By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.
All about viruses, hacking and backups By Harriet Thomas.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Computer Viruses Author: Alyse Allen.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

By: Jason Boylan and Jeff George

Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary

Virus Definition  Self replicating computer program  Potentially unknown to user  Potentially self modifying  Programmed to damage computer in someway or just be a nuisance to user

What do viruses do?  The bottom line: they damage your computer; possibly crash your system.  Examples: corrupting programs, deleting files, or reformatting the hard disk.

History  1970’s – ARPANET Creeper virus  1980’s – Elk Cloner, Pakistani flu, Stoned, Jerusalem, Morris worm  1990’s – Chameleon, Michelangelo, CIH, Melissa worm, ExploreZip  2000 and beyond - ILOVEYOU, Sadmind, Sircam, Nimda, Klez, Code Red, Blaster Worm, Welchia, MyDoom, Sasser worm, Santy, Sony rootkit

History I (1970)  ARPANET Creeper virus  Simply displayed 'I'M THE CREEPER : CATCH ME IF YOU CAN.‘ when it infected a system

History II (1980)  Elk Cloner, first virus that was a very large outbreak and outside of computer system in which it was created. It was made on the Apple II and took advantage of the boot sector of a floppy disk and would copy itself to memory, simply displayed a message every 50 th boot  Pakistani Flu, also took advantage of the boot sector this virus was developed as an anti-piracy measure because if it spread to a disk then it would simply rename the disk label to ©Brain  Stoned, another nuisance virus that slowed down the users computer and would display the message “Your PC is now Stoned!” at startup  Jerusalem, There are many spin offs of this virus and all seem to follow the pattern that on certain days or times this virus will execute and make itself known, typically every Friday the 13 th

History III ( )  Morris worm, was originally developed to try to find out the size of the internet but ended up slowing down systems because a design flaw caused the virus to copy itself too much, it took advantage of a few commands to overflow the buffer and write to memory it shouldn’t have access to, made by Robert Morris  ExploreZip, virus, would destroy Office documents and C and C++ source files

History VI (2000 and beyond)  ILOVEYOU, would spread by ing itself to everyone on the infected users contacts, people would unknowingly open the attached virus thinking it was from a trusted source the virus would overwrite important files and media files  SadMind, exploited OS weaknesses  Sircam, Nimda, Klez, Code Red, all ers  Blaster Worm, a worm to perpetrate a DDoS attack against windowsupdate.com  MyDoom, fastest spreading virus  Sasserworm, propagated by windows port exploit  Santy, used google to find new targets  Sony rootkit, a virus that was put on sony CD’s to prevent piracy

Vulnerability  Diversity in software lowers vulnerability  Standardization is bad because it means that everyone using the same software are all vulnerable  Users of Microsoft Office and Internet Explorer are typically more vulnerable because of their widespread use  Mac’s are less vulnerable because of low market share in PC’s

How do they do it?  In order to replicate itself, the virus needs the permission to execute code and write to memory.  They attach themselves to an executable file of a legitimate program.  When the user runs that program, the virus code is executed.  Sometimes only the virus code is executed.

Two types of Viruses 1. Non Resident Viruses  Finder module  Replication module 2. Resident Viruses

Non Resident Viruses  It constantly looks for suitable files that can be infected. Then infects it and the file is then ready to execute damage.  It consists of two distinct components to do the task.  The Finder Module is the component that looks for potential prey (files to infect). Then calls the Replication Module to infect that particular file.

Resident Viruses  Resident viruses do not have distinct components like the finder module.  Instead it loads the replication module into memory and starts working in the background.  Each time the operating system is called to perform an action the replication module is called.  So then, every suitable program that is executed on the computer is a possible prey to infection.

Methods to avoid detection  Both types of viruses discussed previously remain hidden. The below are possible tricks for remaining hidden. 1. The virus might pretend to be “Hot_Girls.jpeg” and get into your computer. But really, it is “Hot_Girls.jpeg.exe.” 2. Some viruses have the ability to keep the “last modified date” unchanged after altering the content of the file. 3. Stealth: Some viruses have the ability to intercept an anti-virus software’s request to the operating system. So the anti-virus requests a read permission to the virus instead of the os. Then the virus returns an uninfected version of the file and remains undetected.

The Computer is infected. What can I do now?  First of all, it is very important you don’t just ignore it because at some point you will not be able to.  Also, be prepared to lose some data.  You can do one of two things? 1. Virus removal 2. Operating System Reinstallation

Virus Removal - 1 The simplest method: in most windows machines (Windows me, xp or vista) there is the System Restore tool. This tool will restore the registry and critical system files to a previous checkpoint.

Virus Removal - 2 Software that can detect and eliminate viruses. However, these softwares, usually only detect know viruses and hence has its limitations. So, its best to get the newest anti-virus software available.

Virus Removal - 3 Operating System Reinstallation  This is the final means of deleting virus. This method will also kill not some but all your data and gives you a fresh start. However, this method is typically guaranteed to remove the virus.  It involves simply reformatting the OS partition and installing the OS from its original media.  The recovery disk might have come with the computer when first bought or you might have to purchase one.

In Summary  Viruses infect systems by: 1. Appending to a program 2. Copying themselves to other programs 3. Distributing themselves without the users knowledge  They can be very harmful to a system and cost users a lot of money  To stay protected keep up to date with anti-virus software and if you suspect infection don’t ignore it