Chapter 1 Viruses: Attack of the Malicious Programs.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Unit 18 Data Security 1.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security for Seniors SeniorNet Help Desk
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
CONTENTS What is Virus ? Types of computer viruses.
Keeping Your Computer Safe and Running Efficiently.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Running Windows Securely and Efficiently By Gary Esworthy.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
For more information on Rouge, visit:
Windows Tutorial 5 Protecting Your Computer
What they are and how to protect against them
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Presentation transcript:

Chapter 1 Viruses: Attack of the Malicious Programs

What is a virus?

A computer virus is a malicious computer program that, when executed by an unsuspecting human, performs tasks that primarily include replicating itself and deploying a payload.

What is a virus? A computer virus is a malicious program.. – Written by somebody who is up to no good that, when executed by an unsuspecting human – Viruses need human help, usually, the human is tricked into starting the virus. performs tasks that include replicating itself and deploying a payload – (next slide)

Some possible virus payloads jokes/vandalism Data destruction/corruption Spam distribution Data/information theft Hijacking Ransomware Virus and spyware distribution

Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes  Worms

Macro viruses Macros are command sequences available in many systems; word is one, excel is another. A macro can eploy a virus, just like any other executable. The often come with attachments. They can open/close/write/destroy files. If they destroy your registry, your computer will not boot! Best: turn off the capability to run macros by default.

Turning off macros Office 2003: – Tools → Options → Security tab. In macro security, click Macro security button, click security level tab, and choose a level. The book recommends medium setting. Office 2007: – Office button → Options → Trust Center, click trust center setting button. Choose the macro setting you want: recommended: Disable all macros with Notification.

Memory Resident Viruses Memory resident viruses load into RAM when activated and stay there; though they will disappear when the machine is turned off, the often set up a mechanism so they reappear when the machine is rebooted. They slow down the computer and can damage data and system files and may stop the computer from running correctly.

File infector viruses These are files that attach to program files (files called *.EXE or *.COM) They have access to anything the original program has and can damage any of them, ergo, the whole computer (software).

Boot Viruses These are viruses which “hide” the boot area of a disk/floppy. The may render the disk useless as a bootable disk.

Trojan Horses Trojan Horses are viruses that are inside other (interesting) programs; you run the program and launch the virus at the same time.

Multi-Partite Viruses They just combine all of the above.

Hoaxes Letters that warn you about viruses that aren't Threaten catastrophe Reference a technology authority like IBM, Microsoft or the FBI. Reference a technology authority like IBM, Microsoft or the FBI. Ask that it be resnt, probably several times. Usually a Google Search will reveal the hoax. Other sites to look: info/hoax and Other sites to look: info/hoax and

Worms These are malware that goes from computer to computer withut human intervention. Besides other ill-effects, they often clog networks looking for computers to infect.

Some avoidance tips Install an anti-virus program and keep it up to date  McAfee or AVG from Be wary of unexpected links and attachments Don't use P2P/BitTorrent Never turn off your anti-virus or your firewall. Check thumb drives, floppies, burned CDs and DVDs Don't accept files from unknown people when using Internet Chat programs such as MSN Messenger, IM, Yahoo Messenger, IRC.

Symptoms of a sick System Frequent crashes and system restarts slow/erratic performance Broken/erratic internet connection An active internet connection in an otherwise idle computer Stuff in your sent folder you didn't send. Missing or corrupt data/files.

What to do? Update your antivirus software. Disconnect from the internet: turn off your modem/router and wireless. (Quarantine every computer) If your antivirus found the virus and cleaned it, you are fine, otherwise:  Boot into safe mode  Do a system virus scan. Repeat until clean.

If you cannot get on the Internet... Your virus may have fiddled with a file called HOSTS Its full name is: C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS on most systems (XP and VISTA, probably Windows 7 also). Its contents should only be: localhost and (in Vista, Windows 7): ::1 localhost There may be some lines with ipv6xx names on them, they are OK. Edit the file with Notepad

Operating System Security Features KEEP YOUR OS UP TO DATE; set it to check for updates periodically (at least once a week). Install and run antivirus software; keep it up to date (it should update automatically). Keep your Firewall operational. In Vista and Windows 7, (and in the MAC), every time some program tries to change the system in some significant fashion, a window prompt appears. Called UAC in Windows, it can be turned off. DON'T

More System Security Features Be sure to set up all accounts as STANDARD accounts; have a special Administrator account (hopefully called something else) for admin tasks. Windows has something called Data Execution Prevention (DEP). To set:  In XP: use sysdm.cpl, Advanced, performance, click on Settings and choose the level.  In Vista/Windows 7: system, Advanced System Setting, Advanced Tab, Settings, DEP settings.

Viruses on Other devices On the MAC: before OS X there were about viruses.; only a handful for OS X. So, not a real problem; however:  PC viruses can happily live (dormant) in MAC files.  Newer MACs can run Windows, and there, all bets are off. Unix/Linux have seen a handful of Virus, none for monetary gain. It is possible, now, to run Windows in Linux, so, again, the Caveat above applies. Also, PC viruses can exist in any file.

Viruses in Phones/PDAs Attacks against cell phones: Through SMS messages. The possibility existed. Otherwise Five kinds of devices:  Symbian Handful, spread through Bluetooth  RIM (Blackberrys) None known  Iphones, etc. None known, unless the phone is “jailbroken”  Windows Mobile Phones Too new.  Android Some apps have been malicious, but not been able to spread.

If your virus doesn't remove,try: RemovalTool/ RemovalTool/ purchase/tools.shtml purchase/tools.shtml