Worms, Viruses and Other Creepy Computer Things:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Computer virus Done: Aaesha Mohammed ID: H
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
bitdefender virus protection
Chapter 40 Internet Security.
Managing Windows Security
What they are and how to protect against them
Tonga Institute of Higher Education IT 141: Information Systems
Three Things About Malware
Malware and Computer Maintenance
Computer Virus’s.
Intro to Malware Attacks
3.6 Fundamentals of cyber security
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
SEMINAR ON PC SECURITY FROM VIRUSES
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Technology Day 21
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Viruses.
HOW DO I KEEP MY COMPUTER SAFE?
Chap 10 Malicious Software.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Worms, Viruses and Other Creepy Computer Things: What you need to know Cabinet Retreat September 12, 2003

Overview Explaining viruses, worms, etc. Virus statistics Symptoms and Indicators WSU’s experience Security and protection strategies

What are these things? Virus Worm Trojan (horse) Hoaxes Denial of Service (DOS)

Computer programs that can spread across computers and networks by making copies of themselves, usually without the user’s knowledge. A virus program has to be run before it can infect your computer. Viruses have ways of making sure that this happens. They attach themselves to other programs or hide in code that is run automatically when you open certain kinds of files.

What can viruses do? (Payload) Display messages Play pranks Deny access Steal data Corrupt data Delete data Disable hardware

Worm A special kind of computer program that can replicate itself and consume computer memory, but it cannot attach itself to other programs. They create exact copies of themselves and use communications between computers (like email) to spread.

Trojan Horse Programs that do things that are not described in their specifications. The user runs what they think is a legitimate program, allowing it to carry out hidden, often harmful functions. For example a program that claims to fix the ‘millenium bug’ actually overwrites the hard disk. These programs are sometimes used to infect a computer with a virus. Backdoor Trojans are programs that allow other computer users to take control of your PC over the internet.

Hoaxes Hoaxes are not viruses but are deliberate or unintentional email messages warning people about a virus or other malicious software program. Some hoaxes cause as much trouble as viruses by sending massive amounts of unnecessary email. Hoaxes may: Contain warnings about viruses and their damaging consequences Tell the reader to forward to as many people as possible Contain technical sounding language describing the virus Contain bogus comments from officials: FBI, software companies, news agencies, etc.

Denial of Service An attack specifically designed to prevent the normal functioning of a system – preventing the lawful access to the system by authorized users. Such attacks can be caused by destroying or modifying data or by overloading the system until service is delayed or prevented.

Operating System Attacks Exploit bugs in operating systems – usually fixed by software vendors (i.e. Microsoft) as soon as identified. Users must apply most recent security patches for protection

Network Attacks Exploit limitations of network to disconnect a user, but usually don’t cause the computer to crash. Firewall on the network (not on your desktop without expert assistance) may help.

Virus Statistics First virus identified in 1981 – steadily growing in number and sophistication ever since 1 in 4,000 emails infected in 1999 1 in 700 emails infected in 2000 1 in 300 emails infected in 2001 Estimates are that 1 in 100 emails will be infected in 2004

Virus Statistics Over 85,000 identified viruses worldwide 3,855 new viruses in the first 6 months of 2003 – a 17.5% increase from the same period in 2002 Additional 778 new viruses in August 2003 In August 2003, almost 40% of virus reports to Sophos (our mail server screener) were on the W32/So-big-F virus Hoaxes are on the rise – most aimed at Bill Gates August 2003 – one of the worst months in the history of computer security

Symptoms and Indicators Programs take longer to start or run slowly Disk access time seems excessive Access lights turn on for non-referenced devices Unexplained decreases in available memory Sudden reduction in disk space Unexplained hidden files appear Email message with strange attachment Anti-virus program will not run Strange sound or music plays from speakers unexpectedly

Symptoms and Indicators continued… Someone tells you they’ve received messages from you that you know you didn’t send Strange dialog boxes appear on screen New icons appear on your desktop that are not associated with any program you installed Computer starts sometimes – sometimes not Out of memory message appears when you should have plenty of memory

WSU Computer Virus Experience Four major attacks during 2003 (so far…): When: January 24 What: W32.SQLExp Description: Worm also known as the slammer – attacks Microsoft SQL databases. WSU experience: This worm affected both servers and workstations – several hundred in total. It took several days to clean all servers.

WSU Experience continued….. When: August 11 What: W32.Blaster Worm Description: Uses the RPC interface to infect other computers and create denial of service attacks, flooding the network with data WSU experience: On August 13th, 37% of all scanned computers on the WSU network were vulnerable. Complicated by return of several thousand unprotected student computers. Over 40,000,000 network packets were dropped/screened from infected student computers during a single 60-90 minute period.

More WSU experience……. When: August 18 What: W32.Sobig.F@mm Kind of Infection: Virus. Description: A mass mailing worm that sends itself to other computers. Uses email spoofing to disguise the originating address. WSU experience: On a normal day we block about 500 infected emails per day. The day this virus appeared, we blocked 97,000 infected emails.

More WSU experience……. When: August 19 What: W32/Welchia Kind of Infection: Worm Description: Also a mass mailing worm that sends itself to other computers. The worm tries to infect other computers, and then performs a Denial of Service (DoS) attack where the infected system floods the network with data aimed at specific computers. In this instance the attack was directed at the Microsoft site which provides operating system updates. WSU experience: Approximately 1000-1500 student computers were infected, causing extremely high volumes of network traffic to traverse the WSU network.

Security and Protection Strategies Never download from people or sites you aren’t 100% sure about Even if you know the source, be aware of what the file is before you open it Unhide file extensions to identify executable files Never use automatic preview features of programs Never blindly type commands

Security and Protection Strategies Keep virus protection updated Don’t think that just because you have virus protection, you’re safe – you’re not! Keep security patches updated Backup!!!! Don’t download from public newsgroups (Usenet) Subscribe to an email alert service Forward warnings to only one authorized person to avoid hoaxes

Please….. Practice Safe Computing