SlideShare a Scribd company logo
1 of 26
Denny Dizka   Allister MacNeil December 3 2010
TABLE OF CONTENT Intro  Table of content Overview History Categories – Viruses and Protections 1)  Viruses  2)  Worms  3)  Trojans 1)   Virus Detection  2)  Firewalls  3)   Advantages and Disadvantages   Summary / Conclusion References Questions
●  We will present you with detailed information about computer infections and protections users can take to not get infected. ●  We will talk about 3 different kinds of infections like  Computer   Viruses ,  Worms ,  Back Door Trojan horses ●  Also we will be talking about  Virus Detection ,  Protections  and  Advantages and Disadvantages   against the above stated infections.  OVERVIEW
Background :  One of the first ever computer infections was called  The Creeper Virus .  Created in 1971 by Bob Thomas at BBN technologies.  ●  The creeper was used to infect ( ARPANET )  Advanced Research Projects Agency Network.  A   message, " I'm the creeper, catch me if you can! " was displayed.  ●  The number of viruses out in the world are over 1 million in 2009, and are growing exponentially.  HISTORY
Infections :  There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three.  1)   Viruses  2)  Worms  3)  Trojans   Each of them is very different in the way it attacks computers.  CATEGORIES
●  Is a program written in computer  languages , that can copy it self and continue to infect others.  ●  There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data. ●  Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use.  VIRUSES
●  Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure.  ●  Worms are different than a traditional virus in that they search for and implant destructive code onto other systems.   ●  Many worms come in the form of email file attachments. ●  When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book.  WORMS
●  Trojan horses are programs that appear harmless but givin time will present malicious functionalitys.  ●  Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet.  ●  Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer. TROJANS
●  Remote Access Trojans ●   Password Sending Trojans ●   Key Loggers ●   Destructive Trojans ●   Denial of Service Attack Trojans ●   Proxy/Wingate Trojans ●   FTP Trojans TYPES OF TROJANS
Malware Infections
Malware Infections This chart shows the number of computers  cleaned by Microsoft, listed by country.
Protections:  As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection:  Signature Based Detection, Rootkit Detection and Heuristics. Other Protections:   Firewalls, Specialized Removal Tools CATEGORIES
Signature Based Detection:  Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification.  Rootkit Detection:  Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers.   Methods of Detection
Heuristics :  Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection.   Methods of Detection (cont’d)
Specialized Removal Tools:  Programs used to remove infections that regular anti-virus programs can not.  Firewalls:  Is used to block unauthorized access to a network, such as blocking people from accessing private networks.  Other Protections
Firewall Example
[object Object],[object Object],Advantages
[object Object],[object Object],[object Object],[object Object],[object Object],Disadvantages
[object Object],[object Object],[object Object],[object Object],Recommendations
Popular Anti-Virus Programs
●  Computer infections and protections are ever changing, for one can not exist without the other.  ●  Avid users of the internet should have general knowledge about the threats that exist on the internet CONCLUSION
●  How to browse the internet in relative safety by employing some simple practices to prevent infections. ●  More can be at risk than just your computer. CONCLUSION Cont.
CONTENT ●  Web 12/1/2010 http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009 ●  Web 12/1/2010 http://en.wikipedia.org/wiki/Computer_virus ●  Web 12/1/2010 http://www.ucmp.berkeley.edu/alllife/virus.html ●  Web 12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ●  Web 12/1/2010 http://www.microsoft.com/security/worms/whatis.aspx ●  Web 12/1/2010 http://www.tech-faq.com/computer-worm.html ●  Web 12/1/2010 http://www.tech-faq.com/trojan-virus.html REFFERENCES
CONTENT ●  Web 12/1/2010 http://www.webopedia.com/TERM/M/malware.html ●  Web 12/1/2010 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html ●  Web 11/30/2010 http://en.wikipedia.org/wiki/Antivirus_software ●  Web 12/1/2010 http://www.antivirusworld.com/articles/antivirus.php ●  Web 12/1/2010 http://antivirus.about.com/od/whatisavirus/a/virussignature.htm ●  Web 11/30/2010 http://www.faqs.org/faqs/firewalls-faq/ ●  Web 11/30/2010 http://www.wifinotes.com/security/understanding-antivirus.html REFFERENCES
IMAGES ●  Web   12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ●  Web 12/1/2010 http://www.justmywebsite.co.uk/virus.html ●  Web 12/1/2010 http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif ●  Web 12/1/2010 http://www.3its.com/resources/antivirus-logo.jpg VIDEO ●  Web 12/1/2010 http://www.youtube.com/watch?v=wHqs5UKLk2s REFFERENCES
Any Questions? Thank you,

More Related Content

What's hot

What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virusNaveen Goyal
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 

What's hot (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Computer virus
Computer virusComputer virus
Computer virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Malware
MalwareMalware
Malware
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 

Viewers also liked

04 class diagram-uml-netbeans
04 class diagram-uml-netbeans04 class diagram-uml-netbeans
04 class diagram-uml-netbeansAgust Gustavo
 
