Virus worm trojan


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Virus worm trojan

  1. 2. <ul><li>Computer abuse </li></ul><ul><ul><li>What is computer abuse… </li></ul></ul><ul><li>Spam </li></ul><ul><ul><li>What is spam? </li></ul></ul><ul><ul><li>How does spam work? </li></ul></ul><ul><ul><li>How ’ d they get my email? </li></ul></ul><ul><ul><li>Spam prevention </li></ul></ul><ul><li>Viruses </li></ul><ul><ul><li>Computer Viruses </li></ul></ul><ul><ul><li>History of viruses </li></ul></ul><ul><ul><li>History of virus continued… </li></ul></ul><ul><ul><li>Types of viruses </li></ul></ul><ul><ul><li>Virus effects… </li></ul></ul><ul><ul><li>Virus process and cycle </li></ul></ul><ul><ul><li>Top 10 virus attacks and cost </li></ul></ul><ul><ul><li>Virus prevention </li></ul></ul><ul><ul><li>Why do we have viruses? </li></ul></ul><ul><li>Trojan horses, worms </li></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><li>Trojan Horses </li></ul></ul><ul><li>Summary and conclusions </li></ul><ul><li>References </li></ul>
  2. 3. <ul><li>Is This Computer abuse? </li></ul><ul><li>or is it more like this? </li></ul>1 2
  3. 4. <ul><li>&quot;The unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer or the data held thereon.” 3 </li></ul><ul><li>Such as: </li></ul><ul><ul><li>Hacking </li></ul></ul><ul><ul><li>Pornography </li></ul></ul><ul><ul><li>Viruses </li></ul></ul>
  4. 5. no… … not… … this kind 4
  5. 6. <ul><li>Spam is all those unwanted advertisement of a company or their products distributed online. </li></ul><ul><li>Most spams are delivered via emails. </li></ul><ul><li>To avoid being spammed companies do have filters, but the best we can do is just ignore the emails and delete them . </li></ul>5
  6. 8. 6 7 9 8
  7. 9. <ul><li>Don’t give out email addresses to unreliable sources </li></ul><ul><li>Spam protection in your computer (most email services provide spam filtering) </li></ul><ul><li>Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. </li></ul><ul><li>Use multiple e-mail addresses. </li></ul><ul><li>Short e-mail addresses are easy to guess, and may receive more spam. </li></ul><ul><li>Spam protection from your ISP </li></ul>
  8. 10. 10 11 12
  9. 11. <ul><li>To be defined as a virus, a program must: </li></ul><ul><li>Replicate itself in order to carry out a mission. </li></ul><ul><li>Create damage to the computer system &quot;infected&quot;. </li></ul><ul><li>Or A virus is a program which reproduces itself, hides in other computer code without permission and does nasty or undesirable things, not intended by its victim. </li></ul><ul><li>Virus Components: </li></ul><ul><li>The Replication mechanism </li></ul><ul><li>allows virus to copy itself </li></ul><ul><li>The Protection mechanism </li></ul><ul><li>Hides virus from detection </li></ul><ul><li>The Trigger </li></ul><ul><li>Mechanism which will set off the payload </li></ul><ul><li>The Payload </li></ul><ul><li>Effect of the virus </li></ul>13
  10. 12. <ul><li>Technically, the concept of a computer virus was first imagined in 1949, well before computers became commonplace. </li></ul><ul><li>Von Neumann used his theories in the 1950s, at Bell Labs. </li></ul><ul><li>The first virus “ in the wild, ” as they say, infected Apple II floppy disk in 1981. Its name was ” Elk Cloner ” . all it did was display a short rhyme onscreen: </li></ul><ul><li> “ It will get on all your disks </li></ul><ul><li>It will infiltrate your chips </li></ul><ul><li>Yes it ’ s Cloner! </li></ul><ul><li>It will stick to you like glue </li></ul><ul><li>It will modify ram too </li></ul><ul><li>Send in the Cloner! ” </li></ul>14
  11. 13. <ul><li>in 1983 when Fred Cohen, demonstrates a computer virus during a security seminar at Lehigh University in Pennsylvania. </li></ul><ul><li>In 1986, the Brain virus became the first documented file infector virus for MS-DOS computers </li></ul>15
