Your SlideShare is downloading. ×
  • Like
Presentation File
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Presentation File

  • 1,459 views
Published

 

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,459
On SlideShare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
66
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependent upon a host file, and the transfer of files between machines to spread, while a worm can run independently and spread through network connection.
  • Viruses are usually spread when humans send e-mail document attachments, transfer documents from one computer to another using diskette, or copy files to file servers. Once the user receives the infected files the virus begins to spread throughout their computers. Slowly the virus will begin to invade all the files on that computer.
  • Worms run independently of human action. They usually utilize a security hole in a piece of software and move around and infect other machines over a network. Worms scan a network for another machine that has a specific security hole and copies itself to the new machine using the security hole, this allows the worm to spread rapidly (worms can be sent as e-mails and once the e-mail is opened the worm is initialized and attacks all machines with the same security hole).
  • Though it is almost impossible to totally protect one’s computer from worm and viruses, there are precautionary measures one can take in order minimize the chance of being a victim.
  • Question1: What is the biggest difference between a worm and a virus? Answer1: The method in which they reproduce and spread. Question2: What was the first worm named, and what was it’s purpose? Answer2: Creeper. It was used notify air traffic controllers when the controls of a plane moved from one computer to another. Question3: List 2 ways a virus can be spread from one computer to another. Answer 3: Through a diskette or e-mail attachments.

Transcript

  • 1. Worms & Presented by Ashley Blakemore CIS 121 Professor Hardnett Viruses
  • 2. WHAT IS A VIRUS ?
    • A virus is a program that is able to
    • spread itself from one file to another
    • file on a single computer. They slowly
    • infect every file on a computer.
  • 3. WHAT IS A WORM ? A worm is a computer program that has the ability to copy itself from machine to machine. Worms are able to move from machine to machine and infect them through computer networks .
  • 4. So what’s the difference ?
    • Viruses
    • - dependent upon a host file
    • -need the help of
    • humans to spread
    • - take a while to spread
    • Worms
    • - rely little or not at
    • all on humans to
    • spread
    • -spread across a network
    • - spread rapidly
  • 5. How do these infections spread?
    • Viruses Spread:
    • - when humans send e-mail document attachments
    • when humans transfer documents from one computer to another using a diskette
    • when humans copy files to file servers
  • 6.
    • Worms Spread:
    • - independently of human action
    • - usually by utilizing a security hole in a piece of software
    • - by scanning a network for another machine that has a specific security hole and copies itself to the new machine using the security hole
  • 7. Computer Networks and Security Holes
    • A computer network
    • is simply a set of
    • independent computers
    • systems connected by
    • tele-communication links
    • with the purpose of
    • sharing information and
    • resources.
    • Security holes are simply
    • gaps in an operating
    • system or program.
    • Usually all the computers of
    • a network have the same
    • security hole, therefore
    • worms are able to attack
    • all computers in a network.
  • 8. History of Worms
    • The first worms were actually designed
    • for good and not to harm networks .
    • 1971 Bob Thomas developed a worm (it was not yet called a worm), “Creeper”, for air traffic controllers (ATC)
    • This worm would notify ATC when the controls of a plane moved from one computer to another.
    • The difference from most worms is that this worm did not reproduce itself.
  • 9. History of Worms
    • The idea behind developing worms slowly
    • faded, only a few people kept experimenting
    • with worms.
    • In the 1980’s John Shock and Jon Hepps, of Xerox’s Palo Alto Research Center, began working on worm programs. Both created 5 worms that were designed to do certain tasks around the network.
    • Some of the worms developed were very simple programs, some were very complicated. When one of the worms malfunctioned, Shock and Hepps realized the destructive possibilities of these self-replicating programs.
  • 10. History of Viruses
    • Computer viruses have been around for years.
    • At first viruses were thought only to spread
    • through diskettes, but time has shown us that
    • isn’t the case.
    • In 1986 the first PC virus was created, the “Brain”. It was written in Pakistan.
    • The Brain virus was a boot sector virus, which meant it only infected the boot records of 360K floppy disks.
    • It would occupy unused space on the disk so that it could not be used.
    • This virus was the first stealth virus, which meant it could not be detected.
  • 11. History of Viruses
    • As time progressed many other types of viruses
    • were developed.
    • In 1992, four students at Cornell University created the MBDF virus.
    • This virus attacked Apple Macintosh computers.
    • The virus was released in three shareware programs: Obnoxious Tetris (computer game), Ten Tile Puzzle (computer game), and Tetriscycle (Trojan Horse program).
    • This virus was benign, but the perpetrators were severely punished.
  • 12. Results of Worms and Viruses
    • Malicious programs (worms and viruses), delete or alter data in files on hard drives.
    • Malicious programs clog e-mail servers and delay receipt of useful e-mail.
    • Malicious programs can cost millions of dollars to get rid of and recover from.
  • 13. How we become victims of worms and viruses
    • Opening unfamiliar e-mails
    • Using unmarked/unfamiliar diskettes
    • Opening e-mail attachments
    • Downloading games and software from the internet
  • 14. Famous Worms and Viruses
    • Brain Virus
    • Lehigh Virus
    • Christmas Worm
    • Morris Worm
    • MBDF Virus
    • Melissa Virus
    • ILOVEYOU Worm
    • Anna Worm
  • 15. Tying in with CIS121
    • Worm and viruses are simply programs
    • Someone designed them to be destructive
    • The skill of programming (in any language) is needed not only to create them but to deactivate them
    • Knowledge of computer networks allows one to understand how a worm spreads
  • 16. Bibliography
    • Denning, Peter J., editor, Computers Under Attack , Addison-Wesley, 1990. A
    • Collection of reprinted articles.
    • Page, Bob, A Report on the Internet Worm , University of Lowell, 5pp., 7 Nov
    • 1988.
    • Slade, Robert M., History of Computer Viruses , 1992.
    • Standler, Ronald B. “Examples of Malicious Computer Programs”. 2002
    • <http://www.rbs2.com/cvirus.htm>.
    • Brouwer, Mark W. “The AntiVirus Resource: Virus or Hoax”. 1997
    • < http://www.virusall.com/worms.html >.
    • Unknown Author. “Computer Worms, an Introduction”.
    • <http://www.asianlaws.org/cyberlaw/library/cc/what_worm.htm>.