Computer Viruses Author: Alyse Allen.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
For any query mail to or BITS Pilani Lecture # 1.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Security Architecture of Windows
Chapter Objectives In this chapter, you will learn:
Viruses & Destructive Programs
Tonga Institute of Higher Education IT 141: Information Systems
Lecture 8. Cyber Security, Ethics and Trust
COMPUTER VIRUSES Computer Technology.
SEMINAR ON PC SECURITY FROM VIRUSES
computer virus infection & symptoms
Basic Computer Maintenance
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
Securing your system, protecting your digital data and devices.
Technology Mrs. Huddleston
Malicious Program and Protection
Presentation transcript:

Computer Viruses Author: Alyse Allen

Computer Virus Very common Millions of different ones exist A computer program that can replicate itself and spread from one computer to another causing harm

Three Different Types Macro Viruses Stealth Viruses Polymorphic Viruses

Macro Viruses

Macro Symbol, name, key, etc. that represents a list of commands, actions, or keystrokes Can be very useful

Example If you type a lot of letters Set up a macro that defines all the keystrokes necessary to begin your letter Name, address, etc. Press the assigned key/keys and your letterhead appears Like batch files

Macro Virus Computer virus Usually infects a Microsoft Word document or spreadsheet Causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Most of the time it is relatively harmless

Macro Virus Written in a language that is built into the software application Replaces normal macro commands with the virus

How? Virus replaces the regular commands with the same name and runs when the command is selected. If the infected macro is auto-executable, the macro is opened and the virus executed without the user’s knowledge

How is Macro Viruses spread? Often through emails Discs Networks Modems Internet **HARD TO DETECT**

Macro Virus More easily spread Depends on the application, not the operating system Can infect computers running all different operating systems Some of these viruses can be detected through antivirus software but not all.

Melissa Virus Found March 26, 1999 Not originally designed for harm Overloaded servers and mail systems were shut down Written by David L. Smith He named the virus after a stripper he met Virus was embedded into a word document entitled list.doc Sent out as an email

What did Melissa do? Once opened, the macro virus would run and attempt to mass mail itself Collected the first 50 address book entries and forwarded the email to them with the list.doc attached Subject line of the email read: “Important message from [name]” Body read: “Here is that document you asked for…don’t show anyone else ;-)”

Stealth Viruses

Stealth Virus Virus that hides from antivirus software by: a. masking the size of the file that it hides in b. temporarily removing itself from the infected file and placing a copy of itself in another location on the drive, and replacing the infected file with an uninfected one that it has stored on the hard drive.

How a stealth virus works Fools the antivirus software by catching its requests to the operating system to open a file. The virus can then provide (open) a clean version of the file to the antivirus software The antivirus software is tricked and the virus won!

Frodo Virus Infected file is executed Virus becomes a memory resident Infects any file accessed by the user with the .com or .exe extension On Sept. 22, it attempts to place a Trojan on boot sectors Trojan displays the message “FRODO LIVES” Frodo is a Lord of the Rings character whose birthday is September 22nd.

Polymorphic Viruses

Polymorphic Virus One of the more complex computer viruses Virus that changes its virus signature (binary pattern) every time it replicates and infects a new file in order to keep from being detected by an antivirus software

Effective Polymorphic Virus A coder chooses from a number of different encryption schemes that require different methods of decryption Only one scheme will remain visible in all instances of the infection. If virus scanner is based on string-driven detection, many different strings would have to be detected (one for each probable decryption scheme).

Most complex form AKA: Big Brother of all polymorphic viruses Relies on its Mutation Engine – type of object module Mutation Engine allows ANY virus to reach a polymorphic state by implementing specific codes to the program source code and linking modules able to generate random numbers

Polymorphic Viruses Very harmful Can completely corrupt your system Can go undetected for months

Tequila 1991 First widespread polymorphic virus found Polluted local executable files When users ran infected program(s): a. appended itself to the hard disk’s file storage area b. altered Partition data c. modified the Master Boot Record to “point” to itself

How the infected computers suffered Had File Allocation Table errors Terminal data loss

How do you protect your PC from viruses?

The answer is VERY simple…

Convert to a MAC

Take precautions to secure it Make sure your operating system is up-to-date by: a. installing the latest patches and b. service updates Use antivirus protection Use a firewall Lock down your wireless internet

References http://en.wikipedia.org/wiki/Computer_virus http://searchsecurity.techtarget.com/definiti on/macro-virus http://www.webopedia.com/TERM/M/macro_ virus.html http://www.cert.org/advisories/CA-1999- 04.html http://searchsecurity.techtarget.com/definiti on/Melissa-virus

References http://www.essortment.com/computer-tips- 5-common-types-virus-28878.html http://virus.wikia.com/wiki/Frodo http://www.spamlaws.com/polymorphic- virus.html http://vx.netlux.org/lib/static/vdat/polyevol. htm http://www.infoplease.com/ipa/A0872842.ht ml