Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Presented by: Melissa Dark CERIAS, Purdue University.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Unit 18 Data Security 1.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Everything you wanted to know about Computer Viruses.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
ANITVIRUSES TECHNIQUES
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Presentation on Computer Virus
War between Good and Evil.
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can range from being a nuisance to causing major destruction and recovery timeCan range from being a nuisance to causing major destruction and recovery time Software packages can be infectedSoftware packages can be infected

Bordoloi Viruses Hide in: Another computer program that executes so that the virus program can be placed into main memory.Another computer program that executes so that the virus program can be placed into main memory. Typically, viruses come from programs on floppy disks or networks.Typically, viruses come from programs on floppy disks or networks. Very complex viruses can write themselves in between hard disk sectors making them very difficult to detect.Very complex viruses can write themselves in between hard disk sectors making them very difficult to detect.

Bordoloi Virus Types Trojan Horse - contained inside of another “host” program. Often date activated. White collar sabotage.Trojan Horse - contained inside of another “host” program. Often date activated. White collar sabotage. Worms - may not be an executable program itself but duplicates in main memory and hard disk space. Slows down the operating system.Worms - may not be an executable program itself but duplicates in main memory and hard disk space. Slows down the operating system. Stealth virus - pretends to be another program that should be on the computerStealth virus - pretends to be another program that should be on the computer

Bordoloi Virus Components: Replication code - how it does what it doesReplication code - how it does what it does Marker - set of codes that virus looks at to determine if the file has been infectedMarker - set of codes that virus looks at to determine if the file has been infected Kernel - code that controls task manipulation and replicationKernel - code that controls task manipulation and replication Overwriting vs non-overwriting: replaces an existing program file vs appending to itOverwriting vs non-overwriting: replaces an existing program file vs appending to it

Bordoloi Elimination and Protection Scanner software - “shield” software scans all data coming into a computer system looking for known or suspected viruses. Known viruses are detected by some recognizable “character string” in the virus computer code. Suspected viruses are detected whenever the virus program tries to do something weird, like attach to an existing program or reuse disk space reserved for the operating system.Scanner software - “shield” software scans all data coming into a computer system looking for known or suspected viruses. Known viruses are detected by some recognizable “character string” in the virus computer code. Suspected viruses are detected whenever the virus program tries to do something weird, like attach to an existing program or reuse disk space reserved for the operating system. Cleaner software - can try to restore infected files back to a useable state. Requires booting from a clean, write protected floppy disk May take a lot of time.Cleaner software - can try to restore infected files back to a useable state. Requires booting from a clean, write protected floppy disk May take a lot of time. Detection software - detects the presence of a virus on an infected diskDetection software - detects the presence of a virus on an infected disk Typical packages: McAfee, Dr. Solomon, etcTypical packages: McAfee, Dr. Solomon, etc