  12. 14. <ul><li>Boot Viruses </li></ul><ul><li>Infect the boot block on a floppy or hard disk </li></ul><ul><li>File Viruses </li></ul><ul><li>Infect .EXE or .COM files </li></ul><ul><li>Multi-partite Viruses </li></ul><ul><li>Infect both boot blocks and executable files. </li></ul><ul><li>Polymorphic Viruses </li></ul><ul><li>Is self-modifying, changes each time it infects a file or disk. </li></ul><ul><li>Meta Viruses </li></ul><ul><li>First viruses to infect data files and to work on multiple platforms. </li></ul>13
  13. 15. <ul><li>Trivial, simply reproduces or displays messages. </li></ul><ul><li>Minor, alters or deletes infected files. </li></ul><ul><li>Moderate, wipes out entire disk drive. </li></ul><ul><li>Major, slowly corrupts data with pattern, making restoration difficult. </li></ul><ul><li>Severe, slowly corrupts data without pattern, making restoration impossible. </li></ul><ul><li>Unlimited, virus which discovers system administrator's password and mails it to one or more users, tempting them to use it for illegal purposes </li></ul>13
  14. 16. Virus Process Virus Cycle 16 16
  15. 17. 17 Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30
  16. 18. <ul><li>There are plenty of companies dedicated in preventing viruses from infecting our computers. They are known as antiviruses or computer security systems </li></ul>18 20 19 Such as… 20
  17. 19. <ul><li>Why are there so many new viruses? Is it because some troll is making it for fun? Or is it… </li></ul><ul><li>Because antivirus companies are creating new ones so we are bound to buy their products? </li></ul>21
  18. 20. no… … not… … these kinds 22 23 ?
  19. 21. <ul><li>A worm is a program that scans a company ’ s network, or the Internet, for another computer that has a specific security hole. It copies itself to the new machine (through the security hole), Understanding Computer Viruses then starts replicating itself there. </li></ul><ul><li>Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours. Worms don ’ t even have to be delivered via conventional programs; so-called “ fileless ” worms are recent additions to the virus scene. While in operation, these programs exist only in system memory, making them harder to identify than conventional file-hosted worms. </li></ul>16
  20. 22. <ul><li>A Trojan horse is a program that claims to do one thing but then does something totally different. A typical Trojan horse has a filename that makes you think it ’ s a harmless type of file; it looks innocuous enough to be safe to open. But when you run the file, it ’ s actually a virus program that proceeds to inflict its damage on your system. </li></ul><ul><li>It delivers its payload through deception, just like the fabled Trojan horse of yore. Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. </li></ul>16
  21. 23. <ul><li>Well most people believe that all computer threats are due to a virus, but now we know that there are a lot of different threats beside viruses </li></ul><ul><li>Such as there are spams, trojans, worms, </li></ul><ul><li>From spams we know there are different sorts, such as phishing </li></ul><ul><li>Back to viruses we learnt a little bit of what it does such as how it infects our computer system and destroys it slowly. </li></ul>
  22. 24. <ul><li>http:// </li></ul><ul><li> </li></ul><ul><li>http :// computer_abuse.htm </li></ul><ul><li> spam.jpg </li></ul><ul><li>http :// html </li></ul><ul><li> amazon.com_logo.jpg </li></ul><ul><li> jpg </li></ul><ul><li> jpg </li></ul><ul><li> logo.jpg </li></ul><ul><li> jpg </li></ul><ul><li> Computer.JPG </li></ul><ul><li> virus.jpg </li></ul><ul><li> index.html </li></ul><ul><li> pdf </li></ul><ul><li> / </li></ul><ul><li> PDF.html </li></ul><ul><li> / </li></ul><ul><li>http:// </li></ul><ul><li> FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg-D4/s1600/norton-360.gif </li></ul><ul><li>http:// </li></ul><ul><li>http:// </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>http:// </li></ul>
  23. 25. 24