Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The History and Details of Computer Viruses With Chuck Easttom
D. Beecroft Fremont High School VIRUSES.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
computer Viruses Ever MAde To Protect What Matters
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Everything you wanted to know about Computer Viruses.
Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Computer Viruses By Aidan Leitch and Eli Miloff. Background Info The first virus on the PC was created in Pakistan in 1986 by the Farooq Alvi brothers.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Md nurullah rumi Tushar md jubaer hossen Id: Id:
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Evolution of Computer Viruses
Computer Virus’s.
COMPUTER VIRUSES Computer Technology.
By Quentin Lively Notorious Viruses.
Chapter 12: Social Implications of IT
Computer Technology Notes 5
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Evolution of Computer Viruses A Technical Presentation by: Logan Kallop

What to Expect What is a computer virus? What are some types of computer viruses? Famous examples of computer viruses Record setting viruses Modern day viruses

What is a Computer Virus? A program inserted into a computer system to perform some sort of malicious purpose. Some have no purpose besides to spread and self replicate. As of April 2012, Symantec security company had upwards of 18 million Virus Definitions

Different Types of “Viruses” Malware is the proper definition of a computer virus Adware, Spyware, Worms, Ransomware, Trojan Horses, Keyloggers, Rootkits BHO-Browser Helper Object Download.ject

Polymorphic Code Virus infects files with an encrypted copy of itself Virus then decoded with a decryption module Each time the virus replicates, it gains a new encryption and decryption module Virus scanners had a hard time detecting these viruses due to their ever changing state

First “Computer Virus” John von Neumann Theory of self-reproducing automata His design for a self-reproducing computer program is considered the worlds first computer virus

The Creeper Virus Written by Bob Thomas in 1971 Infected DEC PDP-10 computers running the TENEX operating system Gained access via the ARPANET Virus displayed message “I’m the creeper, catch me if you can!” The Reaper program was created later to delete Creeper.

Elk Cloner Created by Richard Skrenta in 1981 Written for Apple II systems First large-scale computer virus outbreak in history Intended as a prank at first

Source: Google Images

Jerusalem Virus First detected in Jerusalem 1987 Believed to have been made in Italy Affected the DOS operating systen Infects.EXE and.COM files On every instance of Friday the 13 th, deletes every program file that was executed Many different versions exist, became obsolete due to Windows

Michelangelo Virus First discovered in February 1991 in Australia Designed to infect DOS systems, operate at the BIOS level Virus was dormant until March 6, moved all hard disk data so it was unobtainable

Happy99 Written by French virus programmer “Spanska” First appeared mid-January 1999 Spread through s, Winsock Automatically attaches to all send s after infection Besides spreading and advertising itself, no real damage to computer One of the most commonly reported viruses in 1999

Source: Google images

ILOVEYOU worm Created by two Filipino computer programmers May 5 th 2000 Attacked tens of millions of Windows PC’s Programmed in Visual Basic Script Spread via Estimated $ Billion in damages worldwide Considered one of the most damaging worms ever

Anna Kournikova virus Created by Dutch programmer Jan de Wit in 2001 Similar to the ILOVEYOU virus, spread through Created by a Visual Basic Worm Generator David L. Smith identified de Wit as who was responsible for the virus Minimal damage

SQL Slammer worm Fastest spreading worm of all time Wasn’t programmed in SQL at all Infected Microsoft SQL servers Crashed so many servers, routers, and databases that it slowed down the internet as a whole Worm was only 376 bytes, fit inside a single packet

Mydoom Computer worm affecting Windows systems First sited in January 2004 Fastest spreading worm ever, exceeding records set by Sobig worm and ILOVEYOU Original purpose was to DDOS against SCO group Later versions attacked Microsoft sites as well as Google

Flame Discovered in 2012, espionage malware Has the ability to record audio, Skype conversations, screenshots, keyboard activity, network traffic, and convert the host computer to a Bluetooth beacon and download contact information from Bluetooth enabled devices Targets Middle Easters countries, has been detected elsewhere

Old vs. New computer viruses Hackers and malicious programmers had changing goals for their programs as time went on Early viruses were designed to be detected, often with some flashy message or image More for the fun of it, not for a malicious purpose Modern viruses are designed to be hidden and cause as much damage as possible

Conclusion Defined computer virus Examples of famous viruses Some languages used to create viruses Commonly infected machines Old vs. New virus objectives

References Wikipedia.com Viruslist.com Virus.wikia.com Google Images Symantec