Download presentation
Presentation is loading. Please wait.
Published byMartin Patterson Modified over 9 years ago
1
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work
2
Introduction Downloading files exposes you to viruses Written for specific types of computers Programs that Delete data Erase programs Wipe hard drives Install spyware Display messages
3
Introduction Get viruses from Downloaded files & programs Email Commercial products Web sites Viruses Infect your computer Replicate themselves Distribute themselves Inflict damage
4
Introduction Attack four parts of your computer Executable programs File directory system Boot & system areas Data Two major types Trojan horses Worms
5
Introduction Trojan horse Appears to be something else Worm Designed to infect networks Robert Morris Melissa
6
Robert Tappan Morris Released in 1988 Grad student at Cornell 1 st computer worm on Internet Intended to gauge the size of the Internet Design flaw caused it to replicate too much Infected thousands of computers $10 - 100 million in damages estimated
7
Robert Tappan Morris 1989 – Indicted under the Computer Fraud and Abuse Act 1 st person 1990 – Convicted Three years probation 400 hours community service $10,050 fine Tenured professor at MIT
8
Melissa David L. Smith Released March 1999 Aberdeen Township, NJ Posted an infected document to alt.sex Usenet newsgroup Passwords to 80 Internet porn sites Named after a lap dancer he knew in Florida
9
Melissa Spread via email Forwards itself to 1 st 50 addresses in Outlook Inserted Simpsons references into documents Cost more than $80,000,000 in damages Microsoft, Intel, Lockheed-Martin shut down Originally sentenced to 10 years Served 20 months, $5,000 fine Worked for FBI
10
Examining FAT Disks Allocate 1 cluster (8 sectors) Record data Write End-of-File marker …… Data Slack Cluster (an indivisible unit) Allocated to a file Unallocated
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.