The History and Details of Computer Viruses With Chuck Easttom

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Types of Electronic Infection
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
Computer Viruses Author: Alyse Allen.
Computer Virus’s.
By Quentin Lively Notorious Viruses.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

The History and Details of Computer Viruses With Chuck Easttom

Terms What is a virus What is a worm What is a Trojan horse

1981 Apple Viruses 1, 2, & ’s Fred Cohen 1987 Lehigh Virus 1988 The first anti virus software 1990 The first polymorphic viruses 1991 Symantec releases Norton Anti Virus 1992 The Michelangelo Virus 1994 Kaos4 virus spreads via adult websites The Concept virus The History of Computer Viruses

The History of Computer Viruses II 1999 The Melissa Virus 2000 The I Love You Virus 2001 The Code Red Worm 2003 The Slammer Worm MyDoom

The History of Computer Viruses - Details 1981 Apple Viruses 1, 2, and 3 are some of the first viruses "in the wild" or public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.

The History of Computer Viruses - Details 1980’s In the early 1980s, Fred Cohen did extensive theoretical research, as well as setting up and performing numerous practical experiments, regarding viral type programs. His dissertation was presented in 1986 as part of the requirements for a doctorate in electrical engineering from the University of Southern California. This work is foundational, and any serious student of viral programs disregards it at his own risk Dr. Cohen's definition of a computer virus as "a program that can 'infect' other programs by modifying them to include a version of itself

The History of Computer Viruses - Details 1987 In November, the Lehigh virus was discovered at Lehigh University in the U.S. It was the first "memory resident file infector". A file-infecting virus attacks executable files. It gets control when the file is opened. The Lehigh virus attacked a file called COMMAND.COM. When the file was run (usually by booting from an infected disk), the virus stayed in the resident memory.

The History of Computer Viruses - Details 1988 In March, the first anti-virus software was written. It was designed to detect and remove the Brain virus and immunized disks against Brain infection.

The History of Computer Viruses - Details 1990 Viruses combining various characteristics spring up. They included Polymorphism (involves encrypted viruses where the decryption routine code is variable), Armoring (used to prevent anti-virus researchers from dissembling a virus) and Multipartite (can infect both programs and boot sectors).

The History of Computer Viruses - Details 1991 Symantec releases Norton Anti-Virus software Media mayhem greeted the virus Michaelangelo in March. Predictions of massive disruptions were made and anti-virus software sales soared. As it turned out, the cases of the virus were far and few between.

The History of Computer Viruses - Details 1994 A virus called Kaos4 was posted on a pornography news group file. It was encoded as text and downloaded by a number of users Concept, a macro-virus, becomes the most common virus in the world The "RedTeam" virus infects Windows executables dispatches the infected files through Eudora .

The History of Computer Viruses - Details 1998: The emergence of the sensational "BackOrifice" ("Backdoor.BO") - utility of that allowed hackers management of remote computers and networks The Melissa virus, a macro, appears. It uses Microsoft Word to infect computers and is passed on to others through Microsoft Outlook and Outlook Express programs.

The History of Computer Viruses - Details 2000 The "I Love You Virus" wreaks havoc around the world. It is transmitted by and when opened, is automatically sent to everyone in the user's address book July 2001: The Code Red worm infects tens of thousands of systems running Microsoft Windows NT and Windows 2000 server software, causing an estimated $2 billion in damages. The worm is programmed to use the power of all infected machines against the White House Web site at a predetermined date. In an ad hoc partnership with virus hunters and technology companies, the White House deciphers the virus's code and blocks traffic as the worm begins its attack..

The History of Computer Viruses - Details 2002: Melissa virus author David L. Smith, 33, is sentenced to 20 months in federal prison Jan. 2003: The "Slammer" worm infects hundreds of thousands of computers in less than three hours. The fastest-spreading worm ever wreaks havoc on businesses worldwide, knocking cash machines offline and delaying airline flights.

The History of Computer Viruses - Details 2004: The "MyDoom" worm becomes the fastest-spreading worm as it causes headaches -- but very little damage -- almost a year to the day after Slammer ran rampant in late January MyDoom uses "social engineering," or low-tech psychological tricks, to persuade people to open the attachment that contains the virus. It claims to be a notification that an message sent earlier has failed, and prompts the user to open the attachment to see what the message text originally said. Many people fall for it.

The History of Computer Viruses - Details 2007: A new virus called "Storm Worm." is released. This fast-spreading spammer disguises itself as a news and asks you to download film. The "Storm Worm" gathers infected computers into a botnet, which it uses to infect other machines. It was first identified on Jan. 17 and within 13 days had infected 1.7 million computers

The History of Computer Viruses - Details million computers running on Windows operating system were hit with "Conficker" worm. The malware spread via the Internet and the main tools that helped the worm spread were unpatched corporate networks and USB memory sticks. First discovered last October, it loads itself on to a computer by exploiting a weakness in Windows servers. Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day.

The mechanics of Viruses Delivery a. Via b. Copying over a network c. Direct communication with exposed ports. Payload Types of Viruses Macro virus Script Virus Executable Virus

How Anti Virus Software Works Scanning for known files Scanning for worm infection vectors Heuristic scanning

Current Active Viruses As of 13 November 2005 Sober.S first noticed October 13, 2005 Bagle variant started September 19, 2005 Zotob-D August 16 th, 2005

Rules for preventing viruses Keep operating system and all software updated/patched Use a virus scanner. McAffee and Norton are the two most widely accepted and used virus scanners. It costs about $30 a year to keep your virus scanner updated. Do it. If you are not sure about an attachment, don’t open it. You might even exchange a code word with friends and colleagues. Tell them that if they wish to send you an attachment, to put the code word in the title of the message. Without seeing the code word, you will not open any attachment. Don’t believe “security alerts” that you are sent. Microsoft does not send out things in this manner. Go check the Microsoft website regularly, as well as one of the anti-virus websites previously mentioned.

Anti Virus Information Web Sites