Download presentation
Presentation is loading. Please wait.
1
Computer Viruses
2
History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus
3
Historical Viruses Brain VirDem Lehigh Chameleon – Polymorphic DAME VCL
4
More History CDs make removal difficult Macro viruses Remote control becomes prevalent Spread via email Downloading and file sharing
5
Virus Types and Descriptors Resident Direct Action Overwrite Boot Sector Macro Directory Encrypted
6
More Viruses Polymorphic Multipartite File Infector Companion FAT XSSV Sentinel
7
Even More Viruses Stealth Armored Sparse Infector Fast and Slow Infector Worms Trojan Horses Logic Bombs Hoaxes
8
Anti-Virus Searches for known viruses Requirements –Bit-level work –Good error handling –Fast, dynamic life cycle Also identifies suspicious behavior Scans incoming and outgoing behavior
9
Prevention and Aid Techniques –Deletion –Quarantine –Repair Polymorphic viruses make detection via dictionary difficult Suspicious behavior’s advantages Sandboxes and Blueprints
10
Other Methods Education Email filtering User knowledge
11
Spyware Definition Symptoms Methods of infection Results –Phone home –Remote access Zombie attacks
12
Spyware Rootkit –Sony Prevention –Anti-spyware programs Not always the most effective –Safe internet practices
13
Survey We surveyed 40 people on the Pace University Campus We asked questions related to demographic information and regarding virus preparedness
14
Male vs. Female
15
Preparedness
16
Conclusion Viruses and Spyware pose an increasing threat Prevention methods do not include software alone Many methods which are common knowledge to those familiar with computers are not common practice
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.