SlideShare a Scribd company logo
1 of 24
Computer Viruses and WormsComputer Viruses and Worms
By:By:
Monika GuptaMonika Gupta
OverviewOverview
• TYPES OF INFECTION
• DEFINITIONS
• DIFFERENCE BETWEEN VIRUS AND
WORM
• ORIGINS
• TYPES OF VIRUSES
• WORMS
Overview Cont…Overview Cont…
• MELISSA VIRUS
• I LOVE YOU VIRUS
• CODE RED (WORM)
• SYMPTOMS OF AN INFECTION
• PROTECTION MEASURES
• CONCLUSION
• REFRENCES
Types of InfectionTypes of Infection
• VIRUSES
• E-MAIL VIRUSES
• WORMS
• TROJAN HORSES
VirusesViruses
A virus is a small piece of
software that piggybacks on
real programs.
2 main characteristics of viruses
 It must execute itself.
 It must replicate itself.
VirusVirus
Virus might attach itself to a program such
as spreadsheet. Each time the spreadsheet
program runs, the virus runs too and
replicate itself.
E-mail VirusesE-mail Viruses
• Moves around in e-mail messages
• Usually replicate itself by automatically
mailing itself to dozens of people in the
victim’s email address book.
• Example “MELISSA VIRUS”
• Example “I LOVE YOU VIRUS”
WORMSWORMS
• Small piece of software that uses
computer networks and security holes to
replicate itself.
• Copy of the worm scans the network for
another machine that has a specific
security hole.
• Copy itself to the new machine using the
security hole and start replicating.
• Example “CODE RED”
Trojan HorsesTrojan Horses
• A simple computer program
• It claim to be a game
• Erase your hard disk
• No way to replicate itself.
Difference between Virus andDifference between Virus and
WormWorm
The difference between a worm and a virus
is that a virus does not have a propagation
vector. i.e., it will only effect one host and
does not propagate to other hosts. Worms
propagate and infect other computers.
Majority of threats are actually worms that
propagate to other hosts.
Why do people do it ?Why do people do it ?
• For some people creating viruses seems
to be thrill.
• Thrill of watching things blow up.
VirusesViruses
• Viruses show us how vulnerable we are
• A properly engineered virus can have an
amazing effect on the Internet
• They show how sophisticated and
interconnected human beings have
become.
– File infector virus
• Infect program files
– Boot sector virus
• Infect the system area of a disk
– Master boot record virus
• infect disks in the same manner as boot sector viruses. The
difference between these two virus types is where the viral code is
located.
– Multi-partite virus
• infect both boot records and program files
– Macro virus
• infect data files. Examples: Microsoft Office Word, Excel,
PowerPoint and Access files
Types of VirusesTypes of Viruses
Melissa Virus (March 1999)Melissa Virus (March 1999)
Melissa virus spread in Microsoft Word documents
sent via e-mail.
How it works ?
• Created the virus as word document
• Uploaded to an internet newsgroup
• Anyone who download the document and
opened it would trigger the virus.
• Send friendly email messages to first 50 people
in person’s address book.
Melissa VirusMelissa Virus
Melissa Virus was the fastest spreading
virus ever seen.
Forced a number of large companies to shut
down their e-mail systems.
I Love You Virus (May,2000)I Love You Virus (May,2000)
• Contained a piece of code as an
attachment.
• Double Click on the attachment triggered
the code.
• Sent copies of itself to everyone in the
victim’s address book
• Started corrupting files on the victim’s
machine.
Code Red (Worm)Code Red (Worm)
• Code Red made huge headlines in 2001
• It slowed down internet traffic when it
began to replicate itself.
• Each copy of the worm scanned the
internet for Windows NT or Windows 2000
that don’t have security patch installed.
• Each time it found an unsecured server,
the worm copied itself to that server.
Code Red WormCode Red Worm
Designed to do three things
 Replicate itself for the first 20 days of
each month.
 Replace web pages on infected servers
with a page that declares “Hacked by
Chinese”
 Launch a concreted attack on the White
House Web server
Symptoms of InfectionSymptoms of Infection
• Programs take longer to load than normal.
• Computer’s hard drive constantly runs out
of free space.
• The floppy disk drive or hard drive runs
when you are not using it.
• New files keep appearing on the system
and you don’t know where it come frm.
Symptoms of Infection Cont..Symptoms of Infection Cont..
• Strange sounds or beeping noises come
from the computer.
• Strange graphics are displayed on your
computer monitor.
• Unable to access the hard drive when
booting from the floppy drive.
• Program sizes keep changing.
ProtectionProtection
• TO protect yourself you need to be
“Proactive” about Security issues. Being
reactive won’t solve anything; Specially at
crunch time and deadlines!! In matter of
fact it can make the problem much more
complex to solve, and the situation much
worse, resulting in a complete Nightmare!!
• Best Measures are the preventative ones.
Protection MeasuresProtection Measures
• You need to basically to do four steps to
keep your computer and your data secure:
1. Get the latest Anti-Virus Software.
2. Make sure you have the latest security
patches and hot fixes using Windows
Update.
3. Use a Host-Based Firewall.
4. BACKUP your Important Files.
ConclusionConclusion
Be aware of the new infections out there.
Take precaution measures.
Always backup your data.
Keep up-to-date on new Anti virus software.
Simply avoid programs from unknown
sources.
ReferencesReferences
• http://computer.howstuffworks.com/virus.htm
• http://www.son.washington.edu/nshelp/fire
wall.asp
• Dewdney, A. K. The New Turing Omnibus.
New York: Henry Holt and Company, 2001

