SlideShare a Scribd company logo
1 of 14
Viruses and Jail Time
Declan Dinnadge, Theodore Sanchez, & Yanling You
What is a Virus?
“A piece of code that is capable of copying itself and
typically has a detrimental effect, such as corrupting
the system or destroying data.” – Google definition
Comes in various types (Brain & Fenlon, n.d.):
Traditional
Email
Trojan
Worm
Ad/Malware
Traditional Virus
First widely seen in the 1980s (Brain & Fenlon, n.d.)
Spread of PCs and downloadable files (Brain &
Fenlon, n.d.)
Small size of operating systems (Brain & Fenlon, n.d.)
Run from the boot sector or backpack off other
program (Brain & Fenlon, n.d.)
Less prevalent today (Brain & Fenlon, n.d.)
Email Virus
Spread through email attachments (Brain & Fenlon,
n.d.)
Triggered by opening the email or
downloading/opening the attachment (Brain &
Fenlon, n.d.)
Replicated by emailing itself to contacts in address
book (Brain & Fenlon, n.d.)
Often a word document “macro” or executable file
(Brain & Fenlon, n.d.)
Email Viruses in History
I LOVE YOU Virus (2000) (Weinberger, 2012)
Activated by clicking on the attachment
Disguised as a love letter from a secret admirer
Corrupted files on the victim’s machine
Became a global pandemic in a matter of hours
MyDoom (2004) (Weinberger, 2012)
Caused a denial of service attack
Infected one million computers
Fastest spreading email virus ever seen prior
Trojan Horse
Disguised as another seemingly harmless program
(Fuller, n.d.)
Works by creating a Trojan “server” on your system
(Fuller, n.d.)
Infects other files on the system (Fuller, n.d.)
Can send information to the developer (Fuller, n.d.)
Creates zombie computers called “botnets” (Fuller,
n.d.)
Worms
Has the ability to copy itself over machines (Brain &
Fenlon, n.d.)
Use up processing power and network bandwidth (Brain &
Fenlon, n.d.)
Exploits holes in an operating system (Brain & Fenlon,
n.d.)
Replicates through networks (Brain & Fenlon, n.d.)
Carry payloads that can do significant damage (Brain &
Fenlon, n.d.)
Worms in History
Code Red (2001) (Weinberger, 2012)
Exploited a flaw in Microsoft Internet Information Server
Brought down the whitehouse.gov website
Slammer (2003) (Weinberger, 2012)
Released packets that slowed down the internet
Affected the Bank of America, a 911 emergency response
system, and a nuclear power plant in Ohio
Fizzer (2003) (Weinberger, 2012)
First worm created for financial gain
Sent out spam
Adware & Malware
Many malware programs are poorly coded (Baratz, 2004)
Comes bundled with other programs (Baratz, 2004)
Can be installed mistakenly by the user (Baratz, 2004)
Places advertisements on screen (pop ups) (Baratz, 2004)
Capture information about you and your computer
(Baratz, 2004)
Hijack your computer (Baratz, 2004)
Can disguise themselves as legitimate programs (Baratz,
2004)
Malware in History
Zeus (2007) (Weinberger, 2012)
Used to compromise identity information
Sells the data to underground markets
Agent.btz (2008) (Weinberger, 2012)
Spread through infected thumb drives
Affected the Pentagon
Considered cyber warfare
Stuxnet (2009-2010) (Weinberger, 2012)
Caused damage in the real world
Damaged machinery
Infected a centrifuge plant in Iran
How to Protect Yourself
Virus Protection Software (Brain & Fenlon, n.d.)
Updates and Patches (Brain & Fenlon, n.d.)
Avoid .exe files unless you are certain of their origin
(Brain & Fenlon, n.d.)
Use firewalls (Brain & Fenlon, n.d.)
Skeptical computing (Brain & Fenlon, n.d.)
Be careful – learn about viruses and malware
References
Baratz, A. (2004). Malware: What it is and how to prevent it.
Retrieved from arstechnica:
http://arstechnica.com/security/2004/11/malware/5/
Brain, M., & Fenlon, W. (n.d.). How Computer Viruses Work. Retrieved
from How Stuff Works:
http://computer.howstuffworks.com/virus1.htm
Fuller, J. (n.d.). How Trojan Horses Work. Retrieved from How Stuff
Works: http://computer.howstuffworks.com/trojan-horse2.htm
Weinberger, S. (2012). Top-Ten Most Destructive Computer Viruses.
Retrieved from Smithsonian Mag:
http://www.smithsonianmag.com/science-nature/top-ten-most-
destructive-computer-viruses-159542266/?all

