SlideShare a Scribd company logo
1 of 38
COMPUTER FUNDAMENTALS
Computer Threats
Video
• Computer Threats
• Computer Threats
CONTENTS
• Introduction( Viruses, Bombs,
Worms)
• Types of Viruses
• Characteristics of Viruses
• Categories of Viruses
• Computer Security-
–Antivirus Software
–Password, Firewalls
In the beginning, man created
the virus, and it was bad.
• The first computer virus
–Several stories
• Pakistani Brain Virus (1986): This is the first
widely spread IBM Compatible virus. This is
commonly mistaken for the first virus.
• Apple Virus 1 (1981): Boot sector infecting
virus. Possibly created for pirated games.
• Animal (1975) (Univac): “Guess an animal”
game. Copied to other users’ home
directories when run.
1.Introduction
A virus is a program that attaches itself to some
form of host such as legitimate, executable
program.
•Virus lives within the program, which is said
to be ‘infected’.
•Execution of the host program implies
execution of the virus.
•May or may not damage the infected
program.
A virus is able to replicate
•Creates (possibly modified) copies of itself.
Viruses
• Needs to have some form of
distribution
–such as via disks or a computer network.
• Examples: W95.CIH (Chernobyl),
Sampo and Hare
Classifying Viruses: categories
• Boot Sector
• TSR (Terminate and stay resident)
• Multipartite
• Macro
• Companion
• Polymorphic
Boot Sector
• Infects the boot sector on a disk
replaces the original boot sector with itself
• stores the original boot sector somewhere
else or replaces it totally
Virus takes control when the system is
booted
from the diskette
may infect other diskettes that are
inserted, unless they are write protected
may also infects hard disks
Master Boot Record/Boot Sector
Viruses
Boot sector virus (Apple Viruses 1,2,3, “Elk
Cloner”), Pakistani Brain (x86)
TSR
• A terminate and stay resident (TSR)
virus is a virus that stays active in
memory after the application (or
bootstrapping, or disk mounting) has
terminated.
• TSR viruses can be boot sector infectors
or executable infectors.
• The Brain virus is a TSR virus.
Multipartite
• A multipartite virus is a virus that can infect
either boot sectors or executables.
• Such a virus typically has two parts, one for
each type.
• When it infects an executable, it acts as an
executable infector.
• When it infects a boot sector, it works as a
boot sector infector.
Macro
• A macro virus is a virus composed of a
sequence of instructions that is interpreted
rather than executed directly.
• Macro viruses can infect either executables
(Duff’s shell virus) or data files (Highland’s
Lotus 1-2-3 spreadsheet virus).
• Duff’s shell virus can execute on any
system that can interpret the instructions
Macro
• Piece of self-replicating code written in an
application's macro language
􀁺 a macro virus requires an auto-execute macro
􀁺 one which is executed in response to some
event
e.g opening or closing a file or starting an
application
• once the macro virus is running, it can copy
itself to other documents delete files, etc.
Polymorphic
• A virus may be encrypted to try to disguise itself and
hide what it does
• For an encrypted virus to actually run, it has to
decrypt its code and data
- The portion that does this is referred to as a
decryptor
• Encryption techniques can use random keys to
make the virus code hard to spot
-However the decryptor itself will have a signature
Polymorphic
A polymorphic virus is a randomly
encrypted virus that is also
programmed to randomly vary its
decryption routine
Viruses Types:
• Worms
• Trojan Horse
• Bombs
Computer Worm
• A self-replicating computer program,
similar to a computer virus
• Unlike a virus, it is self-contained and
does not need to be part of another
program to propagate itself
• Often designed to exploit computers’ file
transmission capabilities
Worm
• A program or algorithm that replicates
itself over a computer network or through
e-mail and sometimes performs malicious
actions such as using up the computer
and network resources and possibly
destroying data.
• Examples: Klez, Nimda, Code Red
Computer Worm
• In addition to replication, a worm may
be designed to:
–delete files on a host system
–send documents via email
–carry other executables as a payload
Trojan
• A malicious program disguised as legitimate
