1 ISA 662 Information System Security 20 Years Of PC Viruses.

Slides:



Advertisements
Similar presentations
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Advertisements

Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Multipartite Viruses Wendy Bowman ETEC 562 General Information Payload Activation Hidden Transmission Removal.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Viruses, Worms, Trojans. Where are we going? Absurd opinions by: IcE tRe.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
The History and Details of Computer Viruses With Chuck Easttom
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Everything you wanted to know about Computer Viruses.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
CONTENTS What is Virus ? Types of computer viruses.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
Malicious Software.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
COMPUTER VIRUSES. Definition Of a Computer Virus Computer Viruses Origin Types of Computer Viruses How Does Viruses Attack Computer. How Does a Viruses.
Computer Viruses Author: Alyse Allen.
Malicious Program and Protection
Presentation transcript:

1 ISA 662 Information System Security 20 Years Of PC Viruses

2 A Brief History Of Viral Time Elk Cloner, widely credited with being the first virus to appear "in the wild" (outside a lab), infects Apple II machines The term "computer virus" is coined by Fred Cohen, an early virus researcher. He will later formally define the term in his dissertation as "a program that can 'infect' other programs by modifying them to include a possibly evolved version of itself."

3 A Brief History Of Viral Time (continued) Brain. The Brain boot sector virus bursts forth on the scene, spreading upon reboot via a floppy disk left in the A: drive. In addition to being the first PC virus, it's the first stealth virus -- infected disks appear to have uninfected boot sectors Lehigh. The Lehigh virus is discovered at Lehigh University. It's a memory-resident virus and the first to infect an executable file, COMMAND.COM.

4 A Brief History Of Viral Time (continued) First widespread Macintosh viruses, MacMag and Scores, show up The Dark Avenger / Eddie virus is the first of the antivirus viruses. It looks for AV programs written by Vessilen Bontchev, a prolific and well-known antivirus programmer, and tries to remove them.

5 A Brief History Of Viral Time (continued) Many different antivirus programs, including Wolfgang Stiller's Integrity Master, Pam Kane's Panda Anti-Virus, and Ray Glath's Vi-Spy appear on the market, with what appears to be open warfare between antivirus programmers and virus writers The Tequila virus appears -- a stealth, multipartite, polymorphic, armored, variable encryption (in which each generation of infection is encrypted with a different key) virus.

6 A Brief History Of Viral Time (continued) The Michelangelo virus, apparently derived from the Stoned virus and able to infect all diskette formats, becomes widespread -- though not nearly as widespread as hysterical media reports had predicted Satanbug / Little Loc / Natas appear. Different strains of the same virus, they are very polymorphic. Satanbug has some serious anti-AV code in it: One strain checks for the presence of any of four AV products and destroys any disk on which they appear.

7 A Brief History Of Viral Time (continued) The relatively harmless KAOS4 virus appears in a file on a pornographic newsgroup and quickly spreads around the globe via COMSPEC/PATH environmental variables. This is the first virus to use such environmental variables to locate the directories where potential targets reside The first of the macro viruses appear, written specifically for new environments created by applications with their own programming language, such as Microsoft's Word, Excel, and Access.

8 A Brief History Of Viral Time (continued) The Laroux / Excel macro viruses replicate widely under Microsoft's new Visual Basic for Applications (VBA) macro environment; however, they carry no destructive payload A virus that works and spreads under Java, called StrangeBrew, is found. A concept virus, it has no destructive payload.

9 A Brief History Of Viral Time (continued) The devastating Melissa Word 97 macro virus breaks out, the fastest-spreading virus to date. Named after a stripper the virus author favors, it is the first of the mass-mailer viruses ILOVE YOU and DDos Attacks

10 A Brief History Of Viral Time (continued) Sircam, Code Red, Nimda and Bad Trans Melissa Author Sentenced Celebrity- Named Viruses, David L. Smith, the convicted author of the Melissa virus, is sentenced to 20 months in a federal prison SQL Slammer, Blaster, Sobig.F and Sober

11 A Brief History Of Viral Time (continued) Bagle, MyDoom, Sasser, Witty and Santy Zotob. It's an Internet Relay Chat-based worm, providing back doors to a remote IRC channel and seeking new targets by looking for unpatched Plug-n-Play modules Trojans, Bots. Microsoft announces that back- door Trojans and bots are the biggest threat to PC users today. Of 5.7 million PCs running Microsoft's Malicious Software Removal Tool (MSRT), 62 percent had at least one Trojan.