SlideShare a Scribd company logo
1 of 25
SECURING THE COMPUTER FROM VIRUSES
SUBMITTED TO :- SUBMITTED BY :-
Dr. Shiva Shukla Md.Mustafizur Rahman
Assistant Professor M.Ed. 2nd Semester
Department of Education Regd.No.-17mededu07
Central University of Punjab
Contents…
• What is a computer Virus?
• Types of Computer Virus
• Boot Sector Virus
• Multipartite Virus
• Worm Virus
• E-mail Virus
• Micro Virus
• Computer crime Security and Privacy
• Virus Precautions
• Privacy How Did They Get My Data?
• Privacy Legislation
• Prevention
• Signs Your Computer is Infected
• Computer Virus History
• How to Make Your Home Machine As Secure As at Work
• Steps to help remove a virus
• Total Number of virus by year
• Password Security
What is a Computer Virus?
• A Computer Virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the user.
• A computer Virus can only spread from one computer
to another when its host is taken to the uninfected
computer, for instance by a user Sending it over a
network or the internet, or by carrying it on a
removable medium such as a floppy disk Cd , or USB
drive.
Types of Computer Virus
Boot
Sector
Virus
Multipartite
Virus Worm Virus
E-mail Virus Macro Virus
Boot Sector Virus
 It is a Computer Virus designed to infect the boot
of the disk. It modifies or replaces the executable
program in the boot Sector of the disk preventing
the computer from being able to boot or start up.
 Eg. Disk Killer , Danish boot etc.
Multipartite Virus
 A hybrid of Boot Program / file Viruses. They
infect program files and when the infect the boot
record. When you boot the computer next time
the virus from the boot record loads in memory
and then start infecting other program files on
disk.
Eg. Invader, tequila etc.
Worm Virus
■ A Computer Worm is a Self-replicating computer
program. It uses a network to send copies of itself
to other nodes computer terminals on the network
and it may do so without any user intervention. It
always cause harm to the network, if only by
consuming bandwidth.
Eg. Badtrans, Brontok etc.
E-mail Virus
 In Some attachments, Virus are hidden and you
Should have a virus scanner before you double So if
there is virus I the attachment, it would either won’t
let it open or make Sure the virus is eliminated
before opening.
E.g. ILOVEYou etc.
Macro Virus
 A Macro Virus is associated with application
Software like Word and excel. When opening the
infected document, macro Virus loaded into main
memory and destroys the data Stored in hard disk.
Eg. Relax, Melissa, A and Bablas, W97m etc.
Computer Crime Security and Privacy
Data communications capabilities provides new challenges
• Accidental damage
• Destruction
• Espionage
Keep data
secure
• Medical information
• Salaries
• Bank balances
Keep data
private
Virus Precautions
 Be wary of free software from the Internet
or friends
 Only install programs from diskettes in
sealed packages
 Use virus-scanning software to check any
file or document before loading it onto
your hard disk
Privacy How Did They Get My Data?
• Loans
• Orders via mail
• Magazine subscriptions
• Tax forms
• Applications for schools, jobs, clubs
• Hospital stay
• Advertisers
• Military draft registration
Privacy Legislation
Fair Credit Reporting
Act – 1970
Freedom of
Information Act –
1970
Federal Privacy Act –
1974
Video Privacy Protection act –
1988
Computer Matching and Privacy
Protections Act – 1988
Prevention
• Use antivirus software
• Be aware of the e-mails and attachments
you open
• Check for updates on antivirus software
regularly
• Make sure antivirus software is installed
correctly
Signs Your Computer is Infected
• Functions slower than normal
• Responds slowly and freezes often
• Restarts itself often
• See uncommon error messages,
distorted menus, and dialog boxes
• Notice applications fail to work
correctly
• Fail to print correctly
Computer Virus History
 First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources,
slowing down the productivity.
 -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the
system.
 Early 80,s-Increasing number of programs written by individuals not by software companies.
Programs caused miner viruses called "Trojan horses".
 1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
Computer Virus History
 Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
 1987-Lehigh virus
- the first memory resident file infector that attacked executable files and took control when a
file was opened
 The Jerusalem Virus
-had bugs that re-infected programs that were already infected
 1988: Robert Morris made a worm that invaded ARPANET computers
- disabled 6,000 computers on the network by overflowing their memory banks with copies of
itself
 1991: Norton Anti-Virus software
 1999: "Melissa" virus
Contd…
- infected thousands of computers very fast by sending copies of itself to 50 names in the address
book on Outlook e-mail
- Led to an estimated $80 million in damage and record sales of anti-virus products.
 2000: "I Love You" virus
- was sent by email and infected 10 % of computers in only one day
- created by a young Filipino computer student who did not get punished because then the
Philippines had no laws against hacking which led to the European Union's global
Cybercrime Treaty.
 2001: "Nimda" virus (days after 9/11)
- had 5 ways of infecting systems
 2004
– My Doom spreads through emails and file-sharing software faster than any previous virus or
worm.
– Allows hackers to access the hard drive of the infected computer.
– An estimated one million computers running Windows are affected by the fast-spreading
Sasser computer worm.
Contd…
 The worm does not cause irreparable harm to computers or data, but it does slow computers
and cause some to quit or reboot without explanation.
 2006
– Discovery of the first-ever malware trojan horse for Mac OS X
 2008
– Torpig is a Trojan horse which affects Windows, turning off anti-virus applications.
■ It allows others to access the computer, modifies data, steals confidential information
and installs malware on the victim's computer.
 2009
– Conficker infects anywhere from 9 to 15 million Microsoft server systems.
– French air force, Royal Navy warships and submarines, Sheffield Hospital
network, UK Ministry of Defence, German Bundeswehr and Norwegian Police
were all affected.
Total Number of Viruses by year
1985 2
1987 3
1989 6
1990 142
1991 357
1992 1,161
1993 2,482
1994 3,687
1995 5,626
1996 7,764
1997 11,037
1998 16,726
1999 40,850
2000 44,000
2001 48,000
2002 55,000
2003 62,000
How to Make Your Home Machine As Secure As at Work
• Make sure your computer has good strong passwords
• Passwords should not be dictionary words and should consist of 7+
characters of mixed case including numbers, letters, and symbols.
• Patch your machine regularly
• Install an anti-spyware product
• Use an anti-virus product and update it regularly
• Use a router-based firewall Know what is running on your system
• Use good internet hygiene
Password Security
Hash
Function
Hashed
Password
Salt
Compare
Password
Client
Password
Server
Stored Password
Hashed
Password
Allow/Deny Access
• Password hashed and stored
– Salt added to randomize password & stored on system
• Password attacks launched to crack encrypted password
http://www.albany.edu/~goel/classes/spring2004/msi604/resources.shtml
Steps to help remove a virus
• Visit web site 4 Update and install the latest updates.
• If you currently use antivirus software, visit the manufacturer's Web site,
update your software, and then perform a thorough scan of your computer.
If you don't use antivirus software, subscribe to a service and scan your
computer immediately.
• Download, install, and run the Malicious Software Removal Tool (for
Microsoft Windows XP or Windows 2000 users).
 How to Protect a computer from Viruses
Securing The Computer From Viruses ...