software
Cannot replicate itself, in contrast to some
other types of “malware” like worms and viruses
but they can be contained within a worm.
• Depending on their purpose, a Trojan can be
destructive or a resource hog and is almost
always considered a root compromise.
• Ex: Back Orifice, NetBus, SubSeven
Can legitimate networking tools be
considered Trojans?
Yes! Many applications are installed by
hackers and worms that would be
considered legitimate tools. If they were not
installed by you and are being used for
malicious purposes, they are considered
Trojans … even though your antivirus
software will not detect them as such.
Logic Bomb
• “Slag code”
• Programming code,
inserted surreptitiously,
designed to execute
(or “explode”) under
particular
circumstances
Logic Bomb
• Does not replicate
• Essentially a delayed-action computer
virus or Trojan horse
How do viruses work? (Characteristics)
Possible attacks include:
• Replicating itself
• Interrupting system/network use
• Modifying configuration settings
• Flashing BIOS
• Format hard drive/destroy data
• Using computer/network resources
• Distribution of confidential info
• Denial of Service attacks
Once a virus gains access to a computer, its
effects can vary.
Typical methods of infection
• Removable media or drives
• Downloading Internet files
• E-mail attachments
• Unpatched software and services
• Poor Administrator passwords
• Poor shared passwords
Virus prevention
• Patching the operating system
• Patching services
• Patching client software
• Passwords
• Antivirus software
• Firewalls
Computer Security
Passwords
• As discussed earlier when talking about
Trojans, strong passwords are a vital part
of keeping your systems free of infection.
• Antivirus software does not catch the
majority of the Trojans . These Trojans are
typically legitimate networking tools that
were never intended to be used as a
Trojan.
Passwords
• Having strong passwords will deter most
worms and scanners that attempt to crack
passwords as a means of entry.
• The Administrator account and those
users who have Administrator privileges
are at the greatest risk, but all users on the
network should follow the same password
policy.
Virus Detection (Antivirus software)
The primary method of detection of
antivirus software is to check
programs and files on a system for
virus signatures. However, good
antivirus software uses many
methods to search the system for
viruses.
Antivirus Software
• AV software considerations
•Features
•Cost (per workstation/server)
•Frequency of updates
•Ease of update installation
•Server administration
•Certification
Antivirus software options
• Aladdin Knowledge
• Alwil Software
• AVG Antivirus
• Central Command
• Command Software
• Computer Associates
• Data Fellows Corp.
• Dr. Solomon’s
Software
• ESET Software
• Finjan Software
• Frisk Software
• Kaspersky Lab
• McAfee
• Network Associates
• Norman Data
Defense
• Panda Software
• Proland Software
• Sophos
• Symantec
Corporation
• Trend Micro, Inc.
Cleaning viruses
• Cleaning viruses depends entirely on your local
antivirus solution. The virus must be identified
before it can be removed, so it makes sense to
try your antivirus scanner first.
• If your software identifies, but can’t remove the
virus, check the manufacturer’s website for
manual removal instructions.
Perform Basic Computer Safety
Maintenance
• Use an Internet “firewall”
• Update your computer
• Use up-to-date antivirus software
Use an Internet Firewall
• A firewall is software or hardware that
creates a protective barrier between your
computer and potentially damaging content
on the Internet or network.
• The firewall helps to guard your computer
against malicious users, and also against
malicious software such as computer
viruses and worms.
Use an Internet Firewall
• Commercial
hardware and
software firewalls
may also be used
“Update” Your Computer
• Download service packs and updates
• Especially important for Windows XP users:
“SP2”
Use Up-to-date Antivirus Software
• McAfee and Symantec
are prominent vendors
• Make certain to keep
“virus definitions” up-
to-date
Questions
• Define: Virus , Computer Worm , computer
security.
• Explain Characteristics of virus.
• Explain types of virus.
• How does Virus Works?
• List Antivirus Software.

