SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Worms & Viruses ERICA SANTIAGO ASHLEY GUY DAVID HOLLAND ASHLEY WHITE JESSICA PUETTNER ERICA SANTIAGO ASHLEY GUY DAVID HOLLAND ASHLEY WHITE JESSICA.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
What is it, how does it work, and why is it important?
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Everything you wanted to know about Computer Viruses.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Course ILT Routine maintenance Unit objectives Discuss the necessity of applying software patches and fixes Discuss viruses and anti-virus strategy.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
SYSTEM SECURITY & ANTIVIRUS Chapter Dr. BALAMURUGAN MUTHURAMAN.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Viruses Author: Alyse Allen.
computer virus infection & symptoms
Computer Worms & Viruses
Computer Worms & Viruses
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN

The meaning of the term computer security has evolved in recent years. Before the problem of data security became widely publicized in the media, most people’s idea of computer security focused on the physical machine. Traditionally, computer facilities have been physically protected for three reasons.  To prevent theft of or damage to the hardware  To prevent theft of or damage to the information  To prevent disruption of service M EANING OF C OMPUTER SECURITY 2Dr. BALAMURUGAN MUTHURAMAN

VIRUS A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically computer damage. 3Dr. BALAMURUGAN MUTHURAMAN

The term comes from biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer’s memory, storage, or over a network. Similar to the way a biological virus would work. The very first virus to be created outside the single computer or lab was the program called "Elk Cloner.” It was written by Rich Skrenta in The virus attached itself to the Apple DOS 3.3 operating system and spread through floppy disk. The virus was originally a joke, created by a high school student and put onto a game. The 50 th time someone played the game, the virus would be released. So instead of playing the game, the user saw a blank screen that read a poem about the virus named Elk Cloner. 4Dr. BALAMURUGAN MUTHURAMAN

A VIRUS SPREAD First a programmer writes the virus most often being attached to a normal program; unknown to the user, the virus spreads to other software. Then the virus is passed by disk or network to other users who use other computers. The virus then remains hidden as it is passed on. 5Dr. BALAMURUGAN MUTHURAMAN

TYPES OF VIRUSES The way viruses are usually categorized is by what they do.  The boot virus which infects the boot sector of disk storage  The program virus which infects the executable programs  The multipartite virus which is a combination of the boot and program virus  The stealth virus which is able avoid detection by a variety of means such as removing itself from the system registry, or hidden as a system file  The parasitic virus which inserts itself into another file or program such that the original file is still workable  The polymorphic virus which changes its code structure to avoid detection and removal  The macro virus which exploits the macro language of a program like Microsoft Word or Excel. 6Dr. BALAMURUGAN MUTHURAMAN

TO PROTECT THE SYSTEM Run a more secure operating system like UNIX, another computer operating system in which you never hear about viruses on these operating systems because the of the security features If you are using an unsecured operating system, you can buy virus protection software like McAfee or Norton AntiVirus To help avoid viruses, it is very important that your computer is current with the latest update and antivirus tools, try to stay informed with recent threats about viruses and that you be careful when surfing the Internet, downloading files and opening attachments 7Dr. BALAMURUGAN MUTHURAMAN

WORMS Worms have been around since A computer worm is very similar to that of a normal computer virus. Unlike a virus though, the worm is a program that can copy itself across a network and it can run on itself. A worm also has a unique feature in the sense it does not have to host program in order to run. A worm works by copying itself into nodes or network terminals which does not require any intervention from the user itself. Worms began to take off in the late ‘90s and early 2000’s. These modern worms ran themselves through the internet and many file sharing programs such as KaZaa, a music file-sharing program. 8Dr. BALAMURUGAN MUTHURAMAN

TYPES OF WORMS The “ Worm” – The worm spreads itself through – The worm can hide itself in messages as a link or an attachment that will redirect the user to an infected website. – Many users become losses to this particular worm due to their weakness and willingness to read and open messages that they think could be interesting. The Instant Messaging Worm – This worm masks itself in the form of an “IM” with the contents of a link that will redirect the user to an infected website and then try to gain full access of the machine. 9Dr. BALAMURUGAN MUTHURAMAN

PROTECT YOURSELVES Even though it seems impossible to not catch a worm, it is not. One of the best things a computer owner can do is install and run anti-virus software, especially the kind that updates automatically. Anti-virus software will notify the user when a virus or worm is found and prevent it from running and/or copying itself. Other precautions to protect in worm  Choosing secure passwords and changing them regularly  Not opening unfamiliar s or attachments and most importantly not running or copying software from an unsecured website. 10Dr. BALAMURUGAN MUTHURAMAN

VIRUSES VS WORMS 1.Spreads from program to program, or from disk to disk 2.Uses each infected program or disk to make copies of itself 3.Computer damage 4.Destroys data or erases disks 5.Operating system specific 1. Uses computer hosts to reproduce themselves 2. Travel independently over computer networks 3. Software sabotage 4. Resides in memory rather on disk 5. Puts computers at a standstill 11Dr. BALAMURUGAN MUTHURAMAN

ANTIVIRUS SOFTWARE Computer programs intended to identify and eliminate computer viruses. 12Dr. BALAMURUGAN MUTHURAMAN

ANTIVIRUS SOFTWARE: HOW IT WORKS “Antivirus software is the equivalent to penicillin of the computer world.” Like penicillin, antivirus applications act as a protector over your system, scanning incoming files and applications, “quarantining” or cleaning up unwanted viruses looking to cause harm to your system. Antivirus software is considered to be an aid that detects, fixes and even prevents viruses and worms from spreading to your computer as well as connecting computers. 13Dr. BALAMURUGAN MUTHURAMAN

DRAWBACKS OF ANTIVIRUS SOFTWARE  Some antivirus software can considerably reduce performance.  There should not be more than one antivirus software installed on a single computer at any given time.  It is sometimes necessary to temporarily disable virus protection when installing major updates.  Some argue that antivirus software often delivers more pain than value to end users. 14Dr. BALAMURUGAN MUTHURAMAN

TWO MAIN TYPES OF ANTIVIRUS There are different types of antivirus software for different computers. Some are designed for personal computers. Some are for servers and others for enterprises. There are mainly two types of antivirus software are Specific Scanning and Generic Scanning 15Dr. BALAMURUGAN MUTHURAMAN

SPECIFIC SCANNING Specific scanning also called signature detection The application scans files to look for known viruses matching definitions in a “virus dictionary” then it takes necessary action The specific scanning is not always reliable because virus authors are creating new ways of masking their viruses so the antivirus software does not match the virus signature to the virus dictionary. 16Dr. BALAMURUGAN MUTHURAMAN

GENERIC SCANNING Generic scanning is also referred to as the suspicious behavior approach. Generic Scanning is used when new viruses appear. In this method the software does not look for a specific signature but instead monitors the behavior of all applications. If anything questionable is found by the software the application is quarantined and a warning is broadcasted to the user about what the program may be trying to do. 17Dr. BALAMURUGAN MUTHURAMAN

Computer viruses and worms can so easily be placed into your work station and you must be careful when going on the internet, opening s from unknown users, make sure you have some kind of anti-virus software and always get updates then only you are not helping to spread viruses and worms to other people as well as harming yourself and your pocket. 18Dr. BALAMURUGAN MUTHURAMAN