SlideShare a Scribd company logo
1 of 31
MOST RECENT ATTACKS BY
VIRUS,
WORMS & TROJANS
INDEX
   VIRUS
•    What Is Computer Virus?
•    History Of Computer Virus.
•    Background
•    Virus Through The Internet.
•    Symptoms Of Virus Attack.
•    Typical Things That Computer
•    Viruses Do.
•    Prevention of Virus.
   WORMS
•   What Is Worms?
•   History Of Worms.
•   Anatomy of Worms.
•   Types Of Worms.
•   Harmful Effects Of Worms.
•   Prevention of Worms
   TROJANS
•    What Are Trojans?
•    Types Of Trojans.
•    What Trojans Can Do.
•    Detection Of Trojans.
•    Prevention of Trojans
   COUNTER-MEASURE OF TROJAN,VIRUS,WORMS
   DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
VIRUS
 A computer virus is a computer program that can copy
  itself and infect a computer.
 The term "virus" is also commonly used to refer to other
  types of malware, adware and spyware.
 Viruses can increase their chances of spreading to other
  computers by infecting files on a network file system or
  a file system that is accessed by another computer.
 Once it’s running, it spreads by inserting copies of itself
  into other executable code or documents
THE HISTORY OF COMPUTER VIRUSES

•   1981 Apple Viruses 1, 2, & 3
•   1980’s Fred Cohen
•   1987 Lehigh Virus
•   1988 The first anti virus software
•   1990 The first polymorphic viruses
•   1991 Symantec releases Norton Anti Virus
•   1992 The Michelangelo Virus
•   1994 Kaos4 virus spreads via adult websites.
•   1996 The Concept virus
•   1999 The Melissa Virus
•   2000 The I Love You Virus
•   2001 The Code Red Worm
•   2003 The Slammer Worm.
•   2004 MyDoom
BACKGROUND
 There are estimated 30,000 computer viruses in existence
 Over 300 new ones are created each month

 First virus was created to show loopholes in software



Virus through the Internet
  Today almost 87% of all viruses are spread through
   the internet (source: ZDNet)
  Transmission time to a new host is relatively
   low, on the order of hours to days
  “Latent virus”
SYMPTOMS OF VIRUS ATTACK
 Computer runs slower then usual
 Computer no longer boots up

 Screen sometimes flicker

 PC speaker beeps periodically

 System crashes for no reason

 Files/directories sometimes disappear

 Denial of Service (DOS)
TYPICAL THINGS THAT SOME CURRENT
PERSONAL COMPUTER (PC) VIRUSES DO
 Display a message.
 Erase files

 Scramble data on a hard disk

 Cause erratic screen behavior

 Halt the PC

 Many viruses do nothing obvious at all except spread!
PREVENTION OF VIRUS
• Most antivirus are capable of detecting and removal of
  major virus.
• Get the latest Anti-Virus Software.
• As prevention is concern use of any detection tool is
  preferred e.g. adware, spyware.
• Not to open any unknown source downloads. To prevent
  attacks.
• Even after using these precautions, if the virus creeps
  into your system, it can be detected in various ways
  apart from using a virus scanner for it.
• Always keep backup of your data/programs
• Keep floppies Write-protected (especially if they are
  bootable.)
WORMS
 The actual term "worm"' was first used in John Brunner’s
  1975 novel, The Shockwave Rider.
 A computer worm is a self-replicating malware
  computer program, which uses a computer network to
  send copies of itself to other nodes and it may do so
  without any user intervention.
 Unlike a computer virus, it does not need to attach itself
  to an existing program. Worms almost always cause at
  least some harm to the network, even if only by
  consuming bandwidth, whereas viruses almost always
  corrupt or modify files on a targeted computer.
HISTORY OF WORMS
 The  first worm to attract wide attention, the
  Morris worm, was written by Robert Tappan
  Morris, who at the time was a graduate student at
  Cornell University.
 It was released on November 2, 1988
 Morris himself was convicted under the US
  Computer Crime and Abuse Act and received
  three years probation, community service and a
  fine in excess of $10,000.
ANATOMY OF WORMS
   Attack Mechanism
   Payload
   New target selection
TYPES OF WORMS
   Conficker Worm
   Email and Instant Message Worms
   Internet Worms (Morris Worm)
   IRC Worms
   File-Sharing Network Worms
   Slapper Worm
HARMFUL EFFECTS OF WORMS
 A worm uses a compromised system to spread through
  email, file sharing networks, instant messenger, online
  chats and unprotected network shares.
 Infects files, corrupts installed applications and damages
  the entire system.
 Steals or discloses sensitive personal
  information, Valuable documents, passwords, etc.
 The worm installs a backdoor or drops other dangerous
  parasite.
 Connection speed & System performance.
TROJANS
 A Trojan horse or Trojan, is a destructive program that
  masquerades as an application.
 The Trojan Horse, at first glance will appear to be useful
  software but will actually do damage once installed or
  run on your computer.
 Trojans are also known to create a backdoor on your
  computer that gives malicious users access to your
  system.
 Unlike viruses and worms, Trojans do not reproduce by
  infecting other files nor do they self-replicate.
 Some well known Trojans:Net-bus,Girl friend, Back
  orrifice ,Flooder, Vundo Trojan etc.
PREVENTION OF WORMS
• A personal firewall should be run on any system that
is not behind a corporate firewall. This should be done
on any computer that connects to the internet.