More Related Content

Viewers also liked

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
Ch 23_lecture_presentation
 Ch 23_lecture_presentation Ch 23_lecture_presentation
Ch 23_lecture_presentationakinght82
 
Challenges & opprtunities in brand extensions
Challenges & opprtunities in brand extensionsChallenges & opprtunities in brand extensions
Challenges & opprtunities in brand extensionsKhushbu Bhardwaj
 
Netflix – A Game Changer in Internet streaming media
Netflix – A Game Changer in Internet streaming mediaNetflix – A Game Changer in Internet streaming media
Netflix – A Game Changer in Internet streaming mediaAshish Arora
 
Cartilage & bone connective tissue
Cartilage & bone connective tissueCartilage & bone connective tissue
Cartilage & bone connective tissueguesta1e33cdf
 
BP's Deepwater Oil Spill Case Study Analysis - Business Ethics
BP's Deepwater Oil Spill Case Study Analysis - Business EthicsBP's Deepwater Oil Spill Case Study Analysis - Business Ethics
BP's Deepwater Oil Spill Case Study Analysis - Business EthicsÔn Thi
 
3.2.1 Models of Health
3.2.1 Models of Health3.2.1 Models of Health
3.2.1 Models of Healthjkonoroth
 

Viewers also liked (10)

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Ch 23_lecture_presentation
 Ch 23_lecture_presentation Ch 23_lecture_presentation
Ch 23_lecture_presentation
 
Challenges & opprtunities in brand extensions
Challenges & opprtunities in brand extensionsChallenges & opprtunities in brand extensions
Challenges & opprtunities in brand extensions
 
Netflix – A Game Changer in Internet streaming media
Netflix – A Game Changer in Internet streaming mediaNetflix – A Game Changer in Internet streaming media
Netflix – A Game Changer in Internet streaming media
 
Cartilage & bone connective tissue
Cartilage & bone connective tissueCartilage & bone connective tissue
Cartilage & bone connective tissue
 
Proyecto de grado
Proyecto de gradoProyecto de grado
Proyecto de grado
 
INTELIGENCIAS MULTIPLES
INTELIGENCIAS MULTIPLESINTELIGENCIAS MULTIPLES
INTELIGENCIAS MULTIPLES
 
BP's Deepwater Oil Spill Case Study Analysis - Business Ethics
BP's Deepwater Oil Spill Case Study Analysis - Business EthicsBP's Deepwater Oil Spill Case Study Analysis - Business Ethics
BP's Deepwater Oil Spill Case Study Analysis - Business Ethics
 
Functionalist Social Theory
Functionalist Social TheoryFunctionalist Social Theory
Functionalist Social Theory
 
3.2.1 Models of Health
3.2.1 Models of Health3.2.1 Models of Health
3.2.1 Models of Health
 

Similar to Viruses and jail time (20)

