1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/060024 Reg.no-0028438 of 2002-2003.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
The Code of Life: A Look at Emerging Artificial Life The Virus AGCGTGGCAGC ATCCTACGACT GCACGATCCTC GATCGACGTGA CGTGACGTAGC GGGACTCGATC
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Everything you wanted to know about Computer Viruses.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
For any query mail to or BITS Pilani Lecture # 1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security By Isabelle Cooper.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
SEMINAR ON PC SECURITY FROM VIRUSES
computer virus infection & symptoms
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of

2 Agenda Computer Virus Concept Analyze three common computer viruses Antivirus Technologies Conclusion

3 Computer Virus Concept What is Computer Virus? Computer Virus Time Line Types of Computer Virus How does computer virus works?

4 Computer virus concept What is Computer Virus? Definition -- Virus: A self-replicating piece of computer code that can partially or fully attach itself to files or applications, and can cause your computer to do something you don't want it to do. Similarities between biological virus (like " HIV " ) and computer virus: Need a host for residence. Capable of self-replicate Cause damage to the host. Difference: Computer viruses are created by human.

5 Computer virus concept Computer Virus Time Line Theories for self-replicating programs was first developed Apple Viruses 1, 2, and 3 was some of the first viruses in public – Jerusalem was detected. Activated every Friday the 13th, the virus affects both.EXE and.COM files and deletes any programs run on that day Tequila is the first widespread polymorphic virus found The Melissa virus, W97M/Melissa, executed a macro in a document attached to an . Melissa spread faster than any other previous virus The Love Bug, also known as the ILOVEYOU virus, sent itself out via Outlook, much like Melissa The Code Red I and II worms attacked computer networks in July and August. They affected over 700,000 computers and caused upwards of 2 billion in damages.

6 Computer virus concept Types of Computer Virus Boot Sector Virus - Michelangelo Boot sector viruses infect the boot sectors on floppy disks and hard disks, and can also infect the master boot record on a user's hard drive. File Infector Virus - CIH Operate in memory and usually infect executable files. Multi-partite Virus Multi-partite viruses have characteristics of both boot sector viruses and file infector viruses. Macro Virus - Melissa Macro Virus They infect macro utilities that accompany such applications as Microsoft Word, Excel and outlook.

7 Computer virus concept Types of Computer Virus - Continue Trojan / Trojan Horse – Back Orifice A Trojan or Trojan Horse is a program that appears legitimate, but performs some malicious and illicit activity when it is run. Worm – Red Code A worm is a program that spreads over network. Unlike a virus, worm does not attach itself to a host program. It uses up the computer resources, modifies system settings and eventually puts the system down. Worms are very similar to viruses in that they are computer programs that replicate themselves. The difference is that unlike viruses, worms exist as a separate small piece of code. They do not attach themselves to other files or programs.

8 Computer virus concept Virus Characteristics Memory Resident: Loads in memory where it can easily replicate itself into programs of boot sectors. Most common. Non-Resident: Does not stay in memory after the host program is closed, thus can only infect while the program is open. Not as common. Stealth: The ability to hide from detection and repair in two ways. - Virus redirects disk reads to avoid detection. - Disk directory data is altered to hide the additional bytes of the virus.

9 Computer Virus Concept Virus Characteristics Encrypting: Technique of hiding by transformation. Virus code converts itself into cryptic symbols. However, in order to launch (execute) and spread the virus must decrypt and can then be detected. Polymorphic: Ability to change code segments to look different from one infection to another. This type of virus is a challenge for ant-virus detection methods.

10 Computer virus concept How does computer virus work? The Basic Rule: A virus is inactive until the infected program is run or boot record is read. As the virus is activated, it loads into the computers memory where it can spread itself. Boot Infectors: If the boot code on the drive is infected, the virus will be loaded into memory on every startup. From memory, the boot virus can travel to every disk that is read and the infection spreads. Program Infectors: When an infected application is run, the virus activates and is loaded into memory. While the virus is in memory, any program file subsequently run becomes infected.

11 Analyze three common viruses CIH Type: Resident, EXE-files Origin: Taiwan History: The CIH virus was first located in Taiwan in early June After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. Infects Windows 95 and 98 EXE files, but it does not work under Windows NT. After an infected EXE is executed, the virus will stay in memory and will infect other programs as they are accessed.

12 Analyze three common viruses Macro Virus What is Macro virus A type of computer virus that is encoded as a macro embedded in a document. According to some estimates, 75% of all viruses today are macro viruses. Once a macro virus gets onto your machine, it can embed itself in all future documents you create with the application. In many cases macro viruses cause no damage to data; but in some cases malicious macros have been written that can damage your work. The first macro virus was discovered in the summer of Since that time, other macro viruses have appeared.

13 Analyze three common viruses Macro Virus How does it spread? When you share the file with another user, the attached macro or script goes with the file. Most macro viruses are designed to run, or attack, when you first open the file. If the file is opened into its related application, the macro virus is executed and infect other documents. The infection process of the macro virus can be triggered by opening a Microsoft Office document or even Office Application itself, like Word, Excel. The virus can attempt to avoid detection by changing or disabling the built-in macro warnings, or by removing menu commands

14 Analyze three common viruses I LOVE YOU VBS/LoveLetter is a VBScript worm. It spreads through e- mail as a chain letter. This worm sends itself to addresses in the Microsoft Outlook address book and also spreads to Internet chatrooms. This worm overwrites files on local and remote drives, including files with the extensions.html,.c,.bat,.mp3 etc.

15 Antivirus Technologies How to detect virus? How to clean virus? Best Practices

16 Antivirus technology How to detect virus? Some Symptoms Program takes longer to load. The program size keeps changing. The drive light keeps flashing when you are not doing anything. User created files have strange names. The computer doesn't remember CMOS settings.

17 Antivirus technology How to detect virus? Use Antivirus Software to scan the computer memory and disks. A memory-resident anti-virus software can be used to continuously monitor the computer for viruses. Scan your hard disk with an anti-virus software. You should make sure that an up-to-date virus definition data have been applied. Use server-based anti-virus software to protect your network.

18 Antivirus Technology How to clean virus? All activities on infected machine should be stopped and it should be detached from the network. Recover from backup is the most secure and effective way to recover the system and files. In some cases, you may recover the boot sector, partition table and even the BIOS data using the emergency recovery disk. In case you do not have the latest backup of your files, you may try to remove the virus using anti-virus software.

19 Antivirus Technology How to clean virus? The steps to reinstall the whole system – 1.Reboot the PC using a clean startup disk. 2.Type in MBR to rewrite the Master Boot Record. 3.Format DOS partitions. 4.Reinstall Windows XP or other os and other applications. 5.Install Antivirus Software and apply the latest virus definition data.

20 Antivirus Technology Best Practices Regular Backup Backup your programs and data regularly. Recover from backup is the most secure way to restore the files after a virus attack. Install Anti-virus Software Install an anti-virus software to protect your machine and make sure that an up-to-date virus definition file has been applied. Daily Virus Scan Schedule a daily scan to check for viruses. The schedule scan could be done in non-peak hours, such as during the lunch- break or after office hour. Check Downloaded Files And Attachments Do not execute any downloads and attachment unless you are sure what it will do

21 Conclusion Be careful when use new software and files Be alert for virus activities Be calm when virus attacks

22 Thank You