•Patching your system with updates to fix the
vulnerabilities.

•Patching is the act of downloading updates to the
vulnerable operating system or application and
applying the update to the program.

•sometimes the worm can infect the system before the
anti-virus software can detect it.
TYPES OF TROJANS
1)   Remote access Trojans
2)   Password sending Trojans
3)   Keyloggers
4)   Destructive
5)   Denial of service(DOS) Attack Trojans
6)   Mail-Bomb Trojans
7)   Proxy-Wingate Trojans
8)   FTP Trojans
9)   Software Detection Trojans
WHAT TROJANS CAN DO?
 Use  of the machine as part of a Botnet (e.g. to
  perform automated spamming or to distribute
  Denial-of-service.)
 Uninstallation of software, including third-party
  router drivers.
 Downloading or uploading of files on the
  network hdd.
 Watching the user’s screen.
 Spreading other malware? Such as viruses. In
  this case? The Trojan horse is called a dropper or
  vector.
WHAT TROJANS CAN DO?
 Modification  or deletion of files.
 Data theft(e.g. retrieving username or postal
  code information)
 Erasing or overwriting data on a computer.

 Encrypting files in a crypto viral extortion
  attack.
 Crashing the computer.

 Corrupting files in a subtle way.

 Setting up networks of zombie computers in
  order to launch Dodos attacks or send spam.
WHAT TROJANS CAN DO?
 Spying   on the user of a computer and covertly
  reporting data like browsing habits to other
  people.
 Logging keystrokes to stealing formation such as
  passwords and credit card numbers (also known
  as a key logger)
 Phish for bank or other account details? Which
  can be used for criminal activities.
 Installing a backdoor on a computer system
DETECTION OF TROJANS
a)   Suspicious open ports:
b)   Monitoring outgoing traffic:
c)   Detection tools:
d)   Start up files:
PREVENTION OF TROJAN

• One of most important difference between
  Trojan and his friends is that it does not
  replicate.

• Thus limit the destruction.

• Anti-virus can detect and safely deleted
  the Trojan.
COUNTER-MEASURE OF
TROJAN,VIRUS,WORMS
  •Virus
    -Virus detection/disinfection software

  •Trojan
    -Sandboxing
    - Code reviews

  •Worms
    -Sandboxing
    -Quick patching: fix holes, stop worm
DIFFERENCE BETWEEN VIRUS,WORMS &
             TROJANS
               VIRUS           WORMS               TROJAN
             A computer       A computer
Definition                    WORM is a self-
                                                     S
             virus attaches                       A Trojan, is
             itself it        contained
                              program (or set     software that
             travels to a
                              of programs),       appears to
             program or       that is able to     perform a
             file             spread              desirable
             enabling it to   functional copies   function for
             spread from      of itself or its    the user prior
             one computer     segments to
                                                  to run or
             to another,      other computer
                              systems (usually
                                                  install, but
             leaving                              steals
             infections       via network
                              connections).       information or
                                                  harms the
                                                  system
VIRUS         WORMS      TROJANS
TYPES   1.Trojan Horse             1.Remote
        2.Worm         1. “host    Access
        3.Macro        computer    Trojans
                       worms” &    2.Data
                                   Sending
                      2.”network
                                   Trojans
                      worms”.
                                   3.Destructive
                                   Trojans
                                   4.Proxy
                                   Trojans
                                   5.FTP
                                   Trojans
                                   6.security
                                   software
                                   disabler
                                   Trojans
                                   7.DoS
                                   Trojans
VIRUS            WORMS            TROJANS
What they   virus may exist   the worm          cause serious
            on your           consumes too      damage by
do?         computer but it   much system       deleting files and
            actually cannot   memory (or        destroying
            infect your       network           information on
            computer unless   bandwidth),       your system.
            you run or open   causing Web
            the malicious     servers,
            program           network servers
                              and individual
                              computers to
                              stop responding




