SlideShare a Scribd company logo
COMPUTER VIRUSES AND WORMS
#1 VIRUS
Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation.
 A computer virus might corrupt or delete data on your computer, use your email program to
spread itself to other computers, or even erase everything on your hard disk.
 Computer viruses are often spread by attachments in email messages or instant messaging
messages. That is why it is essential that you never open email attachments unless you know
who it's from and you are expecting it.
 Viruses can be disguised as attachments of funny images, greeting cards, or audio and video
files.
 Computer viruses also spread through downloads on the Internet. They can be hidden in
illicit software or other files or programs you might download.
Typical things that some current Personal Computer (PC) viruses do:
 Display a message
 Erase files
 Scramble data on a hard disk
 Cause erratic screen behavior
 Halt the PC
 Many viruses do nothing obvious at all except
spread!
Types:
1. Executable Viruses
 Traditional viruses
 Pieces of code attached to a legitimate program
 Run when the legitimate program gets executed
 Loads itself into memory and looks around to see if it can find any other programs
on the disk
2. Boot Sector Viruses
 Traditional Virus
 Infect the boot sector on floppy disks and hard disks
 By putting its code in the boot sector, a virus can guarantee it gets executed
 Load itself into memory immediately, and it is able to run whenever the computer is
on
MELISSA VIRUS:
 March 1999
 The Melissa virus was the fastest-spreading virus ever seen
 Someone created the virus as a Word document uploaded to an Internet news group
 People who downloaded the document and opened it would trigger the virus
 The virus would then send the document in an e-mail message to the first 50 people in
the person's address book
 Took advantage of the programming language built into Microsoft Word called VBA
(Visual Basic for Applications)
 The Melissa virus is a macro virus that was spread through email attachments in 1999.
 The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo.
PREVENTION:
 Updates
o Windows has a feature called Critical Updates
o An entire branch of Microsoft dedicated to staying one step ahead of the
hackers
o When a possible security loophole is fixed, you need to download the patch right
away
 Anti-Viruses
 More secure operating systems
o e.g. UNIX
 Here are some actions you can take:
o Install an antivirus program.
o Don't open email attachments unless you're expecting them.
o Keep your computer updated.
o Use a firewall. Windows Firewall (or any other firewall) can help alert you to
suspicious activity if a virus or worm attempts to connect to your computer
TROJAN VIRUS
Trojans are malicious programs that perform actions that have not been authorized by the
user. These actions can include:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers
or computer networks
 Unlike computer viruses and worms, Trojans are not able to self-replicate
 How Trojans can impact you:
BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected computer –
including sending, receiving, launching and deleting files, displaying data and rebooting
the computer. Backdoor Trojans are often used to unite a group of victim computers to
form a botnet or zombie network that can be used for criminal purposes.
EXPLOIT: Exploits are programs that contain data or code that takes advantage of a
vulnerability within application software that’s running on your computer
 A very important distinction from true viruses is that they do not replicate
themselves, as viruses do. Trojans contain malicious code, that, when triggered,
cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in
effect, invite these programs onto your computers--for example, by opening an email
attachment.
#2 WORMS
Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and
becomes part of, another executable program; however, a worm is self-contained and does not
need to be part of another program to propagate itself.
WORMS – is a small piece of software that uses computer networks and security holes to replicate
itself. A copy of the worm scans the network for another machine that has a specific security hole. It
copies itself to the new machine using the security hole, and then starts replicating from there, as
well.
They are often designed to exploit the file transmission capabilities found on many computers.
MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert
Tappan Morris, who at the time was a graduate student at Cornell University.
It was released on November 2, 1988. The level of replication created system loads that not only
brought it to the attention of system administrators, but also disrupted the target computers. It was
guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it
ranged at each system from $200 to more than $53,000
Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’
probation, community service and a fine in excess of $10,000.
ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT

More Related Content

Similar to COMPUTER VIRUSES AND WORMS.pdf

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Virus
VirusVirus
Virus
dddaou
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
VijayPatidar71
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
NORTHCUSTOMS
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
PrinceYdvz
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
Priyanka Aggarwal
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
AsimRaza464161
 
Viruses
VirusesViruses
Viruses
AlyssaFerrer7
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
Kalpana Dangol
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 

Similar to COMPUTER VIRUSES AND WORMS.pdf (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Mahmud Hasan Tanvir

DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEMDATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
Mahmud Hasan Tanvir
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
Mahmud Hasan Tanvir
 
