Virus worm trojan

1,299 views

Published on

cfadw

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,299
On SlideShare
0
From Embeds
0
Number of Embeds
142
Actions
Shares
0
Downloads
62
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Virus worm trojan

  1. 2. <ul><li>Computer abuse </li></ul><ul><ul><li>What is computer abuse… </li></ul></ul><ul><li>Spam </li></ul><ul><ul><li>What is spam? </li></ul></ul><ul><ul><li>How does spam work? </li></ul></ul><ul><ul><li>How’d they get my email? </li></ul></ul><ul><ul><li>Spam prevention </li></ul></ul><ul><li>Viruses </li></ul><ul><ul><li>Computer Viruses </li></ul></ul><ul><ul><li>History of viruses </li></ul></ul><ul><ul><li>History of virus continued… </li></ul></ul><ul><ul><li>Types of viruses </li></ul></ul><ul><ul><li>Virus effects… </li></ul></ul><ul><ul><li>Virus process and cycle </li></ul></ul><ul><ul><li>Top 10 virus attacks and cost </li></ul></ul><ul><ul><li>Virus prevention </li></ul></ul><ul><ul><li>Why do we have viruses? </li></ul></ul><ul><li>Trojan horses, worms </li></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><li>Trojan Horses </li></ul></ul><ul><li>Summary and conclusions </li></ul><ul><li>References </li></ul>
  2. 3. <ul><li>Is This Computer abuse? </li></ul><ul><li>or is it more like this? </li></ul>1 2
  3. 4. <ul><li>&quot;The unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer or the data held thereon.” 3 </li></ul><ul><li>Such as: </li></ul><ul><ul><li>Hacking </li></ul></ul><ul><ul><li>Pornography </li></ul></ul><ul><ul><li>Viruses </li></ul></ul>
  4. 5. no… … not… … this kind 4
  5. 6. <ul><li>Spam is all those unwanted advertisement of a company or their products distributed online. </li></ul><ul><li>Most spams are delivered via emails. </li></ul><ul><li>To avoid being spammed companies do have filters, but the best we can do is just ignore the emails and delete them . </li></ul>5
  6. 8. 6 7 9 8
  7. 9. <ul><li>Don’t give out email addresses to unreliable sources </li></ul><ul><li>Spam protection in your computer (most email services provide spam filtering) </li></ul><ul><li>Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. </li></ul><ul><li>Use multiple e-mail addresses. </li></ul><ul><li>Short e-mail addresses are easy to guess, and may receive more spam. </li></ul><ul><li>Spam protection from your ISP </li></ul>
  8. 10. 10 11 12
  9. 11. <ul><li>To be defined as a virus, a program must: </li></ul><ul><li>Replicate itself in order to carry out a mission. </li></ul><ul><li>Create damage to the computer system &quot;infected&quot;. </li></ul><ul><li>Or A virus is a program which reproduces itself, hides in other computer code without permission and does nasty or undesirable things, not intended by its victim. </li></ul><ul><li>Virus Components: </li></ul><ul><li>The Replication mechanism </li></ul><ul><li>allows virus to copy itself </li></ul><ul><li>The Protection mechanism </li></ul><ul><li>Hides virus from detection </li></ul><ul><li>The Trigger </li></ul><ul><li>Mechanism which will set off the payload </li></ul><ul><li>The Payload </li></ul><ul><li>Effect of the virus </li></ul>13
  10. 12. <ul><li>Technically, the concept of a computer virus was first imagined in 1949, well before computers became commonplace. </li></ul><ul><li>Von Neumann used his theories in the 1950s, at Bell Labs. </li></ul><ul><li>The first virus “in the wild,” as they say, infected Apple II floppy disk in 1981. Its name was” Elk Cloner”. all it did was display a short rhyme onscreen: </li></ul><ul><li> “ It will get on all your disks </li></ul><ul><li>It will infiltrate your chips </li></ul><ul><li>Yes it’s Cloner! </li></ul><ul><li>It will stick to you like glue </li></ul><ul><li>It will modify ram too </li></ul><ul><li>Send in the Cloner!” </li></ul>14
  11. 13. <ul><li>in 1983 when Fred Cohen, demonstrates a computer virus during a security seminar at Lehigh University in Pennsylvania. </li></ul><ul><li>In 1986, the Brain virus became the first documented file infector virus for MS-DOS computers </li></ul>15
  12. 14. <ul><li>Boot Viruses </li></ul><ul><li>Infect the boot block on a floppy or hard disk </li></ul><ul><li>File Viruses </li></ul><ul><li>Infect .EXE or .COM files </li></ul><ul><li>Multi-partite Viruses </li></ul><ul><li>Infect both boot blocks and executable files. </li></ul><ul><li>Polymorphic Viruses </li></ul><ul><li>Is self-modifying, changes each time it infects a file or disk. </li></ul><ul><li>Meta Viruses </li></ul><ul><li>First viruses to infect data files and to work on multiple platforms. </li></ul>13