EXISTENCE       NOT     NOT                     INDEPENDENT
            INDEPENDENT INDEPENDENT
VIRUS            WORMS             TROJANS
SELF-       . A virus attaches a worm is self-        Unlike virus and
REPLICATION itself to, and     contained and          worms
                becomes part of,   does not need to   Trojans do not
                another            be part of         reproduce by
                executable         another program    infecting other
                program            to propagate       files nor do they
                                   itself.            self-replicate.
VIRUS              WORMS           TROJANS
Propagation
              virus does not     Worms           . Trojans are
              have a             propagate and   also known to
              propagation        infect other    create a
              vector. i.e., it   computers.      backdoor on
              will only effect                   your computer
              one host and                       that gives
              does not                           malicious users
              propagate to                       access to your
              other hosts.                       system,
                                                 possibly
                                                 allowing
                                                 confidential or
                                                 personal
                                                 information to
                                                 be
                                                 compromised
VIRUS    WORMS      TROJAN
EXAMPLE   Melissa   Nimda,       S
S                   Code Red   I Love You
BIBLIOGRAPHY

•Virus-
http:// en.wikipedia.org/wiki/Computer_virus
•Trojan
http:// en.wikipedia.org/wiki/Trojan_horse
•Worm-
http://en.wikipedia.org/wiki/Computer_worm
Trojan Horses -
http://www.mpsmits.com/highlights/trojan_horses.sh
tml
Internet Security

More Related Content

What's hot

Realtime Sentiment Analysis Application Using Hadoop and HBase
Realtime Sentiment Analysis Application Using Hadoop and HBaseRealtime Sentiment Analysis Application Using Hadoop and HBase
Realtime Sentiment Analysis Application Using Hadoop and HBaseDataWorks Summit
 
Control hijacking
Control hijackingControl hijacking
Control hijackingG Prachi
 
estimation-for-software-projects-chapter-26-ppt.pptx
estimation-for-software-projects-chapter-26-ppt.pptxestimation-for-software-projects-chapter-26-ppt.pptx
estimation-for-software-projects-chapter-26-ppt.pptxubaidullah75790
 
Research Scope in Parallel Computing And Parallel Programming
Research Scope in Parallel Computing And Parallel ProgrammingResearch Scope in Parallel Computing And Parallel Programming
Research Scope in Parallel Computing And Parallel ProgrammingShitalkumar Sukhdeve
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance Systemprakashjjaya
 
إنشاء استبيان إلكتروني باستخدام نماذج جوجل
إنشاء استبيان إلكتروني باستخدام نماذج جوجلإنشاء استبيان إلكتروني باستخدام نماذج جوجل
إنشاء استبيان إلكتروني باستخدام نماذج جوجلفراس حلايبه
 
Design concept -Software Engineering
Design concept -Software EngineeringDesign concept -Software Engineering
Design concept -Software EngineeringVarsha Ajith
 
Parallel computing
Parallel computingParallel computing
Parallel computingVinay Gupta
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting systemAj Maurya
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
Chapter 22- Software Configuration Management.ppt
Chapter 22- Software Configuration Management.pptChapter 22- Software Configuration Management.ppt
Chapter 22- Software Configuration Management.pptTanzinAhammad
 
Unit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxUnit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxDARKKNIGHT116809
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
 

What's hot (20)

Realtime Sentiment Analysis Application Using Hadoop and HBase
Realtime Sentiment Analysis Application Using Hadoop and HBaseRealtime Sentiment Analysis Application Using Hadoop and HBase
Realtime Sentiment Analysis Application Using Hadoop and HBase
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
 
An introduction to software engineering
An introduction to software engineeringAn introduction to software engineering
An introduction to software engineering
 
estimation-for-software-projects-chapter-26-ppt.pptx
estimation-for-software-projects-chapter-26-ppt.pptxestimation-for-software-projects-chapter-26-ppt.pptx
estimation-for-software-projects-chapter-26-ppt.pptx
 
Research Scope in Parallel Computing And Parallel Programming
Research Scope in Parallel Computing And Parallel ProgrammingResearch Scope in Parallel Computing And Parallel Programming
Research Scope in Parallel Computing And Parallel Programming
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Ch4 memory management
Ch4 memory managementCh4 memory management
Ch4 memory management
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
إنشاء استبيان إلكتروني باستخدام نماذج جوجل
إنشاء استبيان إلكتروني باستخدام نماذج جوجلإنشاء استبيان إلكتروني باستخدام نماذج جوجل
إنشاء استبيان إلكتروني باستخدام نماذج جوجل
 
