Download presentation
Presentation is loading. Please wait.
Published byKerrie Flynn Modified over 9 years ago
1
BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : D1 ~ ~
2
Type of Computer Viruses
3
What is a computer virus? Exist over the past few years There are over 10,000 known computer viruses Over 200 new viruses are being discovered every month hidden program, which invades your computer Has the potential to cause damage and/or perform unwanted/unauthorized functions.
4
How does a virus work? A computer virus performs two basic functions – It copies itself from machine to machine (self reproducing) – It executes the instructions the perpetrator has planned.
5
A computer virus exhibits three characteristics: a replication mechanism an activation mechanism an objective
6
What damage can a virus do? computer virus can cause unwanted alteration computer virus can loss of data annoy the user destroy all your data files your machine can even be rendered unusable
7
How do they spread? Viruses are usually spread by media/programs swapped.
8
Kind of viruses Encrypted Viruses : most difficult kind of bug to detect and the most difficult to stop Secret Viruses : make changes to files on your computer, or completely replace files Time Delay Viruses The Anti-Virus Virus The Multi-Headed Virus
9
Kind of viruses (continue) The Misdirection Virus A Cloning Virus The Author Virus The Bad Penny Virus Rewriting Virus The Melissa Virus End Type of Viruses
10
How to Know if Your Computer is Infected with a Virus
11
Viruses in USB Flash or Drive
12
Show file hid from USB Flash To unhide file in USB Flash Run=> cmd.exe F: or G: (Drive USB Flash) : => hit Enter F:> attrib -s -h /s /d *.* => hit Enter
13
Show file hid from USB Flash
14
Attack Techniques
15
What is attack ? In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an assetcomputercomputer networks
16
Unauthorized Access Attack Spoofing Hopping DoS DDoS Spam Mail Malicious Code Cross Site Scripting Attack
17
Spoofing Typical example Use of other people’s user IDs/passwords without permission
19
Dos Attack
27
Attack Cross Site Scripting Attack
28
Resource : http://en.wikipedia.org http://www.secudemy.com http://www.google.com Chapter03-Unauthorized.Access.Method
29
Q & A
30
Thank You For Listening And Join This Event !.. Good Luck !
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.