Everything you wanted to know about Computer Viruses.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Viruses.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Viruses. Malware versus Virus Viruses belong to a larger category of software known as Malware, which is short for “malicious software” Computer viruses.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
For any query mail to or BITS Pilani Lecture # 1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
SYSTEM SECURITY & ANTIVIRUS Chapter Dr. BALAMURUGAN MUTHURAMAN.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
VIRUSES and DESTRUCTIVE PROGRAMS
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Everything you wanted to know about Computer Viruses

What it all about About virus. History of virus. Types of virus. How virus spread. How it work. Protection from virus. Free to ask any question at any point

What is a virus? A virus is a computer program that enter a computer without permission or knowledge of the user and alter the way a computer operates. A virus is a software that piggybacks on other programs and change or delete the data, whenever those programs are run.

Why virus are called virus Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person. Computer virus can self replicate themselves like biological virus. As biological virus, computer virus also effect the program or machinery in they exist.

History of virus Len Adelman coins the term virus in First virus “Elk Cloner” created by Rich Skrenta, in 1982 it attack Apple DOS 3.3 operating system and spread by floppy disk. In 1983, Fred Cohen writes a paper “Computer viruses – Theory and Experiments”

History of virus (continue) In 1986, two brothers Basit and Amjad Farooq Alvi created a boot sector virus called cBrain. Internet worms, in 1988 causes first Internet crises and shuts down many computers. Again in 1988, Jerusalem virus that activates on every 13 th Friday affects both.exe and.com files and delete any program that run on that day. In 2000, Denial of Service attack shuts down yahoo, Amazon and other web sites.

History of virus (continue) Love letter worm shuts down system in MY DOOM – the largest virus attack till date which effected one million computer world wide, was detected first on 26 January It affect one in every 10 message. Slow down internet performance by 10% and download time by 50%.

Types of virus File infector viruses Boot sector viruses Multi-partite viruses Macro viruses Script viruses Companion viruses

File Infector Viruses Attaches itself to other program files. When these programs are run from floppy, hard drive, or network they effect to other file. Many are memory resident. When any file that is executed in that memory also becomes infected. Examples: Jerusalem and cascade

Boot Sector Viruses Effect the system boot sector of a disk. (boot record on floppy/hard disks) Activate when user starts up from infected disk. Always memory resident in nature. Once in memory, all non-write protected floppy disks will become infected when accessed. Examples: Form, Disk Killer and Stoned

Multi-Partite Viruses Effect both boot records and program files. Difficult to repair. Boot area and files must both be cleaned from virus otherwise re-infection will occur. Examples: One_Half, Emperor, Anthrax.

Macro Viruses Most common type of virus. They are hard to detect. Effect program that contain macro programming language. Infect data files – word, excel, power point and access files. As these files are share more frequently they cause more damage.

Embedded with document. Therefore when edit from one file do not reflected in other files.

Script Viruses Effect various script languages such as DOS, Java Script, and Visual Basic Script.

Companion Viruses Execute through operating system rather than directly infecting programs or boot sectors. When you execute the command ‘ABC’, ABC.COM executes before ABC.EXE. Thus, a companion virus could place its code in a.COM file with its first name matching that of an existing EXE file. When the user next executed the ‘ABC’ command, the virus’ ABC.COM program would be run.

Other Threats to Computers Worm Torjan horse Trap door’s Bacteria

Worms Worms replicate themselves. Instead of spreading from file to file they spread from computer to computer, infecting an entire system. They steal user name and password and try to log in to other machine.

Torjan horse They look as a useful program but cause damage or do something malicious to a system. Don’t makes copies of themselves.

Trap Door’s It is secret point in a program that by passes standard authentication. Attackers leave behind trap door’s to reenter the system easily.

Bacteria They do not cause any destruction. They replicate themselves and thus consume system space.

How viruses spread By downloading infected files or programs from a network, there is a chance that you can encounter a computer virus. Once you RUN an infected program, the virus can spread rapidly, especially on networks. That is why the Internet, the largest network, is a fertile breeding ground for viruses. By inserting infected disks into your computer.

How viruses spread (continue)

How viruses spread (continued) Computers do get viruses from via internet. The virus will come in the form of some kind of attachment. Opening the attachment can give your computer a virus. Use of floppy disk, pen drives,etc.

Effect of virus Display a message

Effect of virus (continue) Erase vital data. Scramble data on a hard disk Cause erratic screen behavior Halt the PC Many viruses do nothing obvious at all except spread! Damage hardware

Effect of virus (continue) A denial-of-service attack is an attack that causes a loss of service to users such as loss of network connectivity. By consuming the bandwidth of the victim network.

How viruses works? Different virses uses different methods to operate. Like denial-of-service flood the incoming messages to the target system and thus consumes all bandwidth so forces it to shut down.

Working of File virus There are three basic techniques for infecting an executable file: Overwrite - An overwriting virus places itself at the beginning of the program, directly over the original program code. When you try to run this program, nothing happens except for the virus infecting another files.

Working of File virus (continue) Prepend – this virus put its code onto the file and when it is executed, virus code is first run then file gets executed.

Working of file virus (continue) Append -An appending virus places a “jump instruction” at the beginning of the program file, which moves the original beginning of the file to the end of the file, and places itself at that point, When you try to run this program, the “jump” calls the virus, and the virus runs.

Boot sector virus If CMOS is set up to boot from drive A: or from CD- ROM then the system boot sector (SBS) of the disk will be read. If the SBS contains a boot virus, the boot virus will become active, go inside memory It effect the system areas of the hard drive, and other disks that will access later on.

Protection from virus Install an anti-virus program. Regularly update your anti-virus. Examples - Norton Antivirus McAfee virus scan

Protection from virus (continue) Don’t open unknown files. Don’t use or share floppies, CD or pen drive without scanning with anti-virus. If you don’t know who the message is from, don’t open it. If you receive a suspicious message, delete it. Never double-click to open an attachment that contains an executable that arrives as an attachment.

Protection from virus (continue) Do not install pirated software, especially computer games. Regularly scan entire hard disk.

HAVE A NICE TIME