W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 

Recently uploaded

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

Viruses and jail time

  • 1. Viruses and Jail Time Declan Dinnadge, Theodore Sanchez, & Yanling You
  • 2. What is a Virus? “A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.” – Google definition Comes in various types (Brain & Fenlon, n.d.): Traditional Email Trojan Worm Ad/Malware
  • 3. Traditional Virus First widely seen in the 1980s (Brain & Fenlon, n.d.) Spread of PCs and downloadable files (Brain & Fenlon, n.d.) Small size of operating systems (Brain & Fenlon, n.d.) Run from the boot sector or backpack off other program (Brain & Fenlon, n.d.) Less prevalent today (Brain & Fenlon, n.d.)
  • 4. Email Virus Spread through email attachments (Brain & Fenlon, n.d.) Triggered by opening the email or downloading/opening the attachment (Brain & Fenlon, n.d.) Replicated by emailing itself to contacts in address book (Brain & Fenlon, n.d.) Often a word document “macro” or executable file (Brain & Fenlon, n.d.)
  • 5. Email Viruses in History I LOVE YOU Virus (2000) (Weinberger, 2012) Activated by clicking on the attachment Disguised as a love letter from a secret admirer Corrupted files on the victim’s machine Became a global pandemic in a matter of hours MyDoom (2004) (Weinberger, 2012) Caused a denial of service attack Infected one million computers Fastest spreading email virus ever seen prior
  • 6.
  • 7. Trojan Horse Disguised as another seemingly harmless program (Fuller, n.d.) Works by creating a Trojan “server” on your system (Fuller, n.d.) Infects other files on the system (Fuller, n.d.) Can send information to the developer (Fuller, n.d.) Creates zombie computers called “botnets” (Fuller, n.d.)
  • 8. Worms Has the ability to copy itself over machines (Brain & Fenlon, n.d.) Use up processing power and network bandwidth (Brain & Fenlon, n.d.) Exploits holes in an operating system (Brain & Fenlon, n.d.) Replicates through networks (Brain & Fenlon, n.d.) Carry payloads that can do significant damage (Brain & Fenlon, n.d.)
  • 9. Worms in History Code Red (2001) (Weinberger, 2012) Exploited a flaw in Microsoft Internet Information Server Brought down the whitehouse.gov website Slammer (2003) (Weinberger, 2012) Released packets that slowed down the internet Affected the Bank of America, a 911 emergency response system, and a nuclear power plant in Ohio Fizzer (2003) (Weinberger, 2012) First worm created for financial gain Sent out spam
  • 10.
  • 11. Adware & Malware Many malware programs are poorly coded (Baratz, 2004) Comes bundled with other programs (Baratz, 2004) Can be installed mistakenly by the user (Baratz, 2004) Places advertisements on screen (pop ups) (Baratz, 2004) Capture information about you and your computer (Baratz, 2004) Hijack your computer (Baratz, 2004) Can disguise themselves as legitimate programs (Baratz, 2004)
  • 12. Malware in History Zeus (2007) (Weinberger, 2012) Used to compromise identity information Sells the data to underground markets Agent.btz (2008) (Weinberger, 2012) Spread through infected thumb drives Affected the Pentagon Considered cyber warfare Stuxnet (2009-2010) (Weinberger, 2012) Caused damage in the real world Damaged machinery Infected a centrifuge plant in Iran
  • 13. How to Protect Yourself Virus Protection Software (Brain & Fenlon, n.d.) Updates and Patches (Brain & Fenlon, n.d.) Avoid .exe files unless you are certain of their origin (Brain & Fenlon, n.d.) Use firewalls (Brain & Fenlon, n.d.) Skeptical computing (Brain & Fenlon, n.d.) Be careful – learn about viruses and malware
  • 14. References Baratz, A. (2004). Malware: What it is and how to prevent it. Retrieved from arstechnica: http://arstechnica.com/security/2004/11/malware/5/ Brain, M., & Fenlon, W. (n.d.). How Computer Viruses Work. Retrieved from How Stuff Works: http://computer.howstuffworks.com/virus1.htm Fuller, J. (n.d.). How Trojan Horses Work. Retrieved from How Stuff Works: http://computer.howstuffworks.com/trojan-horse2.htm Weinberger, S. (2012). Top-Ten Most Destructive Computer Viruses. Retrieved from Smithsonian Mag: http://www.smithsonianmag.com/science-nature/top-ten-most- destructive-computer-viruses-159542266/?all