More Related Content

What's hot

Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Lubov Putsko
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzingG Prachi
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...eLiberatica
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 

What's hot (17)

Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Isas
IsasIsas
Isas
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 

Similar to 6unit1 virus and their types

Similar to 6unit1 virus and their types (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Malicious
MaliciousMalicious
Malicious
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malwares
MalwaresMalwares
Malwares
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 

More from Neha Kurale

Ch7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleCh7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleCh6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleCh5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleCh4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking Neha Kurale
 
Ch3 2 Data communication and networking
Ch3 2  Data communication and networkingCh3 2  Data communication and networking
Ch3 2 Data communication and networkingNeha Kurale
 
Ch3 1 Data communication and networking
Ch3 1 Data communication and networkingCh3 1 Data communication and networking
Ch3 1 Data communication and networkingNeha Kurale
 
Ch3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleCh3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Computer funda bsc_hs
Computer funda bsc_hsComputer funda bsc_hs
Computer funda bsc_hsNeha Kurale
 
Unit1 three part secondary storage devices
Unit1 three part secondary storage devicesUnit1 three part secondary storage devices
Unit1 three part secondary storage devicesNeha Kurale
 
Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organizationNeha Kurale
 
Unit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swUnit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swNeha Kurale
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computersNeha Kurale
 

More from Neha Kurale (20)

Ch7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleCh7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kurale
 
Ch6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleCh6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kurale
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kurale
 
Ch5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleCh5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kurale
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kurale
 
Ch4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleCh4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kurale
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kurale
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking
 
Ch3 2 Data communication and networking
Ch3 2  Data communication and networkingCh3 2  Data communication and networking
Ch3 2 Data communication and networking
 
Ch3 1 Data communication and networking
Ch3 1 Data communication and networkingCh3 1 Data communication and networking
Ch3 1 Data communication and networking
 
Ch3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleCh3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kurale
 
Ch2
Ch2Ch2
Ch2
 
Ch1
Ch1Ch1
Ch1
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Computer funda bsc_hs
Computer funda bsc_hsComputer funda bsc_hs
Computer funda bsc_hs
 
Unit1 three part secondary storage devices
Unit1 three part secondary storage devicesUnit1 three part secondary storage devices
Unit1 three part secondary storage devices
 
Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organization
 
Unit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swUnit 1 two part hw sw os app sw
Unit 1 two part hw sw os app sw
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computers
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