Design concept -Software Engineering
Design concept -Software EngineeringDesign concept -Software Engineering
Design concept -Software Engineering
 
Multimedia
Multimedia Multimedia
Multimedia
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
cache memory
 cache memory cache memory
cache memory
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Chapter 22- Software Configuration Management.ppt
Chapter 22- Software Configuration Management.pptChapter 22- Software Configuration Management.ppt
Chapter 22- Software Configuration Management.ppt
 
Unit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxUnit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptx
 
Data-Persistency
Data-PersistencyData-Persistency
Data-Persistency
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
 

Viewers also liked

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the emailGianni Fiore
 

Viewers also liked (18)

virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 

Similar to Internet Security

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 

Similar to Internet Security (20)

Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Information security
Information securityInformation security
Information security
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Mitppt
MitpptMitppt
Mitppt
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 

Recently uploaded

Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Celine George
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxRizwan Abbas
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 

Recently uploaded (20)

“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 

Internet Security

  • 1. MOST RECENT ATTACKS BY VIRUS, WORMS & TROJANS
  • 2. INDEX  VIRUS • What Is Computer Virus? • History Of Computer Virus. • Background • Virus Through The Internet. • Symptoms Of Virus Attack. • Typical Things That Computer • Viruses Do. • Prevention of Virus.  WORMS • What Is Worms? • History Of Worms. • Anatomy of Worms. • Types Of Worms. • Harmful Effects Of Worms. • Prevention of Worms  TROJANS • What Are Trojans? • Types Of Trojans. • What Trojans Can Do. • Detection Of Trojans. • Prevention of Trojans  COUNTER-MEASURE OF TROJAN,VIRUS,WORMS  DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
  • 3. VIRUS  A computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly used to refer to other types of malware, adware and spyware.  Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.  Once it’s running, it spreads by inserting copies of itself into other executable code or documents
  • 4. THE HISTORY OF COMPUTER VIRUSES • 1981 Apple Viruses 1, 2, & 3 • 1980’s Fred Cohen • 1987 Lehigh Virus • 1988 The first anti virus software • 1990 The first polymorphic viruses • 1991 Symantec releases Norton Anti Virus • 1992 The Michelangelo Virus • 1994 Kaos4 virus spreads via adult websites. • 1996 The Concept virus
  • 5. 1999 The Melissa Virus • 2000 The I Love You Virus • 2001 The Code Red Worm • 2003 The Slammer Worm. • 2004 MyDoom
  • 6. BACKGROUND  There are estimated 30,000 computer viruses in existence  Over 300 new ones are created each month  First virus was created to show loopholes in software Virus through the Internet  Today almost 87% of all viruses are spread through the internet (source: ZDNet)  Transmission time to a new host is relatively low, on the order of hours to days  “Latent virus”
  • 7. SYMPTOMS OF VIRUS ATTACK  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DOS)
  • 8. TYPICAL THINGS THAT SOME CURRENT PERSONAL COMPUTER (PC) VIRUSES DO  Display a message.  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread!
  • 9. PREVENTION OF VIRUS • Most antivirus are capable of detecting and removal of major virus. • Get the latest Anti-Virus Software. • As prevention is concern use of any detection tool is preferred e.g. adware, spyware. • Not to open any unknown source downloads. To prevent attacks. • Even after using these precautions, if the virus creeps into your system, it can be detected in various ways apart from using a virus scanner for it. • Always keep backup of your data/programs • Keep floppies Write-protected (especially if they are bootable.)
  • 10. WORMS  The actual term "worm"' was first used in John Brunner’s 1975 novel, The Shockwave Rider.  A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention.  Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 11. HISTORY OF WORMS  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 12. ANATOMY OF WORMS  Attack Mechanism  Payload  New target selection
  • 13. TYPES OF WORMS  Conficker Worm  Email and Instant Message Worms  Internet Worms (Morris Worm)  IRC Worms  File-Sharing Network Worms  Slapper Worm
  • 14. HARMFUL EFFECTS OF WORMS  A worm uses a compromised system to spread through email, file sharing networks, instant messenger, online chats and unprotected network shares.  Infects files, corrupts installed applications and damages the entire system.  Steals or discloses sensitive personal information, Valuable documents, passwords, etc.  The worm installs a backdoor or drops other dangerous parasite.  Connection speed & System performance.
