virus loads itself into memory and looks to see if it can find any other programs on the disk. If it can find one, it modifies it to add the virus's code to the new program. Then the virus launches the "real program“. The user has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time either of those programs gets executed, they infect other programs, and the cycle continues. When the infected program o is distributed by  floppy disk  uploaded to a bulletin board  zipped and delivered as an executable. then other programs get infected.

Security features keep viruses away. Buy virus protection software. Avoid programs from unknown sources (like the Internet). Stick with commercial software purchased on CDs.

With viruses o defense is personal discipline  Never double-click on an attachment that contains an executable program  Attachments that come in as  Word files (.DOC), spreadsheets (.XLS), images (.GIF and.JPG), etc., are data files  and they can do no damage

Don’t victimize yourself o learn where to find legitimate information on hoaxes, myths etc.  do not forward warnings if you haven’t personally checked them out!

Don’t fall for the "False Authority Syndrome” o Most people who claim to speak with authority about computer viruses have little or no genuine expertise.  The person feels competent to discuss viruses because of  his job title,  because of expertise in another computer field,  simply because he knows how to use a computer.

is clearly the predominant vulnerability point for viruses o Current viruses are spread via security holes in Microsoft Outlook and Outlook Express  Free patches are available from Microsoft to address these problems  many people are reluctant to apply them. First, update your system with Windows Update and Office Update o or, buy a Mac Buy virus protection software

Be Original Kill Piracy.