Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.

Similar presentations


Presentation on theme: "By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif."— Presentation transcript:

1 By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif

2 Virus and antivirus Attack types … What is the computer Virus. Type of virus. How the virus attack our computers. How to product our computers. Type of antivirus. How an Antivirus works. Virus and hacker attack. Type of attack.

3 What is the computer Virus  A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.

4 Type of virus.  Computer viruses are often classified according to diverse criteria. Viruses can be classified using multiple criteria: origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack etc.

5 Type of virus.  Resident  Multipartites  Direct Action  File infectors  Overwrite  Companion  Boot  FAT  Macro  Worms  Directory  Trojans  Encrypted  Logic Bombs  Polymorphic  False Viruses

6 How the virus attack our computers without antivirus  A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive

7 How to protect our computers  Do not open any program, even if the mail address of the consignee was a company that programs aimed at a person not entitled to be entitled the company,  Change your password, or even if your password always at least once every month and you always change when you write, and one friend even if you

8 How to protect our computers  Do not make the same password every your number and this is very important and make your numbers are different and do not constitute anything in your life and if they can not make your password a curious rule and easy for you an example) (ahm157abm) or to make the password contains a combination of numbers and characters

9 How to protect our computers  Do not tell any one about your password and do not forget to change it when it ends  When you send a file to make sure it does not end extension  exe  bat  com  vbs

10 How the virus attack our computers by antivirus  Antivirus Software :An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. We should regularly run an antivirus program to scan and remove any possible virus attacks from a computer

11 Type of antivirus.  McAfee Antivirus :McAfee Antivirus  AVG Antivirus :AVG Antivirus  Kaspersky Antivirus :Kaspersky Antivirus  AntiVir Antivirus :AntiVir Antivirus  BitDefender Antivirus :BitDefender Antivirus  NOD32 Antivirus :NOD32 Antivirus  Avast Antivirus :Avast Antivirus

12 How an Antivirus works  How an Antivirus works Using dictionary Approach: The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.

13 Virus and hacker attack  You have to know that there is a correlation between the hacker and virus because the hacker is the designer for Viruses and the virus is the instrument for implementing the goals of a hacker you have to know that any virus enter your computer is a process to penetrate your system, whether with intent to destroy or steal information

14 Type of attack  Email Spoofing:  In this method to send messages with a forged sender address, and use this method often to send messages it claims that the service provider and ask to enter your password or user, and the best solution is not to give any confidential information via e-mail no matter how persuasive the message

15 Type of attack  IP Spoofing:  Give this type of computer ip adress fake and it is difficult to identify the real address of a victim can also be used as the victim of this type of deception to give me the title of any news items fall within the knowledge of the network protected by a wall which a bullet with a fool to believe that the body is trying to penetration part of the internal network are allowed to enter and in the event that the settings provider identified in this way

16 Type of attack  Web Spoofing:  This was kind of deception is similar to the construction site of a popular site with a similar title, and also to deceive the visitors that this site is the destination site and took certain information, including viruses or promotion without doubt Visitor

17 Type of attack  Nuking:  Include the bombing of sending mail bombs and is a sending of very large amounts of e- mails to the address of e-mails the owner of a nuisance or disruption to his provider

18 References  http://en.wikipedia.org/wiki/Computer_insec urity http://en.wikipedia.org/wiki/Computer_insec urity  Biden's mottle virus Biden's mottle virus  Outbreak (novel) Outbreak (novel)

19


Download ppt "By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif."

Similar presentations


Ads by Google