Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 3 (Part 1) Network Security
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
The History and Details of Computer Viruses With Chuck Easttom
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Everything you wanted to know about Computer Viruses.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Computer Viruses Author: Alyse Allen.
VIRUSES and DESTRUCTIVE PROGRAMS
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk making two copies of a piece of paper. 30 seconds to copy 30 seconds to pass on In one hour= 1 x copies

Computer Virus Small piece of software that piggybacks on real programs Passes from computer to computer by producing copies of itself Have been around since 1986 When it is running in the memory it looks for programs to add itself to

Executable and boot sector viruses decline Infect boot sector Not as easy now as most program comes on a CD Programs larger Operating systems better

Who Creates Viruses? Students and school children who have recently studied an assembly language Young people who feel the need to feel superior Professional programmers: maybe inferiority complex or unstable Explorers-quick witted programmers who wish to “explore”

© 2004 By Defaulthttp:// Brain V ir u s rauinsViBi

The Brain Virus First PC virus Written in Pakistan Infected the boot sector of 360K floppy disks “Stealth” virus Try to get into RAM, stick to files and sectors, erases files and disks

Other viruses 1987 Lehigh virus: “Memory resident file infector” 1988 Jerusalem Virus: also memory resident and reinfected already infected files 1988: first anti-virus virus was written 1988 Cascade virus, first encrypted virus

And more viruses Polymorphism - encrypted viruses where the decryption routine code is variable Armoring - used to prevent anti-virus researchers from dissembling a virus Multipartite - infects both programs and boot sectors.

Viruses Moves around in an message Replicates itself automatically

Worms Worms Worms

Worms Program that has the ability to copy itself from machine to machine. Small piece of software that uses computer networks and security holes to replicate itself Copies to another computers that has the same specific security hole

2001 Code Red Worm Slowed down the internet The worm scanned for Windows NT or Windows 2000 that didn’t have security patch installed. Copied itself to that server and scanned again

Code Red Designed to: Replicate itself the first 20 days of each month Replace Web pages on infected servers with the page “Hacked by Chinese” Overwhelm the White House Server

How does Code Red Work Unpatched systems had a “buffer overflow” which allowed embedded code to run. It created a sequence of random IP addresses to find other servers. Inspect the time clock and wait for appointed time and send 100 connections to

Morris: Internet Worm Infected more than 6000 computer systems, including NASA research Used errors inn operating systems to propagate. Total losses were 96 million dollars

© 2004 By Defaulthttp://

Trojan Horses A computer program Claims to do one thing, but does damage when you run it (could erase your hard drive) They do not replicate automatically

1989 Trojan Horse: AIDS copies of diskettes shipped marked “AIDS Information Diskette v2” After 90 boot-ups it encrypted all the filenames on your HD, making them invisible and left one file: Send $189 to…

Virus Hoaxes 1988 Mike RoChenle uploaded a message to BBS systems describing a virus that spread on 2400 baud connection. Many users switched to 1200 baud. Other hoaxes: Goodtimes, Aol4Free

1990 DiskKiller Virus PC Today (GB version) shipped diskette with magazine that was infected with DiskKiller Over copies were sold Who is responsible here?

1992 Michelangelo Virus Anti-virus companies made a big deal of this virus, bringing it into the news One US anti-virus company announced on March6 data on over 5 million computers will be destroyed Reality: about computers infected

Other Key Dates 1992: First Windows Virus released 1994: Virus gets on master disk of CD when preparing a batch of CDs-can only destroy the CDs. 1994: “OneHalf” a popular Russian virus

Latest Viruses W32.Zafi.B.Iworm W32.Sasser.A.Worm

And so it continues 1995: Concept virus for Word 1996: Windows95 virus 1996: Excel/Word virus that was based on Macros (Basic programs) 1997: Office 97 Viruses 1997: Homer, first network worm virus using FTP

1998 “Red Team” virus infects Windows EXE-files and sends infected files through : I love you virus, when opened, sent to everyone in your address book.

Protect Yourself against Viruses Run secure OS like UNIX or use virus protection software Never run macros unless you know their source. Never run executable attachments Show extensions Backup

Why do we have viruses? Psychology that drive vandals The thrill of watching things blow-up Bragging rights Started when PCs were common, then had BBC, then floppy disk, then Internet.

© 2004 By Defaulthttp:// Attachments Virus Protection Scanning Backup Show Extensions Worms Latest Version Integrity Checking Interception Source? Downloads Trojan Horses

Scanning Scanning: looks for know viruses by characteristics similar to existing viruses or signature recognition Dangerous to depend on old SW False alarms Needs a clean boot

Integrity Checking Record information about your system to check against later Compares your system to the “base”information to detect changes

Interception Pop up warnings when a request is made to install itself as a resident program Useful for simple logic bombs and Trojan horses

Sources Slade, Robert. Earliest History of Viral Programs. What is a computer virus? The History of Computer Viruses-A Timeline. Computer Knowledge Virus Tutorial.