6unit1 virus and their types

  • 3. CONTENTS • Introduction( Viruses, Bombs, Worms) • Types of Viruses • Characteristics of Viruses • Categories of Viruses • Computer Security- –Antivirus Software –Password, Firewalls
  • 4. In the beginning, man created the virus, and it was bad. • The first computer virus –Several stories • Pakistani Brain Virus (1986): This is the first widely spread IBM Compatible virus. This is commonly mistaken for the first virus. • Apple Virus 1 (1981): Boot sector infecting virus. Possibly created for pirated games. • Animal (1975) (Univac): “Guess an animal” game. Copied to other users’ home directories when run.
  • 5. 1.Introduction A virus is a program that attaches itself to some form of host such as legitimate, executable program. •Virus lives within the program, which is said to be ‘infected’. •Execution of the host program implies execution of the virus. •May or may not damage the infected program. A virus is able to replicate •Creates (possibly modified) copies of itself.
  • 6. Viruses • Needs to have some form of distribution –such as via disks or a computer network. • Examples: W95.CIH (Chernobyl), Sampo and Hare
  • 7. Classifying Viruses: categories • Boot Sector • TSR (Terminate and stay resident) • Multipartite • Macro • Companion • Polymorphic
  • 8. Boot Sector • Infects the boot sector on a disk replaces the original boot sector with itself • stores the original boot sector somewhere else or replaces it totally Virus takes control when the system is booted from the diskette may infect other diskettes that are inserted, unless they are write protected may also infects hard disks
  • 9. Master Boot Record/Boot Sector Viruses Boot sector virus (Apple Viruses 1,2,3, “Elk Cloner”), Pakistani Brain (x86)
  • 10. TSR • A terminate and stay resident (TSR) virus is a virus that stays active in memory after the application (or bootstrapping, or disk mounting) has terminated. • TSR viruses can be boot sector infectors or executable infectors. • The Brain virus is a TSR virus.
  • 11. Multipartite • A multipartite virus is a virus that can infect either boot sectors or executables. • Such a virus typically has two parts, one for each type. • When it infects an executable, it acts as an executable infector. • When it infects a boot sector, it works as a boot sector infector.
  • 12. Macro • A macro virus is a virus composed of a sequence of instructions that is interpreted rather than executed directly. • Macro viruses can infect either executables (Duff’s shell virus) or data files (Highland’s Lotus 1-2-3 spreadsheet virus). • Duff’s shell virus can execute on any system that can interpret the instructions
  • 13. Macro • Piece of self-replicating code written in an application's macro language 􀁺 a macro virus requires an auto-execute macro 􀁺 one which is executed in response to some event e.g opening or closing a file or starting an application • once the macro virus is running, it can copy itself to other documents delete files, etc.
  • 14. Polymorphic • A virus may be encrypted to try to disguise itself and hide what it does • For an encrypted virus to actually run, it has to decrypt its code and data - The portion that does this is referred to as a decryptor • Encryption techniques can use random keys to make the virus code hard to spot -However the decryptor itself will have a signature
  • 15. Polymorphic A polymorphic virus is a randomly encrypted virus that is also programmed to randomly vary its decryption routine
  • 16. Viruses Types: • Worms • Trojan Horse • Bombs
  • 17. Computer Worm • A self-replicating computer program, similar to a computer virus • Unlike a virus, it is self-contained and does not need to be part of another program to propagate itself • Often designed to exploit computers’ file transmission capabilities
  • 18. Worm • A program or algorithm that replicates itself over a computer network or through e-mail and sometimes performs malicious actions such as using up the computer and network resources and possibly destroying data. • Examples: Klez, Nimda, Code Red
  • 19. Computer Worm • In addition to replication, a worm may be designed to: –delete files on a host system –send documents via email –carry other executables as a payload
  • 20. Trojan • A malicious program disguised as legitimate software Cannot replicate itself, in contrast to some other types of “malware” like worms and viruses but they can be contained within a worm. • Depending on their purpose, a Trojan can be destructive or a resource hog and is almost always considered a root compromise. • Ex: Back Orifice, NetBus, SubSeven
  • 21. Can legitimate networking tools be considered Trojans? Yes! Many applications are installed by hackers and worms that would be considered legitimate tools. If they were not installed by you and are being used for malicious purposes, they are considered Trojans … even though your antivirus software will not detect them as such.
  • 22. Logic Bomb • “Slag code” • Programming code, inserted surreptitiously, designed to execute (or “explode”) under particular circumstances
  • 23. Logic Bomb • Does not replicate • Essentially a delayed-action computer virus or Trojan horse
  • 24. How do viruses work? (Characteristics) Possible attacks include: • Replicating itself • Interrupting system/network use • Modifying configuration settings • Flashing BIOS • Format hard drive/destroy data • Using computer/network resources • Distribution of confidential info • Denial of Service attacks Once a virus gains access to a computer, its effects can vary.
  • 25. Typical methods of infection • Removable media or drives • Downloading Internet files • E-mail attachments • Unpatched software and services • Poor Administrator passwords • Poor shared passwords
  • 26. Virus prevention • Patching the operating system • Patching services • Patching client software • Passwords • Antivirus software • Firewalls Computer Security
  • 27. Passwords • As discussed earlier when talking about Trojans, strong passwords are a vital part of keeping your systems free of infection. • Antivirus software does not catch the majority of the Trojans . These Trojans are typically legitimate networking tools that were never intended to be used as a Trojan.
  • 28. Passwords • Having strong passwords will deter most worms and scanners that attempt to crack passwords as a means of entry. • The Administrator account and those users who have Administrator privileges are at the greatest risk, but all users on the network should follow the same password policy.
  • 29. Virus Detection (Antivirus software) The primary method of detection of antivirus software is to check programs and files on a system for virus signatures. However, good antivirus software uses many methods to search the system for viruses.
  • 30. Antivirus Software • AV software considerations •Features •Cost (per workstation/server) •Frequency of updates •Ease of update installation •Server administration •Certification
  • 31. Antivirus software options • Aladdin Knowledge • Alwil Software • AVG Antivirus • Central Command • Command Software • Computer Associates • Data Fellows Corp. • Dr. Solomon’s Software • ESET Software • Finjan Software • Frisk Software • Kaspersky Lab • McAfee • Network Associates • Norman Data Defense • Panda Software • Proland Software • Sophos • Symantec Corporation • Trend Micro, Inc.
  • 32. Cleaning viruses • Cleaning viruses depends entirely on your local antivirus solution. The virus must be identified before it can be removed, so it makes sense to try your antivirus scanner first. • If your software identifies, but can’t remove the virus, check the manufacturer’s website for manual removal instructions.
  • 33. Perform Basic Computer Safety Maintenance • Use an Internet “firewall” • Update your computer • Use up-to-date antivirus software
  • 34. Use an Internet Firewall • A firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network. • The firewall helps to guard your computer against malicious users, and also against malicious software such as computer viruses and worms.
  • 35. Use an Internet Firewall • Commercial hardware and software firewalls may also be used
  • 36. “Update” Your Computer • Download service packs and updates • Especially important for Windows XP users: “SP2”
  • 37. Use Up-to-date Antivirus Software • McAfee and Symantec are prominent vendors • Make certain to keep “virus definitions” up- to-date
  • 38. Questions • Define: Virus , Computer Worm , computer security. • Explain Characteristics of virus. • Explain types of virus. • How does Virus Works? • List Antivirus Software.