User needs for environment-smart farming
User needs for environment-smart farmingUser needs for environment-smart farming
User needs for environment-smart farmingCAPIGI
 
Tridion Mobile Web, John Winter, May 2012
Tridion Mobile Web, John Winter, May 2012Tridion Mobile Web, John Winter, May 2012
Tridion Mobile Web, John Winter, May 2012Catharine Macdonald
 
Global im blueprinting security tcw 2012 02-22
Global im blueprinting security tcw 2012 02-22Global im blueprinting security tcw 2012 02-22
Global im blueprinting security tcw 2012 02-22Catharine Macdonald
 
Contoh karangan eksposisi
Contoh karangan eksposisiContoh karangan eksposisi
Contoh karangan eksposisi'Evie Gitcu'
 
MoveRTK - The National Precision Standard
MoveRTK - The National Precision StandardMoveRTK - The National Precision Standard
MoveRTK - The National Precision StandardCAPIGI
 
Spatial data quality in the city of Amsterdam
Spatial data quality in the city of AmsterdamSpatial data quality in the city of Amsterdam
Spatial data quality in the city of AmsterdamCAPIGI
 
Implementing Satellite Information and Services for Agriculture
Implementing Satellite Information and Services for AgricultureImplementing Satellite Information and Services for Agriculture
Implementing Satellite Information and Services for AgricultureCAPIGI
 
The use of Volunteer Geographical Information to improve global land cover
The use of Volunteer Geographical Information to improve global land coverThe use of Volunteer Geographical Information to improve global land cover
The use of Volunteer Geographical Information to improve global land coverCAPIGI
 
The CAP towards 2020: future demands for innovation
The CAP towards 2020: future demands for innovationThe CAP towards 2020: future demands for innovation
The CAP towards 2020: future demands for innovationCAPIGI
 
Sensor based Variable Rate Application
Sensor based Variable Rate ApplicationSensor based Variable Rate Application
Sensor based Variable Rate ApplicationCAPIGI
 
BIOSCOPE User Requirements
BIOSCOPE User RequirementsBIOSCOPE User Requirements
BIOSCOPE User RequirementsCAPIGI
 
LPIS QA formalises mainstream GI in the CAP
LPIS QA formalises mainstream GI  in the CAPLPIS QA formalises mainstream GI  in the CAP
LPIS QA formalises mainstream GI in the CAPCAPIGI
 
Automated knowledge-based landscape classification
Automated knowledge-based landscape classificationAutomated knowledge-based landscape classification
Automated knowledge-based landscape classificationCAPIGI
 
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...CAPIGI
 
Field Geometry, auto steering and services
Field Geometry, auto steering and servicesField Geometry, auto steering and services
Field Geometry, auto steering and servicesCAPIGI
 
Direct Exchange of Geo Information between Administration and Farmer
Direct Exchange of Geo Information between Administration and FarmerDirect Exchange of Geo Information between Administration and Farmer
Direct Exchange of Geo Information between Administration and FarmerCAPIGI
 

Viewers also liked (18)

Golf
GolfGolf
Golf
 
04 class diagram-uml-netbeans
04 class diagram-uml-netbeans04 class diagram-uml-netbeans
04 class diagram-uml-netbeans
 
User needs for environment-smart farming
User needs for environment-smart farmingUser needs for environment-smart farming
User needs for environment-smart farming
 
Tridion Mobile Web, John Winter, May 2012
Tridion Mobile Web, John Winter, May 2012Tridion Mobile Web, John Winter, May 2012
Tridion Mobile Web, John Winter, May 2012
 
Global im blueprinting security tcw 2012 02-22
Global im blueprinting security tcw 2012 02-22Global im blueprinting security tcw 2012 02-22
Global im blueprinting security tcw 2012 02-22
 
Contoh karangan eksposisi
Contoh karangan eksposisiContoh karangan eksposisi
Contoh karangan eksposisi
 
MoveRTK - The National Precision Standard
MoveRTK - The National Precision StandardMoveRTK - The National Precision Standard
MoveRTK - The National Precision Standard
 
Spatial data quality in the city of Amsterdam
Spatial data quality in the city of AmsterdamSpatial data quality in the city of Amsterdam
Spatial data quality in the city of Amsterdam
 
Implementing Satellite Information and Services for Agriculture
Implementing Satellite Information and Services for AgricultureImplementing Satellite Information and Services for Agriculture
Implementing Satellite Information and Services for Agriculture
 
The use of Volunteer Geographical Information to improve global land cover
The use of Volunteer Geographical Information to improve global land coverThe use of Volunteer Geographical Information to improve global land cover
The use of Volunteer Geographical Information to improve global land cover
 
The CAP towards 2020: future demands for innovation
The CAP towards 2020: future demands for innovationThe CAP towards 2020: future demands for innovation
The CAP towards 2020: future demands for innovation
 
Sensor based Variable Rate Application
Sensor based Variable Rate ApplicationSensor based Variable Rate Application
Sensor based Variable Rate Application
 
BIOSCOPE User Requirements
BIOSCOPE User RequirementsBIOSCOPE User Requirements
BIOSCOPE User Requirements
 
LPIS QA formalises mainstream GI in the CAP
LPIS QA formalises mainstream GI  in the CAPLPIS QA formalises mainstream GI  in the CAP
LPIS QA formalises mainstream GI in the CAP
 
Automated knowledge-based landscape classification
Automated knowledge-based landscape classificationAutomated knowledge-based landscape classification
Automated knowledge-based landscape classification
 
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...
EGNOS in Precision Agriculture: an affordable entry Technology for a wide Ran...
 