More Related Content

What's hot

What's hot (20)

Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus09
Virus09Virus09
Virus09
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Senior seminar virus
Senior seminar virusSenior seminar virus
Senior seminar virus
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
When love kills
When love killsWhen love kills
When love kills
 
Malware
MalwareMalware
Malware
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Computer viruses (20)

VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer virus
Computer virusComputer virus
Computer virus
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 

Computer viruses

  • 1. Computer Viruses and WormsComputer Viruses and Worms By:By: Monika GuptaMonika Gupta
  • 2. OverviewOverview • TYPES OF INFECTION • DEFINITIONS • DIFFERENCE BETWEEN VIRUS AND WORM • ORIGINS • TYPES OF VIRUSES • WORMS
  • 3. Overview Cont…Overview Cont… • MELISSA VIRUS • I LOVE YOU VIRUS • CODE RED (WORM) • SYMPTOMS OF AN INFECTION • PROTECTION MEASURES • CONCLUSION • REFRENCES
  • 4. Types of InfectionTypes of Infection • VIRUSES • E-MAIL VIRUSES • WORMS • TROJAN HORSES
  • 5. VirusesViruses A virus is a small piece of software that piggybacks on real programs. 2 main characteristics of viruses  It must execute itself.  It must replicate itself.
  • 6. VirusVirus Virus might attach itself to a program such as spreadsheet. Each time the spreadsheet program runs, the virus runs too and replicate itself.
  • 7. E-mail VirusesE-mail Viruses • Moves around in e-mail messages • Usually replicate itself by automatically mailing itself to dozens of people in the victim’s email address book. • Example “MELISSA VIRUS” • Example “I LOVE YOU VIRUS”
  • 8. WORMSWORMS • Small piece of software that uses computer networks and security holes to replicate itself. • Copy of the worm scans the network for another machine that has a specific security hole. • Copy itself to the new machine using the security hole and start replicating. • Example “CODE RED”
  • 9. Trojan HorsesTrojan Horses • A simple computer program • It claim to be a game • Erase your hard disk • No way to replicate itself.
  • 10. Difference between Virus andDifference between Virus and WormWorm The difference between a worm and a virus is that a virus does not have a propagation vector. i.e., it will only effect one host and does not propagate to other hosts. Worms propagate and infect other computers. Majority of threats are actually worms that propagate to other hosts.
  • 11. Why do people do it ?Why do people do it ? • For some people creating viruses seems to be thrill. • Thrill of watching things blow up.
  • 12. VirusesViruses • Viruses show us how vulnerable we are • A properly engineered virus can have an amazing effect on the Internet • They show how sophisticated and interconnected human beings have become.
  • 13. – File infector virus • Infect program files – Boot sector virus • Infect the system area of a disk – Master boot record virus • infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. – Multi-partite virus • infect both boot records and program files – Macro virus • infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access files Types of VirusesTypes of Viruses
  • 14. Melissa Virus (March 1999)Melissa Virus (March 1999) Melissa virus spread in Microsoft Word documents sent via e-mail. How it works ? • Created the virus as word document • Uploaded to an internet newsgroup • Anyone who download the document and opened it would trigger the virus. • Send friendly email messages to first 50 people in person’s address book.
  • 15. Melissa VirusMelissa Virus Melissa Virus was the fastest spreading virus ever seen. Forced a number of large companies to shut down their e-mail systems.
  • 16. I Love You Virus (May,2000)I Love You Virus (May,2000) • Contained a piece of code as an attachment. • Double Click on the attachment triggered the code. • Sent copies of itself to everyone in the victim’s address book • Started corrupting files on the victim’s machine.
  • 17. Code Red (Worm)Code Red (Worm) • Code Red made huge headlines in 2001 • It slowed down internet traffic when it began to replicate itself. • Each copy of the worm scanned the internet for Windows NT or Windows 2000 that don’t have security patch installed. • Each time it found an unsecured server, the worm copied itself to that server.
  • 18. Code Red WormCode Red Worm Designed to do three things  Replicate itself for the first 20 days of each month.  Replace web pages on infected servers with a page that declares “Hacked by Chinese”  Launch a concreted attack on the White House Web server
  • 19. Symptoms of InfectionSymptoms of Infection • Programs take longer to load than normal. • Computer’s hard drive constantly runs out of free space. • The floppy disk drive or hard drive runs when you are not using it. • New files keep appearing on the system and you don’t know where it come frm.
  • 20. Symptoms of Infection Cont..Symptoms of Infection Cont.. • Strange sounds or beeping noises come from the computer. • Strange graphics are displayed on your computer monitor. • Unable to access the hard drive when booting from the floppy drive. • Program sizes keep changing.
  • 21. ProtectionProtection • TO protect yourself you need to be “Proactive” about Security issues. Being reactive won’t solve anything; Specially at crunch time and deadlines!! In matter of fact it can make the problem much more complex to solve, and the situation much worse, resulting in a complete Nightmare!! • Best Measures are the preventative ones.
  • 22. Protection MeasuresProtection Measures • You need to basically to do four steps to keep your computer and your data secure: 1. Get the latest Anti-Virus Software. 2. Make sure you have the latest security patches and hot fixes using Windows Update. 3. Use a Host-Based Firewall. 4. BACKUP your Important Files.
  • 23. ConclusionConclusion Be aware of the new infections out there. Take precaution measures. Always backup your data. Keep up-to-date on new Anti virus software. Simply avoid programs from unknown sources.