Unit 18 Data Security 1.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
STARTER 1 1. What stories do you think followed these headlines? A. Web phone scam The scheme to make money illegally using Web phones CANKAYA UNIVERSITY.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Nasca Internet Networking and Security viruses.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Jeopardy Computer Technology Vocabulary 2 Template By Carl Lyman © September 2001.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
D. Beecroft Fremont High School VIRUSES.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Logic Bomb Virus.  The first use of a time bomb in software may have been with the scribe markup language and word processing system, developed by Brian.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
For any query mail to or BITS Pilani Lecture # 1.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Computer Viruses Author: Alyse Allen.
Lecture 8. Cyber Security, Ethics and Trust
Computer Technology Notes 5
Viruses, Malicious Code, & Other Nasty Stuff
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

Unit 18 Data Security 1

Computing Crimes Spreading viruses : Distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way. Hacking :Gaining unauthorized access to a network system Salami shaving : Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts an accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.

Computing Crimes Cont. Denial of service attack :Swamping a server with large numbers of requests Trojan horse : A technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something descriptive in the background. Trapdoors :A technique that involves leaving within a completed program , an illicit program that allows unauthorized an unknown –entry. Mail bombing : Inundating an email address with thousands of message , slowing or even crashing the server.

Computing Crimes cont. Software privacy: Unauthorized copying of a program for sale or distributing to other users. Piggybacking : Using another person's identification code or using that person's files before he or she has logged off ( disconnected from a network account) Phishing :Tricking a user into revealing confidential information such as an access code or a credit card number. Defecting : Changing the information shown on another person's website. Hijacking :Redirecting anyone trying to visit a certain site elsewhere.

A Computer Virus A Computer Virus :is a program that can be reproduce itself and is written with the purpose of causing damage or causing a computer to behave in an unusual way. How does it work? It infects other programs i.e. it attacks itself to other programs, known as host programs, and therefore reproduces itself. It operates by replacing the first instruction in the host program with a JUMP command . This command that changes the normal instruction sequence in a program causing the virus instructions to be executed ( process by process) before the host program instructions.

A Computer Virus When it attacks to operating system programs to integrated itself with the operating system ( the set of programs that control the basic functions of a computer and provide communication between the applications programs and the hardware), it is said to have patched the operating system. Type of programs that viruses attach to : COM Files ( command files ) EXE Files ( executable files )

How does the virus work? A virus loaded into memory ( copied from the storage media into memory). When a program it has attached itself to is run or executed ( process by process ). It then becomes memory resident i.e. it stays in the memory until the computer is switched off. When the virus is triggered by a predetermined event , it operates the payload ( the part of the virus that causes the damage.

The Parts of the virus. A misdirection routine that enables it to hide itself. A reproduction routine that allows it to copy itself to other programs. A trigger that causes the payload o be activated at a particular time or when a particular event takes place. A payload that may be a fairly harmless joke or may be very destructive. Note : a Program that has a payload but does not have a reproduction routine is know as a Trojan.

Virus Types Logic bombs that destroy data when triggered. Boot sectors viruses : that store themselves in the boot sector of a disk ( the part of a disk containing the programs used to start up a computer). File Viruses : that attach themselves to COM files. Macro viruses : that are small macro programs that attach themselves to word processor files and use the macro programming facilities provided in some word processor programs

Text Book Exercises

Language work: Cause and Effect (1) What is the relationship between these actions? A date or event occurs. The trigger routine runs. The payload routine activates. The hard disk is wiped. These events form part of a cause and effect chain. The links between each event in a number of ways. Using cause +to V or make +V 1- a date or event occurs which causes the trigger routine to run . 2- a date or event occurs which makes the trigger routine run.

Language work: Cause and Effect (1) Putting the events in sequence and using a causative verbs : 1- The trigger routine runs ,which activates the payload routine. Putting the events in sequence and using a causative verbs: 1- when The trigger routine runs , the payload routine activates.

Answers:Key(6) page 126-127 when a dismissed employee’s name is deleted from the company’s payroll, a logic bomb is activated which causes the payroll records to be destroyed. When a certain date occurs, a trigger routine is activated which makes keys beep when pressed and corrupts floppies. When the operator starts up the computer for the one hundred and twenty-ninth time , a trigger routine is activated which causes the screen to display, ‘Bloody ! June 4,1989’. When the infected program is run , the boot sector is corrupted which causes the disk content to be overwritten and data to be lost. When a particular date occurs , the payload is triggered which makes characters on a text mode screen slide down to the bottom. When an infected document is opened in the wordprocessor , the virus macro is executed which attached the virus code to the default template. When the users saves another document, the virus code attaches to the saved document. When the saved document is opened in the wordprocessor , the virus destroys data , displays a message or plays music.