  • 15. TROJANS  A Trojan horse or Trojan, is a destructive program that masquerades as an application.  The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Trojans are also known to create a backdoor on your computer that gives malicious users access to your system.  Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.  Some well known Trojans:Net-bus,Girl friend, Back orrifice ,Flooder, Vundo Trojan etc.
  • 16. PREVENTION OF WORMS • A personal firewall should be run on any system that is not behind a corporate firewall. This should be done on any computer that connects to the internet. •Patching your system with updates to fix the vulnerabilities. •Patching is the act of downloading updates to the vulnerable operating system or application and applying the update to the program. •sometimes the worm can infect the system before the anti-virus software can detect it.
  • 17. TYPES OF TROJANS 1) Remote access Trojans 2) Password sending Trojans 3) Keyloggers 4) Destructive 5) Denial of service(DOS) Attack Trojans 6) Mail-Bomb Trojans 7) Proxy-Wingate Trojans 8) FTP Trojans 9) Software Detection Trojans
  • 18. WHAT TROJANS CAN DO?  Use of the machine as part of a Botnet (e.g. to perform automated spamming or to distribute Denial-of-service.)  Uninstallation of software, including third-party router drivers.  Downloading or uploading of files on the network hdd.  Watching the user’s screen.  Spreading other malware? Such as viruses. In this case? The Trojan horse is called a dropper or vector.
  • 19. WHAT TROJANS CAN DO?  Modification or deletion of files.  Data theft(e.g. retrieving username or postal code information)  Erasing or overwriting data on a computer.  Encrypting files in a crypto viral extortion attack.  Crashing the computer.  Corrupting files in a subtle way.  Setting up networks of zombie computers in order to launch Dodos attacks or send spam.
  • 20. WHAT TROJANS CAN DO?  Spying on the user of a computer and covertly reporting data like browsing habits to other people.  Logging keystrokes to stealing formation such as passwords and credit card numbers (also known as a key logger)  Phish for bank or other account details? Which can be used for criminal activities.  Installing a backdoor on a computer system
  • 21. DETECTION OF TROJANS a) Suspicious open ports: b) Monitoring outgoing traffic: c) Detection tools: d) Start up files:
  • 22. PREVENTION OF TROJAN • One of most important difference between Trojan and his friends is that it does not replicate. • Thus limit the destruction. • Anti-virus can detect and safely deleted the Trojan.
  • 23. COUNTER-MEASURE OF TROJAN,VIRUS,WORMS •Virus -Virus detection/disinfection software •Trojan -Sandboxing - Code reviews •Worms -Sandboxing -Quick patching: fix holes, stop worm
  • 24. DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS VIRUS WORMS TROJAN A computer A computer Definition WORM is a self- S virus attaches A Trojan, is itself it contained program (or set software that travels to a of programs), appears to program or that is able to perform a file spread desirable enabling it to functional copies function for spread from of itself or its the user prior one computer segments to to run or to another, other computer systems (usually install, but leaving steals infections via network connections). information or harms the system
  • 25. VIRUS WORMS TROJANS TYPES 1.Trojan Horse 1.Remote 2.Worm 1. “host Access 3.Macro computer Trojans worms” & 2.Data Sending 2.”network Trojans worms”. 3.Destructive Trojans 4.Proxy Trojans 5.FTP Trojans 6.security software disabler Trojans 7.DoS Trojans
  • 26. VIRUS WORMS TROJANS What they virus may exist the worm cause serious on your consumes too damage by do? computer but it much system deleting files and actually cannot memory (or destroying infect your network information on computer unless bandwidth), your system. you run or open causing Web the malicious servers, program network servers and individual computers to stop responding EXISTENCE NOT NOT INDEPENDENT INDEPENDENT INDEPENDENT
  • 27. VIRUS WORMS TROJANS SELF- . A virus attaches a worm is self- Unlike virus and REPLICATION itself to, and contained and worms becomes part of, does not need to Trojans do not another be part of reproduce by executable another program infecting other program to propagate files nor do they itself. self-replicate.
  • 28. VIRUS WORMS TROJANS Propagation virus does not Worms . Trojans are have a propagate and also known to propagation infect other create a vector. i.e., it computers. backdoor on will only effect your computer one host and that gives does not malicious users propagate to access to your other hosts. system, possibly allowing confidential or personal information to be compromised
  • 29. VIRUS WORMS TROJAN EXAMPLE Melissa Nimda, S S Code Red I Love You