Cybercrime
CybercrimeCybercrime
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
Mahmud Hasan Tanvir
 
Chemistry Fundamentals
Chemistry FundamentalsChemistry Fundamentals
Chemistry Fundamentals
Mahmud Hasan Tanvir
 
C++ QNA
C++ QNAC++ QNA
Attributes in Entity-Relationship Model
Attributes in Entity-Relationship ModelAttributes in Entity-Relationship Model
Attributes in Entity-Relationship Model
Mahmud Hasan Tanvir
 
Applications of Radioisotopes.pdf
Applications of Radioisotopes.pdfApplications of Radioisotopes.pdf
Applications of Radioisotopes.pdf
Mahmud Hasan Tanvir
 
Arithmetic Expression
Arithmetic ExpressionArithmetic Expression
Arithmetic Expression
Mahmud Hasan Tanvir
 
FOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLESFOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLES
Mahmud Hasan Tanvir
 
Fable.docx
Fable.docxFable.docx
Basic C Programming Lab Practice
Basic C Programming Lab PracticeBasic C Programming Lab Practice
Basic C Programming Lab Practice
Mahmud Hasan Tanvir
 
Rape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdfRape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdf
Mahmud Hasan Tanvir
 
First Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdfFirst Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdf
Mahmud Hasan Tanvir
 
Difference between a variable and a constant.pdf
Difference between a variable and a constant.pdfDifference between a variable and a constant.pdf
Difference between a variable and a constant.pdf
Mahmud Hasan Tanvir
 
Defects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdfDefects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdf
Mahmud Hasan Tanvir
 

More from Mahmud Hasan Tanvir (16)

DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEMDATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Chemistry Fundamentals
Chemistry FundamentalsChemistry Fundamentals
Chemistry Fundamentals
 
C++ QNA
C++ QNAC++ QNA
C++ QNA
 
Attributes in Entity-Relationship Model
Attributes in Entity-Relationship ModelAttributes in Entity-Relationship Model
Attributes in Entity-Relationship Model
 
Applications of Radioisotopes.pdf
Applications of Radioisotopes.pdfApplications of Radioisotopes.pdf
Applications of Radioisotopes.pdf
 
Arithmetic Expression
Arithmetic ExpressionArithmetic Expression
Arithmetic Expression
 
FOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLESFOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLES
 
Fable.docx
Fable.docxFable.docx
Fable.docx
 
Basic C Programming Lab Practice
Basic C Programming Lab PracticeBasic C Programming Lab Practice
Basic C Programming Lab Practice
 
Rape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdfRape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdf
 
First Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdfFirst Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdf
 
Difference between a variable and a constant.pdf
Difference between a variable and a constant.pdfDifference between a variable and a constant.pdf
Difference between a variable and a constant.pdf
 
Defects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdfDefects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdf
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

COMPUTER VIRUSES AND WORMS.pdf

  • 1. COMPUTER VIRUSES AND WORMS #1 VIRUS Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.  Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.  Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Typical things that some current Personal Computer (PC) viruses do:  Display a message  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread! Types: 1. Executable Viruses  Traditional viruses  Pieces of code attached to a legitimate program  Run when the legitimate program gets executed  Loads itself into memory and looks around to see if it can find any other programs on the disk 2. Boot Sector Viruses  Traditional Virus  Infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  Load itself into memory immediately, and it is able to run whenever the computer is on
  • 2. MELISSA VIRUS:  March 1999  The Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet news group  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e-mail message to the first 50 people in the person's address book  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)  The Melissa virus is a macro virus that was spread through email attachments in 1999.  The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo. PREVENTION:  Updates o Windows has a feature called Critical Updates o An entire branch of Microsoft dedicated to staying one step ahead of the hackers o When a possible security loophole is fixed, you need to download the patch right away  Anti-Viruses  More secure operating systems o e.g. UNIX  Here are some actions you can take: o Install an antivirus program. o Don't open email attachments unless you're expecting them. o Keep your computer updated. o Use a firewall. Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer TROJAN VIRUS Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks  Unlike computer viruses and worms, Trojans are not able to self-replicate  How Trojans can impact you: BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting
  • 3. the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes. EXPLOIT: Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer  A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers--for example, by opening an email attachment. #2 WORMS Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. WORMS – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. They are often designed to exploit the file transmission capabilities found on many computers. MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. It was released on November 2, 1988. The level of replication created system loads that not only brought it to the attention of system administrators, but also disrupted the target computers. It was guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it ranged at each system from $200 to more than $53,000 Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’ probation, community service and a fine in excess of $10,000. ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT