Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August 1995. Today, there are thousands of macro.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Quiz Review.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Topic 5: Basic Security.
Malicious Software.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
3.6 Fundamentals of cyber security
COMPUTER VIRUSES Computer Technology.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Technology Day 21
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

Types of Computer Malware

The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro viruses in existence—some examples are WM.concept, Melissa and Nimda

A logic bomb employs a code that lies hidden until specific conditions are met. When that condition happens, it will trigger a certain function such as deleting files, flashing messages on the screen, etc. Logic bombs may be found in single programs, or they may be part of a worm or virus.

An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. Each infection counts down to the trigger. A time bomb is a subset of logic bomb, which is set to trigger on a particular date, such as the infamous ‘Friday the 13th’ virus.

The boot sector is where your computer looks to read your operating system. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. In the 1980’s boot sector viruses were common and spread rapidly from one computer to another via floppy disks.

With the invention of the CD-ROM, it became virtually impossible to infect read-only CDs. Though boot viruses still exist, they are much less common than in the 1980s. Today’s operating systems do not allow ordinary programs to write to the boot sector. Examples of boot viruses are Polyboot.B and AntiEXE.

A worm is a small piece of software that uses computer networks and security holes in software to replicate and spread itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine and continues replicating from there

Unlike a virus, it does not need to attach itself to an existing program. Worms harm the network (if for no other reason than by consuming bandwidth). There are several types of Worms, including the Worm, Instant messaging worms, IRC worms, File-sharing networks worms, and Internet Worms.

worms are spread via messages. The worm will arrive as , where the message body or attachment contains the worm code. The may also provide a link to a code on a website. Most systems requires the user to open an attachment to activate the worm, but "social engineering" can often successfully be used to encourage this.

Once activated the worm will itself using either a local service, such as Microsoft Outlook, or Windows MAPI functions, or directly using SMTP. The addresses it sends to are often taken from the infected computers address list. Worms using SMTP can even fake the sender's address.

With viruses defense is mostly discipline. Never double-click on an attachment that contains an executable program. A file with an extension like.EXE,.COM or.VBS is an executable and an executable can do all sorts of damage. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF and.JPG), etc., are data files, and they can do no damage except for the macro virus problem in Word and Excel documents.

Trojan horses may appear to be useful application or an interesting game to an naive user, but they are indeed harmful when executed.

There are two common types of Trojan horses. One is a useful piece of software that has been corrupted by a hacker. This person inserts malicious code into the program that executes while the program is used. The other is a standalone program that masquerades as something it is not. Perhaps a game or image file, but when opened, the malicious code carries out its objective.

A keylogger is a diagnostic program used in software development that captures the user's keystrokes. It can be useful in finding errors in computer systems and can be used to measure an employee’s productivity on clerical tasks. It is even useful for law enforcement purposes.

In the hands of a hacker, it can be dangerous. One can obtaining passwords or encryption keys without a user’s knowledge. Keyloggers are widely available on the internet and can be used by anyone for the purpose of gaining passwords, data, etc.

One way of stealing money from the owner of an infected PC is to take control of the modem and dial an expensive toll call. Auto-Dialer software dials up a premium-rate telephone number such as a "900 number" and leaves the line open charging the toll to the infected user.

Sentinels are highly advanced viruses capable of giving the programmer of the virus remote access to the computers that are infected. They are used to form large networks of slave, or zombie computers which can be used for malicious purposes such as a Distributed Denial of Service attack.

A Distributed Denial of Service attack occurs when all the zombies attempt to contact a server at the same time. The barrage of incoming requests overloads the server’s capabilities, and legitimate users are denied access.