Computer Viruses Susan Rascati CS30 Section 11 George Washington University.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Computer Viruses.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
Computer Viruses.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Chapter Objectives In this chapter, you will learn:
COMPUTER VIRUSES Computer Technology.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Stay Safe While Using The Internet
Chap 10 Malicious Software.
Presentation transcript:

Computer Viruses Susan Rascati CS30 Section 11 George Washington University

What is a Virus? A virus is a self-reproducing program that can infect other programs by modifying them to include, a possibly evolved, copy of itself. A virus is a self-reproducing program that can infect other programs by modifying them to include, a possibly evolved, copy of itself.

What is meant by infection? A virus infects by inserting itself into the chain of command so that when one attempts to execute the original program the virus as well (or in more extreme cases, instead) is executed A virus infects by inserting itself into the chain of command so that when one attempts to execute the original program the virus as well (or in more extreme cases, instead) is executed

3 Main Components INFECTION : The method in which the virus spreads INFECTION : The method in which the virus spreads PAYLOAD: What the virus does besides replication. PAYLOAD: What the virus does besides replication. TRIGGER: The routine that decides when the payload is delivered. TRIGGER: The routine that decides when the payload is delivered.

Mandatory Components Only the INFECTION mechanism is mandatory component of a virus Only the INFECTION mechanism is mandatory component of a virus

Viral Damage

Deliberate Damage Deliberate damage is what is inflicted by the virus payload Deliberate damage is what is inflicted by the virus payload Can range from completely benign results such as running the screen message “I WANT A COOKIE” to corrupting files and destroying a hard drive Can range from completely benign results such as running the screen message “I WANT A COOKIE” to corrupting files and destroying a hard drive

Accidental Damage Damage is caused when a virus attempts to attach itself to the system Damage is caused when a virus attempts to attach itself to the system The virus can accidentally corrupt areas and inadvertently inhibit a user from opening files or booting up the computer The virus can accidentally corrupt areas and inadvertently inhibit a user from opening files or booting up the computer Such actions are considered accidental because they are not the part of the payload mechanism Such actions are considered accidental because they are not the part of the payload mechanism

Incidental Damage All viruses, even benign ones, cause some loss of computer performance: Memory Memory Disk space Disk space Clock cycles Clock cycles

How to prevent a virus Avoid opening attachment from senders you do not know Avoid opening attachment from senders you do not know Be very particular about the type of freeware and software that you chose to use and download Be very particular about the type of freeware and software that you chose to use and download Use anti-virus software to scan ALL files and documents before they are opened on the hard drive Use anti-virus software to scan ALL files and documents before they are opened on the hard drive

Anti-Virus Software The greatest method of virus prevention is anti-virus software. It will scan your hard drive every time the computer is turned on. Ideally, these programs search for behaviors characteristic to viruses, isolate the infected files, and remove the virus from the software.

Update Anti-Virus Software In order to ensure complete protection, one must do more than simply buy and install such programs In order to ensure complete protection, one must do more than simply buy and install such programs While most software can identify the most common viruses, on average 3-5 new strains are discovered every day While most software can identify the most common viruses, on average 3-5 new strains are discovered every day

Update Anti-Virus Software Many anti-virus companies such as Symantec and McAfee maintain websites that contain the most up-to-date virus information Many anti-virus companies such as Symantec and McAfee maintain websites that contain the most up-to-date virus information The most recent virus information can be downloaded to your existing software allowing you to detect the new strains The most recent virus information can be downloaded to your existing software allowing you to detect the new strains These websites also offer instruction on how to remove certain viruses should your computer become infected These websites also offer instruction on how to remove certain viruses should your computer become infected

OH NO! I have a virus! If all prevention methods fail and your computer manages to get infected – don’t panic!

Is it even a Virus? It may look like a virus, but it might be a JOKE or a TROJAN HORSE It may look like a virus, but it might be a JOKE or a TROJAN HORSE The main difference: Viruses modify other files, jokes and Trojan horses exist in only one file and thus can be removed through the deletion of that file The main difference: Viruses modify other files, jokes and Trojan horses exist in only one file and thus can be removed through the deletion of that file

How to Tell Most likely it is a Virus if: 1. It reads as a common, older virus 2. Scanner finds it in file or boot sector today, it wasn’t found yesterday, and you have not updated your scanner files 3. Scanner finds two instances of the virus in the same computer

How to Tell Most likely it is NOT a virus if: 1. Your scanner only finds one infected file, and it is a file you use all the time 2. Scanner only identifies something as a “possible virus”

Virus vs. Hoax Don’t believe all that you read. Many s you receive warning of deadly viruses are HOAXES; they describe phony viruses!

It is Probably a Hoax if it… Reports that it will cause horrific damage to the PC Reports that it will cause horrific damage to the PC Uses very technical language to which the user is most likely not familiar Uses very technical language to which the user is most likely not familiar Is written in very motive language, such as all capital letters to influence its power and urgency Is written in very motive language, such as all capital letters to influence its power and urgency Tells you that you MUST it to as many people as possible in order to avoid an awful, viral fate! Tells you that you MUST it to as many people as possible in order to avoid an awful, viral fate!

If it definitely is a virus Don’t panic, instead: Contain, Control, Kill Don’t panic, instead: Contain, Control, Kill First you want to prevent further spread of the virus. First you want to prevent further spread of the virus. Limit the use of the infected workstation Limit the use of the infected workstation Learn everything you can about the virus so that you are fully prepared for all that it might do to the PC Learn everything you can about the virus so that you are fully prepared for all that it might do to the PC

Kill the Virus Search for solutions, either on-line at subscriber anti-virus sites such as Search for solutions, either on-line at subscriber anti-virus sites such as or public sites such as or public sites such as Follow the directions for virus extermination Follow the directions for virus extermination If you cannot alone exterminate the virus, call in the experts If you cannot alone exterminate the virus, call in the experts