1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.

Slides:



Advertisements
Similar presentations
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Advertisements

Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
1 Anti Virus System i-Specific Anti-Virus Product.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Virus vs Anti-Virus: The Arms Race Patrick Graydon Qiuhua Cao.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
OPERATION SYSTEM (WINDOWS) VIRUS REMOVAL. COMPUTER VIRUS - Type of malware that, when executed, replicates by inserting copies of itself (possibly modified)
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Return to the PC Security web page Lesson 5: Dealing with Malware.
For any query mail to or BITS Pilani Lecture # 1.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Computer Network Research Group ITB Training Virus Computer.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Anti Virus IBM i Anti-Virus Product. 2 Reality of Virus, Worms Malware.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
W elcome to our Presentation. Presentation Topic Virus.
Computer virus Done: Aaesha Mohammed ID: H
1 3 Computing System Fundamentals 3.7 Utility Software.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
bitdefender virus protection
Chapter Objectives In this chapter, you will learn:
Managing Windows Security
Anti Virus System i-Specific Anti-Virus Product
Training Virus Computer
Virus vs Anti-Virus: The Arms Race
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Presentation transcript:

1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said

Outline Viruses Anti-Viruses Discussion

Viruses A virus is “a program that can ‘infect other programs by modifying them to include a possibly evolved copy of itself.” - Fred Cohen Fred Cohen seems to have been the first to define the term virus, but the concept had been discussed earlier and there were some viruses out in the wild before he began his research.  Link to virus historyvirus history

Example of a virus In his 1984 Turing award acceptance speech to the ACM, Ken Thompson related the story of how he modified the C compiler to insert a backdoor into the UNIX login program and to insert his modifications into any C compiler compiled using his modified compiler.  Slick—no trace of the backdoor remains in any source code!

Viruses example The WM.Nuclear Microsoft Word macro virus infects Word documents during opening, saving, and printing by adding a set of macros to them. On April 5th it attempts to overwrite critical system files, and it occaisonally adds the text "STOP ALL FRENCH NUCLEAR TESTING IN THE PACIFIC!" to the current document. (Information from Symantec’s security bulletin.)Symantec’s security bulletin

Worms are not viruses The “Anna Kournikova” malware is a worm, not a virus, because it e- mails copies of itself but does not infect any other documents. (Information about from Symantec’s security bulletin.)security bulletin

More about viruses Viruses aren’t necessarily hard to write  Cohen reports that his first virus took only 8 hours for an experienced programmer to write. Viruses aren’t necessarily big  Cohen reports on a UNIX shell script virus that was only 7 lines long

Viruses can be malicious in many ways Virus payloads could:  Carry out a denial of service attack  Crash the machine  Randomly destroy data  Install a trojan horse program  Perform password cracking  … and basically any other nasty thing you can think of.

Virus detection problems According to Cohen, the following are undecidable:  Detection of a virus by its appearance  Detection of a virus by its behavior  Detection of an evolution of a known virus  Detection of a triggering mechanism by its appearance  Detection of a triggering mechanism by its behavior  Detection of an evolution of a known triggering mechanism  Detection of a virus detector by its appearance  Detection of a virus detector by its behavior  Detection of an evolution of a known viral detector

Known clean system Some virus detection techniques require you to start from a clean system.  DOS users used clean boot disks to defeat stealth viruses…  But is it always possible to get to a known clean state? What if every UNIX vendor had been infected with Ken Thompson’s C compiler virus? Even their “clean” distribution media would be infected…

Anti-Virus Features Dedicated, System i-Specific Anti-Virus System Provides full protection against standard PC types of viruses for files and programs used or stored on the System i server Real-time anti-virus monitoring of files while they are being written to memory on the server Tagging of infected files so they can’t be used by others inadvertently Marking of clean files so they won’t be rechecked (saving time and resources) Removal of marks/tags if files are changed Scanning of entire libraries Supports definition of automatic, pre-scheduled periodic scans Automatic virus signature update via the internet Proactive virus signature updates via the network for internet isolated servers

Anti-Virus – Main Screen Activate Anti-Virus protection with one click Quick, reliable scanning lets you know of possible virus infection Make sure your database has the most up-to-date definitions Detailed History Log enables you to view scan and virus history Quarantine keeps Destructive viruses away from your files

Discussion (cont’d) Anti-virus can win in the future?

Thanks