Download presentation
1
ANITVIRUSES TECHNIQUES
COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES 1
2
SEQUENCE OF PRESENTATION * WHAT IS COMPUTER VIRUS ?
4
3
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * VIRUS (ROGUE SOFTWARE) I 2
4
SEQUENCE OF PRESENTATION * WHO ARE ROGUE PROGRAMMERS ?
COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ? 3
5
SEQUENCE OF PRESENTATION * TYPES OF COMPUTER VIRUS
5
6
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * WHAT ALL CAN THEY DO ? 6
7
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * HOW DO THEY INFECT ? 7
8
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * HOW NOTICE ? V I S R U 8
9
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * WHAT TO DO ? NO ! VIRUS 9
10
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * LAST WORD 10
11
SEQUENCE OF PRESENTATION
COMPUTER VIRUS * CONCLUSION 11
13
“ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY
WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ” 12
14
WHAT IS COMPUTER VIRUS ? * BE A SET OF COMPUTER INSTRUCTIONS
* BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS 13
15
COMPUTER COMPONENTS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE
COMPUTER VIRUS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE 1
16
ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION
* THE TROJAN HORSE - APPEARS TO BE USEFUL * WORMS - TRAVEL IN NETWORK * REPLICATORS - COPY ITSELF TO EXHAUST DISK * CHAMELEONS - M ISCHIEF
17
ROGUE SOFTWARE * TIME BOMBS - EXPLODE ON TIME / DATE * LOGIC BOMBS - EXPLODE ON LOGIC * SOFTWARE BOMBS - EXPLODE ON LAUNCH
18
WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * PSYCHO CASES - FOR FUN - RELEASE ANGER - TAKE REVENGE 2
19
WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET
20
WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK
21
TYPES OF COMPUTER VIRUS
* BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT 3
22
WHAT CAN THEY DO ? FORMAT DISK COPY, RENAME AND DELETE FILES
COMPUTER VIRUS FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES 4
23
HOW DO THEY DO ? APPENDING INSERTION INTERCEPTION REDIRECTION
COMPUTER VIRUS APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT 5
24
HOW DO YOU NOTICE ? COMPUTER VIRUS 6
25
HOW DO YOU NOTICE ? COMPUTER OPERATION BECOMES SLUGGISH
COMPUTER VIRUS COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES
26
HOW DO YOU NOTICE ? PROGRAMS ENCOUNTER ERRORS
COMPUTER VIRUS PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR 7
27
WHAT TO DO ? ANTI VIRUS TECHNIQUES
28
WHAT TO DO ? SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS
COMPUTER ANTI VIRUS SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH 8
29
SAFE COMPUTING METHODS
WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS * YOU MUST - BOOT FROM FLOPPY DISK - DISCOURAGE PIRATED SOFTWARE - TAKE BACKUP 9
30
SAFE COMPUTING METHODS
WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS YOU MAY USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS 10
31
WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS
COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION SLOW SPEED UNNECESSARY INTERRUPTS CAN BE INFECTED BY VIRUS HEAVY ON RAM 11
32
WHAT TO DO ? DETECTION SYSTEMS ANTIVIRUS SOFTWARE SYSTEMS
COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS DETECTION SYSTEMS LOAD, RUN AND EXIT CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC 12
33
FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS
WHAT TO DO ? SOME ANTIVIRUS SOFTWARE COMPUTER ANTI VIRUS VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS
34
WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS 14
35
Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS
SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE 17
36
THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY 19
37
CONCLUSION “LEARN TO LIVE WITH IT”
SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION 20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.