Field Geometry, auto steering and services
Field Geometry, auto steering and servicesField Geometry, auto steering and services
Field Geometry, auto steering and services
 
Direct Exchange of Geo Information between Administration and Farmer
Direct Exchange of Geo Information between Administration and FarmerDirect Exchange of Geo Information between Administration and Farmer
Direct Exchange of Geo Information between Administration and Farmer
 

Similar to Malware Infections Protections

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 

Similar to Malware Infections Protections (20)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Information security
Information securityInformation security
Information security
 
Computervirus
Computervirus Computervirus
Computervirus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
IT viruses
 IT viruses IT viruses
IT viruses
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Mitppt
MitpptMitppt
Mitppt
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Malware Infections Protections

  • 1. Denny Dizka Allister MacNeil December 3 2010
  • 2. TABLE OF CONTENT Intro Table of content Overview History Categories – Viruses and Protections 1) Viruses 2) Worms 3) Trojans 1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages Summary / Conclusion References Questions
  • 3. ● We will present you with detailed information about computer infections and protections users can take to not get infected. ● We will talk about 3 different kinds of infections like Computer Viruses , Worms , Back Door Trojan horses ● Also we will be talking about Virus Detection , Protections and Advantages and Disadvantages against the above stated infections. OVERVIEW
  • 4. Background : One of the first ever computer infections was called The Creeper Virus . Created in 1971 by Bob Thomas at BBN technologies. ● The creeper was used to infect ( ARPANET ) Advanced Research Projects Agency Network. A message, " I'm the creeper, catch me if you can! " was displayed. ● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially. HISTORY
  • 5. Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three. 1) Viruses 2) Worms 3) Trojans Each of them is very different in the way it attacks computers. CATEGORIES
  • 6. ● Is a program written in computer languages , that can copy it self and continue to infect others. ● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data. ● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use. VIRUSES
  • 7. ● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure. ● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems. ● Many worms come in the form of email file attachments. ● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book. WORMS
  • 8. ● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys. ● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet. ● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer. TROJANS
  • 9. ● Remote Access Trojans ● Password Sending Trojans ● Key Loggers ● Destructive Trojans ● Denial of Service Attack Trojans ● Proxy/Wingate Trojans ● FTP Trojans TYPES OF TROJANS
  • 11. Malware Infections This chart shows the number of computers cleaned by Microsoft, listed by country.
  • 12. Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics. Other Protections: Firewalls, Specialized Removal Tools CATEGORIES
  • 13. Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification. Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers. Methods of Detection
  • 14. Heuristics : Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection. Methods of Detection (cont’d)
  • 15. Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not. Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks. Other Protections
  • 17.
  • 18.
  • 19.
  • 21. ● Computer infections and protections are ever changing, for one can not exist without the other. ● Avid users of the internet should have general knowledge about the threats that exist on the internet CONCLUSION
  • 22. ● How to browse the internet in relative safety by employing some simple practices to prevent infections. ● More can be at risk than just your computer. CONCLUSION Cont.
  • 23. CONTENT ● Web 12/1/2010 http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009 ● Web 12/1/2010 http://en.wikipedia.org/wiki/Computer_virus ● Web 12/1/2010 http://www.ucmp.berkeley.edu/alllife/virus.html ● Web 12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ● Web 12/1/2010 http://www.microsoft.com/security/worms/whatis.aspx ● Web 12/1/2010 http://www.tech-faq.com/computer-worm.html ● Web 12/1/2010 http://www.tech-faq.com/trojan-virus.html REFFERENCES
  • 24. CONTENT ● Web 12/1/2010 http://www.webopedia.com/TERM/M/malware.html ● Web 12/1/2010 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html ● Web 11/30/2010 http://en.wikipedia.org/wiki/Antivirus_software ● Web 12/1/2010 http://www.antivirusworld.com/articles/antivirus.php ● Web 12/1/2010 http://antivirus.about.com/od/whatisavirus/a/virussignature.htm ● Web 11/30/2010 http://www.faqs.org/faqs/firewalls-faq/ ● Web 11/30/2010 http://www.wifinotes.com/security/understanding-antivirus.html REFFERENCES
  • 25. IMAGES ● Web 12/1/2010 http://www.techdc.com/pc-malwareinfections-on-the-rise ● Web 12/1/2010 http://www.justmywebsite.co.uk/virus.html ● Web 12/1/2010 http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif ● Web 12/1/2010 http://www.3its.com/resources/antivirus-logo.jpg VIDEO ● Web 12/1/2010 http://www.youtube.com/watch?v=wHqs5UKLk2s REFFERENCES