Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
VIRUSES and DESTRUCTIVE PROGRAMS
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Computer Virus’s.
Computer Viruses Standard A-4 (Safety Unit)
Intro to Malware Attacks
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
Chap 10 Malicious Software.
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Presentation transcript:

Virus Infections By: Lindsay Bowser

Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b viruses Melissa VirusMelissa Virus ILOVEYOU VirusILOVEYOU Virus b What is a “worm”? Code RedCode Red b How to protect yourself

What is a “virus”? b A computer virus shares some of the same traits as a biological virus. b A computer virus must piggyback on top of some other program or document in order to be executed. b Once executed, it is then able to infect other programs or documents.

History of a virus b Traditional viruses were first widely seen in the late 1980’s. b The spread of personal computers was a large contributor. Prior to the 1980’s, home computers were nearly non-existent. b During the 1980’s, real computers started to spread to businesses and homes because of the popularity of the IBM PC (1982) and the Apple Macintosh (1984). b Another factor in the creation of viruses was the use of bulletin boards. Downloading games was popular.

History cont... b Bulletin boards led to the precursor of viruses known as the Trojan Horse. b When the Trojan Horse is downloaded, and you run it, it will wipe out your whole system. b Trojan Horses didn’t affect many people because they were discovered quickly.

Types of Infections b Viruses- small piece of software that piggybacks on real programs. Self- reproducing. b viruses- moves around an message and usually replicates itself by automatically mailing itself to dozens of people in the victim’s address book.

Infections cont... b Worms- small piece of software that uses computer networks and security holes to replicate itself. b Trojan Horses- simply a computer program that claims to do one thing, but instead does damage when you run it. They have no way to replicate automatically.

How they spread b Early viruses were pieces of code attached to a common program, such as a game. b The virus loads itself into memory and looks around to see if it can find any other viruses on the hard drive. b If it can find one, it adds to the virus’s code and then the virus launches the “real” program. b The user really has no idea that the virus even ran. b Unfortunately, the virus has now reproduced itself.

How they spread cont... b Now any time one of the programs gets executed, they infect more programs and the cycle continues. b If one of the infected programs is given to another person on a floppy disk or uploaded to a bulletin board, then the other programs get infected and this is how it spreads. b The spreading part is the infection phase of the virus. b The destructive part is the attack phase of the virus. Printing a silly messagePrinting a silly message Erasing all of your dataErasing all of your data

Viruses b The Melissa Virus (1999) spread in word documents sent via . b It was uploaded to an Internet newsgroup. b Anyone who downloaded the document and opened it would trigger the virus. b The virus would then send itself in an to the first 50 people in the person’s address book. b The message contained a friendly note with the person’s name so that the recipient would open the document thinking it was harmless.

viruses cont... b The virus would then create 50 new messages from the recipient’s machine and the cycle would continue. b The Melissa virus was one of the fastest- spreading viruses ever seen. b The ILOVEYOU virus (2000), was much simpler than the Melissa. It simply contained a piece of code as an attachment. b Once the attachment was double clicked, it allowed the code to execute. b It then sent copies of itself to everyone in the victim’s address book and then corrupted files on the machine.

What is a “worm”? b A worm is a computer program that has the ability to copy itself from machine to machine. b They usually move around and infect other machines through computer networks. b A worm usually exploits some sort of security hole in a piece of software or the operating system.

Code Red b Code Red (2001) was a worm that experts once thought this worm would clog the Internet so effectively that things would completely stop. b The Code Red worm slowed down internet traffic when it began to replicate itself. b Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that do not have the Microsoft security patch installed. b Each time it found one, it copied itself to that server. b It then scanned for other servers to infect.

Code Red cont... b The Code Red worm was designed to do 3 things: Replicate itself for the first 20 days of each month.Replicate itself for the first 20 days of each month. Replace web pages on infected servers with a page that declares “Hacked by Chinese”.Replace web pages on infected servers with a page that declares “Hacked by Chinese”. Launch a concerted attack on the White House web server in an attempt to overwhelm it.Launch a concerted attack on the White House web server in an attempt to overwhelm it. b Upon successful infection, the worm would wait for the appointed hour and connect to the White House domain.

Code Red cont... b The attack would consist of the infected systems simultaneously sending 100 connections to port 80 of the White House domain. b The U.S. government changed the IP address of in order to prevent that particular attack and issued a general warning about the worm advising users of Windows NT and Windows 2000 to make sure they had the security patch installed.

How to protect yourself b Make sure you have the latest security patches installed on your machine. b Buy virus protection software such as Norton or McAfee. b Avoid programs from unknown sources. b Disable “Floppy Disk Booting”. b Make sure that “Macro Virus Protection” is enabled in all Microsoft applications.

Questions??

Works Cited b How Stuff Works b CNN g/10/23/virus.works.idg/ g/10/23/virus.works.idg/