More Related Content

What's hot

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 

What's hot (20)

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
information about virus
information about virusinformation about virus
information about virus
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malware
MalwareMalware
Malware
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
What is malware
What is malwareWhat is malware
What is malware
 
Adware
AdwareAdware
Adware
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Worm
WormWorm
Worm
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 

Similar to Securing The Computer From Viruses ...

Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Virus09
Virus09Virus09
Virus09defler
 

Similar to Securing The Computer From Viruses ... (20)

Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
anti_virus
anti_virusanti_virus
anti_virus
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Virus09
Virus09Virus09
Virus09
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Securing The Computer From Viruses ...

  • 1. SECURING THE COMPUTER FROM VIRUSES SUBMITTED TO :- SUBMITTED BY :- Dr. Shiva Shukla Md.Mustafizur Rahman Assistant Professor M.Ed. 2nd Semester Department of Education Regd.No.-17mededu07 Central University of Punjab
  • 2. Contents… • What is a computer Virus? • Types of Computer Virus • Boot Sector Virus • Multipartite Virus • Worm Virus • E-mail Virus • Micro Virus • Computer crime Security and Privacy • Virus Precautions • Privacy How Did They Get My Data? • Privacy Legislation • Prevention • Signs Your Computer is Infected • Computer Virus History • How to Make Your Home Machine As Secure As at Work • Steps to help remove a virus • Total Number of virus by year • Password Security
  • 3. What is a Computer Virus? • A Computer Virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. • A computer Virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user Sending it over a network or the internet, or by carrying it on a removable medium such as a floppy disk Cd , or USB drive.
  • 4. Types of Computer Virus Boot Sector Virus Multipartite Virus Worm Virus E-mail Virus Macro Virus
  • 5. Boot Sector Virus  It is a Computer Virus designed to infect the boot of the disk. It modifies or replaces the executable program in the boot Sector of the disk preventing the computer from being able to boot or start up.  Eg. Disk Killer , Danish boot etc.
  • 6. Multipartite Virus  A hybrid of Boot Program / file Viruses. They infect program files and when the infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk. Eg. Invader, tequila etc.
  • 7. Worm Virus ■ A Computer Worm is a Self-replicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network and it may do so without any user intervention. It always cause harm to the network, if only by consuming bandwidth. Eg. Badtrans, Brontok etc.
  • 8. E-mail Virus  In Some attachments, Virus are hidden and you Should have a virus scanner before you double So if there is virus I the attachment, it would either won’t let it open or make Sure the virus is eliminated before opening. E.g. ILOVEYou etc.
  • 9. Macro Virus  A Macro Virus is associated with application Software like Word and excel. When opening the infected document, macro Virus loaded into main memory and destroys the data Stored in hard disk. Eg. Relax, Melissa, A and Bablas, W97m etc.
  • 10. Computer Crime Security and Privacy Data communications capabilities provides new challenges • Accidental damage • Destruction • Espionage Keep data secure • Medical information • Salaries • Bank balances Keep data private
  • 11. Virus Precautions  Be wary of free software from the Internet or friends  Only install programs from diskettes in sealed packages  Use virus-scanning software to check any file or document before loading it onto your hard disk
  • 12. Privacy How Did They Get My Data? • Loans • Orders via mail • Magazine subscriptions • Tax forms • Applications for schools, jobs, clubs • Hospital stay • Advertisers • Military draft registration
  • 13. Privacy Legislation Fair Credit Reporting Act – 1970 Freedom of Information Act – 1970 Federal Privacy Act – 1974 Video Privacy Protection act – 1988 Computer Matching and Privacy Protections Act – 1988
  • 14. Prevention • Use antivirus software • Be aware of the e-mails and attachments you open • Check for updates on antivirus software regularly • Make sure antivirus software is installed correctly
