Detected by, M.Nitin kumar (0701204138) Sagar kumar sahu (0701204150)

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Viruses and Worms By: Olga Bibas. Malicious Programs are perhaps the most sophisticated threats to computer systems. These threats can be divided into.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Everything you wanted to know about Computer Viruses.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
 Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus to spread  Virus show us.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Computer Viruses Author: Alyse Allen.
SEMINAR ON PC SECURITY FROM VIRUSES
Viruses and Other Malicious Content
computer virus infection & symptoms
Computer Technology Notes 5
Computer Viruses.
VIRUSES and DESTRUCTIVE PROGRAMS
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )

 A biological virus is not living.  It’s a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself -- it is not alive.  Computer viruses also can not reproduce by themselves  Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host.

 The first virus was made by Farooq alvi brothers of pakistan.  The virus was named dubbed brain©.  It was a boot sector virus.  Due to the spreading of use of personal computers,virus started spreading from different systems.

A typical virus goes through following stages:  1. Dormant phase :these remian in dormant state i.e. they get activated by some event.  2. Propagation phase: The virus places an identical copy of itself into other programs or into certain system areas on the disk.  3. Triggering phase: The virus is activated to perform the function for which it was intended  4. Execution phase: The function may be harmless, such as a message on the screen, or damaging, such as the destruction of programs and data files.

Parasitic virus : It attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.  Memory-resident virus : Lodges in main memory as part of a resident system program.  Boot sector virus : Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.  Stealth virus : A form of virus explicitly designed to hide itself from detection by antivirus software.  Polymorphic virus: A virus that mutates with every infection, making detection by the “signature” of the virus impossible.

 1. Boot virus : The boot virus affects the booting process of the infected computer system thus causing slow start and shut down process.  2. DOS virus : This virus affects the disk operating system of the infected computer system.  3. Windows virus :Due to windows virus following problems are encountered in the infected computer system:. * Unusual entries in the Task Manager list * Unusual slowdown of system. * Increase in file size of infected files

4. Macro virus : Macro viruses take advantage of a feature found in office application, such as Microsoft Excel or Microsoft Word. This feature is the macro. 5. Script virus: These malicious scripts utilize scripting host execution capabilities of browsers and mail systems. These viruses are scripted in the web scripts. 6. Java virus: These virus codes are written in java programming language. These have the extension as (*.class).There are two types of java viruses: * Java Applet * Java Application 7. Palm virus: These viruses include the Trojans and download from internet to the computer systems.

A virus runs first when a legitimate program is executed. The virus loads itself into memory and looks to see if it can find any other programs on the disk. If it can find one, it modifies it to add the virus's code to the new program. Then the virus launches the "real program."The user has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time either of those programs gets executed, they infect other programs, and the cycle continues

1. Don’t open files that you are not expecting 2. Suspect messages that appear more than once in your Inbox 3. Learn file extensions 4. Anti-virus installation Advanced Antivirus Techniques: 1. Generic Decryption Digital Immune System.

1.  Discovered on: September 18, 2001  is a new mass-mailing worm that utilizes to propagate itself. The threat arrives as readme.exe in an . It is a virus infecting both local files and files on remote network shares.  Type: Worm.  Nimda is the first worm to modify existing web sites to start offering infected files for download. Also it is the first worm to use normal end user machines to scan for vulnerable web sites.

2. Melissa:  Discovery Date: 3/26/1999  Origin: Newsgroup Posting  Length: varies depending on variant  Type: Macro/Worm  Subtype: Macro  Risk Assessment: High  Category: Companion.

3. Bubble boy :  Discovery Date: 11/8/1999  Origin: Argentina (?)  Type: Worm/Macro  Subtype: VbScript  Risk Assessment: Low  Category: Stealth/Companion.

4. Back Orifice:  Discovery Date: 10/15/1998  Origin: Pro-hacker Website  Length: 124,928  Type: Trojan  Subtype: Remote Access  Risk Assessment: Low  Category: Stealth.

RESOURCES:  1. how computer viruses work  2.  3.