2. TABLE OF CONTENT Intro Table of content Overview History Categories – Viruses and Protections 1) Viruses 2) Worms 3) Trojans 1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages Summary / Conclusion References Questions
3. ● We will present you with detailed information about computer infections and protections users can take to not get infected. ● We will talk about 3 different kinds of infections like Computer Viruses , Worms , Back Door Trojan horses ● Also we will be talking about Virus Detection , Protections and Advantages and Disadvantages against the above stated infections. OVERVIEW
4. Background : One of the first ever computer infections was called The Creeper Virus . Created in 1971 by Bob Thomas at BBN technologies. ● The creeper was used to infect ( ARPANET ) Advanced Research Projects Agency Network. A message, " I'm the creeper, catch me if you can! " was displayed. ● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially. HISTORY
5. Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three. 1) Viruses 2) Worms 3) Trojans Each of them is very different in the way it attacks computers. CATEGORIES
6. ● Is a program written in computer languages , that can copy it self and continue to infect others. ● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data. ● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use. VIRUSES
7. ● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure. ● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems. ● Many worms come in the form of email file attachments. ● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book. WORMS
8. ● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys. ● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet. ● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer. TROJANS
9. ● Remote Access Trojans ● Password Sending Trojans ● Key Loggers ● Destructive Trojans ● Denial of Service Attack Trojans ● Proxy/Wingate Trojans ● FTP Trojans TYPES OF TROJANS
11. Malware Infections This chart shows the number of computers cleaned by Microsoft, listed by country.
12. Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics. Other Protections: Firewalls, Specialized Removal Tools CATEGORIES
13. Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification. Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers. Methods of Detection
14. Heuristics : Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection. Methods of Detection (cont’d)
15. Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not. Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks. Other Protections
21. ● Computer infections and protections are ever changing, for one can not exist without the other. ● Avid users of the internet should have general knowledge about the threats that exist on the internet CONCLUSION
22. ● How to browse the internet in relative safety by employing some simple practices to prevent infections. ● More can be at risk than just your computer. CONCLUSION Cont.
23. CONTENT ● Web 12/1/2010 http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009 ● Web 12/1/2010 http://en.wikipedia.org/wiki/Computer_virus ● Web 12/1/2010 http://www.ucmp.berkeley.edu/alllife/virus.html ● Web 12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ● Web 12/1/2010 http://www.microsoft.com/security/worms/whatis.aspx ● Web 12/1/2010 http://www.tech-faq.com/computer-worm.html ● Web 12/1/2010 http://www.tech-faq.com/trojan-virus.html REFFERENCES
24. CONTENT ● Web 12/1/2010 http://www.webopedia.com/TERM/M/malware.html ● Web 12/1/2010 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html ● Web 11/30/2010 http://en.wikipedia.org/wiki/Antivirus_software ● Web 12/1/2010 http://www.antivirusworld.com/articles/antivirus.php ● Web 12/1/2010 http://antivirus.about.com/od/whatisavirus/a/virussignature.htm ● Web 11/30/2010 http://www.faqs.org/faqs/firewalls-faq/ ● Web 11/30/2010 http://www.wifinotes.com/security/understanding-antivirus.html REFFERENCES
25. IMAGES ● Web 12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ● Web 12/1/2010 http://www.justmywebsite.co.uk/virus.html ● Web 12/1/2010 http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif ● Web 12/1/2010 http://www.3its.com/resources/antivirus-logo.jpg VIDEO ● Web 12/1/2010 http://www.youtube.com/watch?v=wHqs5UKLk2s REFFERENCES