  • 15. Signs Your Computer is Infected • Functions slower than normal • Responds slowly and freezes often • Restarts itself often • See uncommon error messages, distorted menus, and dialog boxes • Notice applications fail to work correctly • Fail to print correctly
  • 16. Computer Virus History  First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources, slowing down the productivity.  -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the system.  Early 80,s-Increasing number of programs written by individuals not by software companies. Programs caused miner viruses called "Trojan horses".  1986'Brain virus' - by Amjad and Basit Farooq Alvi. - spread through floppy disks, - infected boot records and not computer hard drives
  • 17. Computer Virus History  Lahore, Pakistani Brain, Brain-A and UIUC virus -took over free space on the floppy disk and hid from detection ”disguised itself by displaying the uninfected boot sector on the disk.”  1987-Lehigh virus - the first memory resident file infector that attacked executable files and took control when a file was opened  The Jerusalem Virus -had bugs that re-infected programs that were already infected  1988: Robert Morris made a worm that invaded ARPANET computers - disabled 6,000 computers on the network by overflowing their memory banks with copies of itself  1991: Norton Anti-Virus software  1999: "Melissa" virus
  • 18. Contd… - infected thousands of computers very fast by sending copies of itself to 50 names in the address book on Outlook e-mail - Led to an estimated $80 million in damage and record sales of anti-virus products.  2000: "I Love You" virus - was sent by email and infected 10 % of computers in only one day - created by a young Filipino computer student who did not get punished because then the Philippines had no laws against hacking which led to the European Union's global Cybercrime Treaty.  2001: "Nimda" virus (days after 9/11) - had 5 ways of infecting systems  2004 – My Doom spreads through emails and file-sharing software faster than any previous virus or worm. – Allows hackers to access the hard drive of the infected computer. – An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm.
  • 19. Contd…  The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation.  2006 – Discovery of the first-ever malware trojan horse for Mac OS X  2008 – Torpig is a Trojan horse which affects Windows, turning off anti-virus applications. ■ It allows others to access the computer, modifies data, steals confidential information and installs malware on the victim's computer.  2009 – Conficker infects anywhere from 9 to 15 million Microsoft server systems. – French air force, Royal Navy warships and submarines, Sheffield Hospital network, UK Ministry of Defence, German Bundeswehr and Norwegian Police were all affected.
  • 20. Total Number of Viruses by year 1985 2 1987 3 1989 6 1990 142 1991 357 1992 1,161 1993 2,482 1994 3,687 1995 5,626 1996 7,764 1997 11,037 1998 16,726 1999 40,850 2000 44,000 2001 48,000 2002 55,000 2003 62,000
  • 21. How to Make Your Home Machine As Secure As at Work • Make sure your computer has good strong passwords • Passwords should not be dictionary words and should consist of 7+ characters of mixed case including numbers, letters, and symbols. • Patch your machine regularly • Install an anti-spyware product • Use an anti-virus product and update it regularly • Use a router-based firewall Know what is running on your system • Use good internet hygiene
  • 22. Password Security Hash Function Hashed Password Salt Compare Password Client Password Server Stored Password Hashed Password Allow/Deny Access • Password hashed and stored – Salt added to randomize password & stored on system • Password attacks launched to crack encrypted password http://www.albany.edu/~goel/classes/spring2004/msi604/resources.shtml
  • 23. Steps to help remove a virus • Visit web site 4 Update and install the latest updates. • If you currently use antivirus software, visit the manufacturer's Web site, update your software, and then perform a thorough scan of your computer. If you don't use antivirus software, subscribe to a service and scan your computer immediately. • Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users).
  • 24.  How to Protect a computer from Viruses