Presentation is loading. Please wait.

Presentation is loading. Please wait.

BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​

Similar presentations


Presentation on theme: "BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​"— Presentation transcript:

1 BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​ ~

2 Type of Computer Viruses

3 What is a computer virus? Exist over the past few years There are over 10,000 known computer viruses Over 200 new viruses are being discovered every month hidden program, which invades your computer Has the potential to cause damage and/or perform ​ unwanted/unauthorized functions.

4 How does a virus work? A computer virus performs two basic functions – It copies itself from machine to machine (self reproducing) – It executes the instructions the perpetrator has planned.

5 A computer virus exhibits three characteristics: a replication mechanism an activation mechanism an objective

6 What damage can a virus do? computer virus can cause unwanted alteration computer virus can loss of data annoy the user destroy all your data files your machine can even be rendered unusable

7 How do they spread? Viruses are usually spread by media/programs swapped.

8 Kind of viruses Encrypted Viruses : most difficult kind of bug to detect and the most difficult to stop Secret Viruses : make changes to files on your computer, or completely replace files Time Delay Viruses The Anti-Virus Virus The Multi-Headed Virus

9 Kind of viruses (continue) The Misdirection Virus A Cloning Virus The Author Virus The Bad Penny Virus Rewriting Virus The Melissa Virus End Type of Viruses

10 How to Know if Your Computer is Infected with a Virus

11 Viruses in USB Flash or Drive

12 Show file hid from USB Flash To unhide file in USB Flash Run=> cmd.exe F: or G: (Drive USB Flash) : => hit Enter F:> attrib -s -h /s /d *.* => hit Enter

13 Show file hid from USB Flash

14 Attack Techniques

15 What is attack ? In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an assetcomputercomputer networks

16 Unauthorized Access Attack Spoofing Hopping DoS DDoS Spam Mail Malicious Code Cross Site Scripting Attack

17 Spoofing Typical example Use of other people’s user IDs/passwords without permission

18

19 Dos Attack

20

21

22

23

24

25

26

27 Attack Cross Site Scripting Attack

28 Resource : http://en.wikipedia.org http://www.secudemy.com http://www.google.com Chapter03-Unauthorized.Access.Method

29 Q & A

30 Thank You For Listening And Join This Event !.. Good Luck !


Download ppt "BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​"

Similar presentations


Ads by Google