By: Angelica Jurczak Anna Rog David Brackett

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Chapter Nine Maintaining a Computer Part III: Malware.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
computer Viruses Ever MAde To Protect What Matters
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
CSCS 100 Shamoon Bashir Joshua Siddqui
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
For more notes and topics visit: eITnotes.com.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Computer Viruses Author: Alyse Allen.
Computer Virus’s.
Computer Technology Notes 5
Unit# 7: Future Enabling use of ICT
Presentation transcript:

By: Angelica Jurczak Anna Rog David Brackett Computer Viruses By: Angelica Jurczak Anna Rog David Brackett

What is a Computer Virus? A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. One of the first detected virus was the Creeper virus in the early 70’s Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk.

Basic Computer Viruses Trojan Horses appears as interesting program file but when installed it allows intruders to access and read your files Worms virus that copies and multiplies itself by using computer networks and security flaws E-mail Viruses use e-mail messages to spread which allow it to automatically forward itself to thousands of people

Types of Viruses Boot Sector Virus Program Virus Multipartite Virus Infects the boot or MBR of diskettes and hard drives through the sharing of infected disks and pirated software applications Once your hard drive is infected all diskettes that you use in your computer will be infected Program Virus Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened It then makes copies of itself and will infect other programs on the computer Multipartite Virus Hybrid of a Boot Sector and Program viruses It infects program files and when the infected program is active it will affect the boot record

Types of Viruses Stealth Virus Polymorphic Virus Macro Virus Disguises itself to prevent from being detected by antivirus software It alters its file size or conceals itself in memory Polymorphic Virus Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file Macro Virus Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel Once it gets in to your computer, every document you produce will become infected Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed

Signs Your Computer is Infected Functions slower than normal Responds slowly and freezes often Restarts itself often See uncommon error messages, distorted menus, and dialog boxes Notice applications fail to work correctly Fail to print correctly

Computer Virus History

First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources, slowing down the productivity.  -"The Creeper"  capable of entering a network by itself and transferring a copy of itself to the system. Early 80,s-Increasing number of programs written by individuals not by software companies. Programs caused miner viruses called "Trojan horses". 1986'Brain virus' - by Amjad and Basit Farooq Alvi. spread through floppy disks, infected boot records and not computer hard drives Lahore, Pakistani Brain, Brain-A and UIUC virus -took over free space on the floppy disk and hid from detection ”disguised itself by displaying the uninfected boot sector on the disk.” 1987-Lehigh virus - the first memory resident file infector that attacked executable files and took control when a file was opened The Jerusalem Virus -had bugs that re-infected programs that were already infected

1988: Robert Morris made a worm that invaded ARPANET computers disabled 6,000 computers on the network by overflowing their memory banks with copies of itself 1991: Norton Anti-Virus software 1999: "Melissa" virus -infected thousands of computers very fast by sending copies of itself to 50 names in the address book on Outlook e-mail Led to an estimated $80 million in damage and record sales of anti-virus products. 2000: "I Love You" virus -was sent by email and infected 10 % of computers in only one day -created by a young Filipino computer student who did not get punished because then the Philippines had no laws against hacking which led to the European Union's global Cybercrime Treaty. 2001: "Nimda" virus (days after 9/11) -had 5 ways of infecting systems

2004 MyDoom spreads through emails and file-sharing software faster than any previous virus or worm. Allows hackers to access the hard drive of the infected computer. An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm. The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation. 2006 Discovery of the first-ever malware trojan horse for Mac OS X 2008 Torpig is a Trojan horse which affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information and installs malware on the victim's computer. 2009 Conficker infects anywhere from 9 to 15 million Microsoft server systems. French air force, Royal Navy warships and submarines, Sheffield Hospital network, UK Ministry of Defence, German Bundeswehr and Norwegian Police were all affected.

Total Number of Viruses by year January 1985 1 January 1985 1 January 1987 3 January 1989 6 January 1990 142 January 1991 357 January 1992 1,161 January 1993 2,482 January 1994 3,687 January 1995 5,626 January 1996 7,764 January 1997 11,037 January 1998 16,726 January 1999 40,850 January 2000 44,000 January 2001 48,000 January 2002 55,000 January 2003 62,000

Melissa Another virus that fired up the media was Melissa, a Word macro virus. When people received the host Word document via email and opened it, the virus sent a copy of itself to the first 50 people in the victim's address book. Named after a topless dancer in Florida, the Melissa virus crashed the email servers of corporations and governments in different spots around the world. The Computer Emergency Response Team, set up after Robert Morris mucked up the Internet with his worm in 1988, estimated that the virus hit 100,000 computers in its first weekend. David L. Smith posted the infected file to an alt.sex usenet group using a stolen AOL account. Initially he entered a plea of innocence, but after being confronted with a maximum sentence of 40 years in prison, he eventually pled guilty and received a much-reduced sentence.

Love You, Love Bug By almost any measure, the so-called Love Bug was the most damaging and costly virus ever. I don't know who comes up with these whack figures, but according to Reuters the bug cost the world $15 billion in lost productivity. The Love Bug spread far faster than Melissa. Unlike Melissa, it would mail itself to everyone in your Outlook address book -- most of whom would probably be delighted to read about how you love them -- not just the first fifty. Moreover, it would gobble up certain media files stored on your hard drive.

Did you know? One German newspaper tragically lost 2,000 pictures from its archive. The perpetrator turned out to be a 23-year-old Filipino computer science student who more or less plagiarized all of his code. The lack of laws in the Philippines covering computer crimes, he pretty much got away with his crime.

Prevention Upload and use antivirus software Be aware of the e-mails and attachments you open Check for updates on antivirus software regularly Make sure antivirus software is installed correctly

Sources http://www.tech-faq.com/history-of-computer-viruses.shtml http://spamlaws.com/history.html http://en.wikipedia.org/wiki/Computer_virus#History http://www.infoplease.com/ipa/A0872842.html

References http://www.spamlaws.com/protect.html http://www.spamlaws.com/virus-types.html http://www.spamlaws.com/virus-comtypes.html http://www.spamlaws.com/federal/index.shtml http://www.spamlaws.com/virus-types.html Wikipedia www.suggestafix.com www.microsoft.com