ANITVIRUSES TECHNIQUES

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
ITMS Information Systems Security 1. Malicious Code Malicious code or rogue program is the general name for unanticipated or undesired effects in.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Computer Viruses Preetha Annamalai Niranjan Potnis.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
For any query mail to or BITS Pilani Lecture # 1.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
COMPUTERVIRUSES MALICIOUS CODES  Malicious code: It is an undesired program or part caused by an agent intent to damage.  Agent is Writer or Distributor.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Chapter Objectives In this chapter, you will learn:
Presentation on Computer Virus
SEMINAR ON PC SECURITY FROM VIRUSES
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Malicious Program and Protection
Presentation transcript:

ANITVIRUSES TECHNIQUES COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES 1

SEQUENCE OF PRESENTATION * WHAT IS COMPUTER VIRUS ? 4

SEQUENCE OF PRESENTATION COMPUTER VIRUS * VIRUS (ROGUE SOFTWARE) I 2

SEQUENCE OF PRESENTATION * WHO ARE ROGUE PROGRAMMERS ? COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ? 3

SEQUENCE OF PRESENTATION * TYPES OF COMPUTER VIRUS 5

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT ALL CAN THEY DO ? 6

SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW DO THEY INFECT ? 7

SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW NOTICE ? V I S R U 8

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT TO DO ? NO ! VIRUS 9

SEQUENCE OF PRESENTATION COMPUTER VIRUS * LAST WORD 10

SEQUENCE OF PRESENTATION COMPUTER VIRUS * CONCLUSION 11

“ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ” 12

WHAT IS COMPUTER VIRUS ? * BE A SET OF COMPUTER INSTRUCTIONS * BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS 13

COMPUTER COMPONENTS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE COMPUTER VIRUS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE 1

ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION * THE TROJAN HORSE - APPEARS TO BE USEFUL * WORMS - TRAVEL IN NETWORK * REPLICATORS - COPY ITSELF TO EXHAUST DISK * CHAMELEONS - M ISCHIEF

ROGUE SOFTWARE * TIME BOMBS - EXPLODE ON TIME / DATE * LOGIC BOMBS - EXPLODE ON LOGIC * SOFTWARE BOMBS - EXPLODE ON LAUNCH

WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PSYCHO CASES - FOR FUN - RELEASE ANGER - TAKE REVENGE 2

WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET

WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK

TYPES OF COMPUTER VIRUS * BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT 3

WHAT CAN THEY DO ? FORMAT DISK COPY, RENAME AND DELETE FILES COMPUTER VIRUS FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES 4

HOW DO THEY DO ? APPENDING INSERTION INTERCEPTION REDIRECTION COMPUTER VIRUS APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT 5

HOW DO YOU NOTICE ? COMPUTER VIRUS 6

HOW DO YOU NOTICE ? COMPUTER OPERATION BECOMES SLUGGISH COMPUTER VIRUS COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES

HOW DO YOU NOTICE ? PROGRAMS ENCOUNTER ERRORS COMPUTER VIRUS PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR 7

WHAT TO DO ? ANTI VIRUS TECHNIQUES

WHAT TO DO ? SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS COMPUTER ANTI VIRUS SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH 8

SAFE COMPUTING METHODS WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS * YOU MUST - BOOT FROM FLOPPY DISK - DISCOURAGE PIRATED SOFTWARE - TAKE BACKUP 9

SAFE COMPUTING METHODS WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS YOU MAY USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS 10

WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION SLOW SPEED UNNECESSARY INTERRUPTS CAN BE INFECTED BY VIRUS HEAVY ON RAM 11

WHAT TO DO ? DETECTION SYSTEMS ANTIVIRUS SOFTWARE SYSTEMS COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS DETECTION SYSTEMS LOAD, RUN AND EXIT CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC 12

FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS WHAT TO DO ? SOME ANTIVIRUS SOFTWARE COMPUTER ANTI VIRUS VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS

WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS 14

Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE 17

THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY 19

CONCLUSION “LEARN TO LIVE WITH IT” SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION 20