  13. 15. <ul><li>Trivial, simply reproduces or displays messages. </li></ul><ul><li>Minor, alters or deletes infected files. </li></ul><ul><li>Moderate, wipes out entire disk drive. </li></ul><ul><li>Major, slowly corrupts data with pattern, making restoration difficult. </li></ul><ul><li>Severe, slowly corrupts data without pattern, making restoration impossible. </li></ul><ul><li>Unlimited, virus which discovers system administrator's password and mails it to one or more users, tempting them to use it for illegal purposes </li></ul>13
  14. 16. Virus Process Virus Cycle 16 16
  15. 17. 17 Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30
  16. 18. <ul><li>There are plenty of companies dedicated in preventing viruses from infecting our computers. They are known as antiviruses or computer security systems </li></ul>18 20 19 Such as… 20
  17. 19. <ul><li>Why are there so many new viruses? Is it because some troll is making it for fun? Or is it… </li></ul><ul><li>Because antivirus companies are creating new ones so we are bound to buy their products? </li></ul>21
  18. 20. no… … not… … these kinds 22 23 ?
  19. 21. <ul><li>A worm is a program that scans a company’s network, or the Internet, for another computer that has a specific security hole. It copies itself to the new machine (through the security hole), Understanding Computer Viruses then starts replicating itself there. </li></ul><ul><li>Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours. Worms don’t even have to be delivered via conventional programs; so-called “fileless” worms are recent additions to the virus scene. While in operation, these programs exist only in system memory, making them harder to identify than conventional file-hosted worms. </li></ul>16
  20. 22. <ul><li>A Trojan horse is a program that claims to do one thing but then does something totally different. A typical Trojan horse has a filename that makes you think it’s a harmless type of file; it looks innocuous enough to be safe to open. But when you run the file, it’s actually a virus program that proceeds to inflict its damage on your system. </li></ul><ul><li>It delivers its payload through deception, just like the fabled Trojan horse of yore. Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. </li></ul>16
  21. 23. <ul><li>Well most people believe that all computer threats are due to a virus, but now we know that there are a lot of different threats beside viruses </li></ul><ul><li>Such as there are spams, trojans, worms, </li></ul><ul><li>From spams we know there are different sorts, such as phishing </li></ul><ul><li>Back to viruses we learnt a little bit of what it does such as how it infects our computer system and destroys it slowly. </li></ul>
  22. 24. <ul><li>http:// thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg </li></ul><ul><li>http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related </li></ul><ul><li>http ://www.cyberagentsinc.com/ computer_abuse.htm </li></ul><ul><li>http://f00.inventorspot.com/images/1559606_340_1116081430036- spam.jpg </li></ul><ul><li>http ://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013. html </li></ul><ul><li>http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname--amazoncom_launche_wireless_superstore---50226711--images-- amazon.com_logo.jpg </li></ul><ul><li>http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260. jpg </li></ul><ul><li>http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1. jpg </li></ul><ul><li>http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart- logo.jpg </li></ul><ul><li>http://healyitworks.com/wp-content/uploads/2009/06/virus5. jpg </li></ul><ul><li>http://www.standrews.k12.nf.ca/Computerwebquest/ Computer.JPG </li></ul><ul><li>http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_3199745-computer- virus.jpg </li></ul><ul><li>http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/ index.html </li></ul><ul><li>http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2. pdf </li></ul><ul><li>http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus / </li></ul><ul><li>http://www.pdfking.net/Understanding-Computer-Viruses-- PDF.html </li></ul><ul><li>http://www.itsecurity.com/features/10-worst-virus-attacks-111207 / </li></ul><ul><li>http:// community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg </li></ul><ul><li>http://3.bp.blogspot.com/- FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg-D4/s1600/norton-360.gif </li></ul><ul><li>http:// custompc.ca/files/2009/06/press_logo_avg.jpg </li></ul><ul><li>http:// farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg </li></ul><ul><li>http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg </li></ul><ul><li>http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg </li></ul><ul><li>http:// www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg </li></ul>
  23. 25. 24

×