Computer Viruses & Management Strategies

2,651 views
2,463 views

Published on

- What's Malware
- Spyware, Adware, Backdoor
- What's A Computer Virus
- Why Computer Malware(Virus)
- How Viruses Are Created
- How Viruses Are Spread
- Types Of Malware
- Types Of Viruses
- How To Detect A Malware(Virus)
- How To Protect Yourself
- Top Anti-Virus Programs
- BuzzWords
- Bottom Line

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,651
On SlideShare
0
From Embeds
0
Number of Embeds
221
Actions
Shares
0
Downloads
279
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Computer Viruses & Management Strategies

  1. 1. Computer Viruses & Management Strategies Dasun Hegoda Software Engineer
  2. 2. What we are going to talk ● What's Malware ● Spyware, Adware, Backdoor ● What's A Computer Virus ● Why Computer Malware(Virus) ● How Viruses Are Created ● How Viruses Are Spread ● Types Of Malware ● Types Of Viruses
  3. 3. What we are going to talk ● How To Detect A Malware(Virus) ● How To Protect Yourself ● Top Anti-Virus Programs ● BuzzWords ● Bottom Line
  4. 4. Malware Definitions
  5. 5. Malware Definitions ● ● ● Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  6. 6. Spyware, Adware, Backdoor
  7. 7. Spyware ● ● ● ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information. Some spyware can interfere with your computer's system settings, which can result in a slower internet connection.
  8. 8. Adware ● ● ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  9. 9. Backdoor ● ● ● ● A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  10. 10. Computer Virus Definitions
  11. 11. What's A Computer Virus ● ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
  12. 12. What's A Computer Virus ● ● ● The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  13. 13. World 1st Computer Virus ● ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  14. 14. Why Computer Malware(Virus)
  15. 15. Why Computer Malware(Virus) ● Seeking profit ● Desire to send a political message ● Personal amusement ● To demonstrate that a vulnerability exists in software ● For sabotage and denial of service ● To explore evolutionary algorithms ● Cause systems failures. ● Steal information. ● To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
  16. 16. How Viruses Are Created
  17. 17. How Viruses Are Created ● ● ● ● The first step is that someone will create the virus. The 2nd step is to pick out the program that the person wants to attach to. The 3rd step is attaching the virus to the program. The 4th step is to try to lure or advertise the program, so someone will download it in to your computer. ● The 5th step is to have the virus get in to the computer. ● The 6th step is to infect the computer. ● The 7th step is to destroy all of the files on the computer & more.
  18. 18. How Viruses Are Spread
  19. 19. How Viruses Are Spread ● Email attachments ● ● Rogue Websites ● ● Networks Instant Messaging Fake Anti Virus Software Infected Boot Disks ● From Mobile Devices ● Phishing Schemes ● Friends and Relatives ● Infected Software ● Hackers ●
  20. 20. Types Of Malware
  21. 21. Types Of Malware ● ● Trojan horses : A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms : A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  22. 22. Types Of Malware ● Viruses : A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
  23. 23. Types Of Malware ● E-mail viruses : An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  24. 24. Types Of Viruses
  25. 25. Types Of Viruses ● Boot Sector Virus ● Browser Hijacker ● Direct Action Virus ● File Infector Virus ● Macro Virus ● Multipartite Virus ● Polymorphic Virus ● Resident Virus ● Web Scripting Virus
  26. 26. How To Detect A Virus
  27. 27. How To Detect A Malware(Virus)? ● Programs takes longer to load. ● The programs sizes keep changing. ● The drive light keeps flashing when you are not doing anything(Loading). ● User created files have strange names. ● The computer doesn't remember CMOS settings. ● System crashes for no reason. ● Screen sometimes flicker. ● Files/directories sometimes disappear.
  28. 28. How To Detect A Malware(Virus)? ● It might change the power ratings of your computer and could blast the system. ● You cannot print items correctly. ● Disks or disk drives are inaccessible. ● Applications on the computer do not work correctly. ● Strange sounds or music plays from the speakers unexpectedly. ● Computer restarts every few minutes automatically. ● …........
  29. 29. How To Protect Yourself
  30. 30. How To Protect Yourself ● Use Antivirus Programs ● Use Firewalls ● Make Passwords Encrypted ● Scan your PC Daily ● Switch off net when not using ● Don’t download software from unknown source ● Disable Auto run ● Read reviews before installing software
  31. 31. How To Protect Yourself ● Download anti-spyware program ● Don’t open e-mail that you are not sure ● Keep backups ● Keep OS up to date ● Scan removable storages
  32. 32. Top Anti-Virus Programs
  33. 33. Top Anti-Virus Programs ● Bitdefender Antivirus ● Kaspersky Anti-Virus ● Norton AntiVirus ● F-Secure Anti-Virus ● AVG Anti-Virus ● Avast! Pro Antivirus ● McAfee AntiVirus ● Panda Antivirus Pro
  34. 34. Buzzwords
  35. 35. FireWalls ● ● A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
  36. 36. FireWalls
  37. 37. Antivirus software ● ● ● Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
  38. 38. Boot sector ● ● A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program (usually, but not necessarily, an operating system) stored on the same storage device.
  39. 39. Encryption ● ● ● Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. The message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
  40. 40. That's It!!!
  41. 41. Bottom Line ● ● Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source anti-virus tools have been developed, and a multi-billion dollar industry of anti-virus software vendors has cropped up, selling virus protection to Windows users. Unfortunately, no currently existing anti-virus software is able to catch all computer viruses.
  42. 42. References ● www.makeuseof.com/tag/types-computer-viruses-watch/

×