Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cruda, mayday pp tx 2

296 views

Published on

my presentation during 6.09

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cruda, mayday pp tx 2

  1. 1. Objectives• Name some Computer Virus• List different attacks of computer viruses
  2. 2. HISTORY OFCOMPUTER VIRUS
  3. 3. COMPUTER VIRUS
  4. 4. Program that spread,replicateandInterferes computeroperation
  5. 5. How does itAFFECTComputers?
  6. 6. Viruses can• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable
  7. 7. Viruses behave in different ways• Hide in the system• Replace files• Replicate files• Delete files• Run programs• Send files and info• Deny access• Reboot computers• Clog your memory
  8. 8. Email attachmentsRogue WebsitesNetworksInfected storage disksInfected SoftwareFake Anti Virus SoftwarePirated programsFrom Mobile Devices
  9. 9. Different types ofComputer Virus
  10. 10. • Memory Resident Virus • Companion Viruses• Direct Action Viruses • FAT Virus• Overwrite Viruses • Multipartite Virus• Boot Sector Virus • Web Scripting Virus• Macro Virus • Worms• Directory Virus• Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  11. 11. • Memory Resident Virus • Companion Viruses• Direct Action Viruses • FAT Virus• Overwrite Viruses • Multipartite Virus• Boot Sector Virus • Web Scripting Virus• Macro Virus • Worms• Directory Virus• Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  12. 12. OVERWRITE VIRUS deletes information contained in the files that it infects andsometimes reboot the systemEX. Way Trj.Reboot Trivial.88.DDAMAGE: files may be partially or totally useless
  13. 13. DIRECTORY VIRUS (CLUSTER) changing the path that indicates the location of a file and renaming allexecutable to non-executable extensions. When you run the program, you firstrun the virusEX. Dir-2 virus (creeping death)DAMAGE: Once infected, it becomes impossible to locate the original files.
  14. 14. FAT virusDamaged the part of a disk used to store all the information about the location offiles, available space, unusable space, etc.FILE ALLOCATION TABLEEx. Link VirusDamage:cause serious damage to computerreformat needed.
  15. 15. WEB scripting Virusoriginated from websites used for social networking.Attached a link that could lead to other harmful sites.Symptoms Yahoo and Google search will be re-directed Homepage of web browser, desktop background oftenget changed automaticallyDamage: slow down the performance of the machine
  16. 16. Trojans • Disguise as a useful program • steal end-user information (credit card info, banks etc.) • perform destructive harm on the target computer • download additional computer malware Took its name From the Greek myth ‘Trojan Horse’ ex. Chernobyl virus 1998 Damage: perform destructive features on the computer.
  17. 17. Wormsreplicates itself in order to spread to other computerssends out hundreds or thousands of copiescreating a huge devastating effectEx. Morris worm – worth damaged between $10,000,000 and $100,000,000 ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages. 10% of all Internet-connected computers were hit. Damage consumes too much system memory(or network bandwidth), causing Web servers, network servers and individual computers to stop responding
  18. 18. Rootkitallow viruses and malware to “hide in plain sight” by disguising as necessary files thatyour antivirus software will overlookWorst case: control your computer and turn it into ‘Zombie’ “secretly compromised by hacking tools which allow a third party to control the computer and its resourcesremotely”
  19. 19. HOW TO COUNTERCOMPUTER VIRUS
  20. 20. SCAN EMAIL ATTACHMENTS
  21. 21. USE WINDOWS FIREWALL
  22. 22. INSTALL A RELIABLE ANTIVIRUS
  23. 23. AVOID SUSPICIOS WEBSITE
  24. 24. WATCH YOUR DOWNLOADS
  25. 25. Computer Virus• Memory Resident Virus • Companion Viruses• Direct Action Viruses • FAT Virus• Overwrite Viruses • Multipartite Virus• Boot Sector Virus • Web Scripting Virus• Macro Virus • Worms• Directory Virus • Trojans• Polymorphic Virus • Logic Bombs • Rootkits
  26. 26. Viruses can• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable

×