Presentation is loading. Please wait.

Presentation is loading. Please wait.

ANITVIRUSES TECHNIQUES

Similar presentations


Presentation on theme: "ANITVIRUSES TECHNIQUES"— Presentation transcript:

1 ANITVIRUSES TECHNIQUES
COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES 1

2 SEQUENCE OF PRESENTATION * WHAT IS COMPUTER VIRUS ?
4

3 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * VIRUS (ROGUE SOFTWARE) I 2

4 SEQUENCE OF PRESENTATION * WHO ARE ROGUE PROGRAMMERS ?
COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ? 3

5 SEQUENCE OF PRESENTATION * TYPES OF COMPUTER VIRUS
5

6 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * WHAT ALL CAN THEY DO ? 6

7 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * HOW DO THEY INFECT ? 7

8 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * HOW NOTICE ? V I S R U 8

9 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * WHAT TO DO ? NO ! VIRUS 9

10 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * LAST WORD 10

11 SEQUENCE OF PRESENTATION
COMPUTER VIRUS * CONCLUSION 11

12

13 “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY
WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ” 12

14 WHAT IS COMPUTER VIRUS ? * BE A SET OF COMPUTER INSTRUCTIONS
* BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS 13

15 COMPUTER COMPONENTS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE
COMPUTER VIRUS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE 1

16 ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION
* THE TROJAN HORSE - APPEARS TO BE USEFUL * WORMS - TRAVEL IN NETWORK * REPLICATORS - COPY ITSELF TO EXHAUST DISK * CHAMELEONS - M ISCHIEF

17 ROGUE SOFTWARE * TIME BOMBS - EXPLODE ON TIME / DATE * LOGIC BOMBS - EXPLODE ON LOGIC * SOFTWARE BOMBS - EXPLODE ON LAUNCH

18 WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * PSYCHO CASES - FOR FUN - RELEASE ANGER - TAKE REVENGE 2

19 WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET

20 WHO ARE ROUGE PROGRAMERS ?
COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK

21 TYPES OF COMPUTER VIRUS
* BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT 3

22 WHAT CAN THEY DO ? FORMAT DISK COPY, RENAME AND DELETE FILES
COMPUTER VIRUS FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES 4

23 HOW DO THEY DO ? APPENDING INSERTION INTERCEPTION REDIRECTION
COMPUTER VIRUS APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT 5

24 HOW DO YOU NOTICE ? COMPUTER VIRUS 6

25 HOW DO YOU NOTICE ? COMPUTER OPERATION BECOMES SLUGGISH
COMPUTER VIRUS COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES

26 HOW DO YOU NOTICE ? PROGRAMS ENCOUNTER ERRORS
COMPUTER VIRUS PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR 7

27 WHAT TO DO ? ANTI VIRUS TECHNIQUES

28 WHAT TO DO ? SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS
COMPUTER ANTI VIRUS SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH 8

29 SAFE COMPUTING METHODS
WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS * YOU MUST - BOOT FROM FLOPPY DISK - DISCOURAGE PIRATED SOFTWARE - TAKE BACKUP 9

30 SAFE COMPUTING METHODS
WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS YOU MAY USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS 10

31 WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS
COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION SLOW SPEED UNNECESSARY INTERRUPTS CAN BE INFECTED BY VIRUS HEAVY ON RAM 11

32 WHAT TO DO ? DETECTION SYSTEMS ANTIVIRUS SOFTWARE SYSTEMS
COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS DETECTION SYSTEMS LOAD, RUN AND EXIT CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC 12

33 FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS
WHAT TO DO ? SOME ANTIVIRUS SOFTWARE COMPUTER ANTI VIRUS VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS

34 WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS 14

35 Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS
SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE 17

36 THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY 19

37 CONCLUSION “LEARN TO LIVE WITH IT”
SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION 20


Download ppt "ANITVIRUSES TECHNIQUES"

Similar presentations


Ads by Google