1 Higher Computing Topic 8: Supporting Software Updated 16-6-11.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting Your Computer & Your Information
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah EDW647: Internet.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Presentation on Computer Virus
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses.
Chap 10 Malicious Software.
Presentation transcript:

1 Higher Computing Topic 8: Supporting Software Updated

2 Computer Systems: Topic 8 – Supporting Software 1. Memory Requirements – How much RAM will I need? 2. Storage Requirements – Some application generate large file sizes, e.g. video editing software. 3. Operating System – Applications may not function with some versions of operating systems e.g. software designed for Windows 7 may not work with Vista or XP. Application Software Compatibility When buying software applications it is important to ensure that they will not conflict with your operating system or your hardware.

3 Computer Systems: Topic 8 – Supporting Software Viruses A virus is a program code that causes some undesirable and unexpected event to happen in a computer. Viruses are usually disguised as something innocent and are designed so that they automatically spread within or between computer systems. Viruses can enter a system as attachments to an e- mail, a download from the web, from a disk or CD. Some viruses take effect as soon as their code is executed and others can wait until circumstances cause their code to be executed by the computer. Viruses can be quite harmful and erase data or close down a system.

4 Computer Systems: Topic 8 – Supporting Software Virus Types - Classified by 3 main types: File Virus File viruses attach themselves to program files such as.exe or.com files. When the program is loaded, the virus is also loaded. A file virus can also take the form of a complete program, or script, attached to something else, e.g. . Boot Sector Virus These viruses infect startup files/boot files of the OS eg they attach to the boot sector on disks or the master boot record on hard disks. They initially infiltrate the boot sector, the virus is read while the system is running and then activated the next time the operating system is loaded.

5 Computer Systems: Topic 8 – Supporting Software Macro Virus Macro viruses infect a document and run when the document is opened (sometimes it warns you a document contains a macro so you can choose not to run the macro). They often copy themselves to the macro library from where they can copy to other documents that access the macro library. Macro viruses are fairly common viruses, but they tend to do the least damage eg they typically cause a sequence of actions within the application e.g. inserting unwanted words or phrases in a document.

6 Computer Systems: Topic 8 – Supporting Software Virus Actions Replication - A computer virus has the unique ability to replicate. Like a biological virus they can spread quickly and can be difficult to control. They can attach themselves to almost any type of file and spread as files are copied and sent between computer users. A virus can take a long time to replicate itself before activation. This gives it time to be spread over many computers before being discovered. Camouflage - The virus attempts to hide itself from detection software by presenting itself as a useful file or by encrypting its signature to avoid detection. It is possible for a virus to avoid detection by taking on the characteristics that detection software is programmed to look for and ignore.

7 Computer Systems: Topic 8 – Supporting Software Watching A virus can lie in wait and ambush a computer when something routine is carried out e.g. opening a particular application. The damage routines will activate when certain conditions are met. On a certain date, or when the infected user performs a particular action may trigger the virus. Delivery Infected disks brought in from the outside used to be the main source of viruses until provided the ideal delivery vehicle.

8 Computer Systems: Topic 8 – Supporting Software Other Infections Worm - A worm is a self-replicating virus that does not alter any files but takes up residence in the computer’s active memory and duplicates itself. They only become noticeable once their replication consumes the memory to the extent that the system slows down or is unable to carry out particular tasks.

9 Computer Systems: Topic 8 – Supporting Software Other Infections Trojan Horse - A Trojan horse is a program where harmful code is contained inside another code which can appear to be harmless. Once the apparently harmless code is in the computer, it releases the malicious code to do its damage. Trojan’s are not classified as viruses as they do not self-replicate and don’t infect other files. Example of a Trojan horse is a fake log-in screen designed to steal your log-in data.

10 Computer Systems: Topic 8 – Supporting Software Anti virus techniques The best protection against a virus is to know that each file you open from an , disk or from the web is free from any virus. This requires anti-virus software that can screen attachments, web downloads, and checks all of your files from time- to-time removing any viruses that are found.

11 Computer Systems: Topic 8 – Supporting Software Checksum A checksum is a mathematical value that is attached to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed. A checksum is created by performing a complicated series of mathematical operations that translates the data in the file into a fixed string of digits which is then used as a checksum. When these files are called to execute the checksum is calculated and compared with what it should be. If there are any differences, then the file about to be run could have be infected and a warning given. You can recalculate the checksum when boot or executable file are legitimately altered by the user.

12 Computer Systems: Topic 8 – Supporting Software Virus Signatures A virus signature is a unique pattern of bits within a virus. It can be used to detect and identify specific viruses. Once known, the anti-virus software uses the virus signature to scan for the presence of malicious code and removes it.

13 Computer Systems: Topic 8 – Supporting Software Heuristic Detection Heuristics means 'rule based'. Normally, for an Anti- Virus to detect a virus it must have been seen before. Heuristics are used as there are some families of viruses that continually change their appearance and it is not possible to detect every variant. (ie look for known malicious code, or slight variations of such code). Heuristics allow us to set up some rules so if it smells like a virus, and it acts like a virus we can detect it, even if we have never seen the virus before. Heuristic techniques work on the probabilities of a file being infected i.e. it will give a percentage likelihood of a file being infected by weighing up the file behaviour. Eg, if a file attempts to access your address book then that might be suspicious, or writes to the disk other than in normal OS procedures, or registry changes.

14 Computer Systems: Topic 8 – Supporting Software Memory Resident Monitoring Some anti-virus software is memory resident and is loaded on start up. It monitors the system for viruses whilst the computer is switched on and checks programs for infection every time they run. This will include the boot files on start up, checking any disk as it is accessed, checking any files accessed during operation and checking any files being loaded on the hard drive. The price to be paid with memory resident programs is that they can cause delays in program loading and execution whilst the checks are being carried out.