SlideShare a Scribd company logo
Computer Viruses & Management Strategies

Dasun Hegoda
Software Engineer
What we are going to talk
●

What's Malware

●

Spyware, Adware, Backdoor

●

What's A Computer Virus

●

Why Computer Malware(Virus)

●

How Viruses Are Created

●

How Viruses Are Spread

●

Types Of Malware

●

Types Of Viruses
What we are going to talk
●

How To Detect A Malware(Virus)

●

How To Protect Yourself

●

Top Anti-Virus Programs

●

BuzzWords

●

Bottom Line
Malware Definitions
Malware Definitions
●

●

●

Malware, short for malicious software, is software used to
disrupt computer operation, gather sensitive information,
or gain access to private computer systems.
It can appear in the form of code, scripts, active content,
and other software.
Malware includes computer viruses, ransomware, worms,
trojan horses, rootkits, keyloggers, dialers, spyware,
adware, malicious BHOs, rogue security software and
other malicious programs.
Spyware, Adware, Backdoor
Spyware
●

●

●

●

Spyware is malicious computer program that does exactly what
its name implies Eg:, spies on you.
After downloading itself onto your computer either through an
email you opened, website you visited or a program you
downloaded, spyware scans your hard drive for personal
information and your internet browsing habits.
Some spyware programs contain keyloggers that will record
personal data you enter in to websites, such as your login
usernames and passwords, email addresses, browsing history as
well as sensitive banking and credit information.
Some spyware can interfere with your computer's system
settings, which can result in a slower internet connection.
Adware
●

●

●

Adware is any software that, once installed on your
computer, tracks your internet browsing habits and
sends you popups containing advertisements related to
the sites and topics you've visited.
While this type of software may sound innocent, and
even helpful, it consumes and slows down your
computer's processor and internet connection speed.
Additionally, some adware has keyloggers and spyware
built into the program, leading to greater damage to
your computer and possible invasion of your private
data.
Backdoor
●

●

●

●

A backdoor is a method of bypassing normal
authentication procedures.
Once a system has been compromised one or more
backdoors maybe installed in order to allow easier access
in the future.
Backdoors may also be installed prior to malicious
software, to allow attackers entry.
Crackers typically use backdoors to secure remote access
to a computer, while attempting to remain hidden from
casual inspection.
Computer Virus Definitions
What's A Computer Virus
●

●

A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs, data
files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to
be "infected".
Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space or CPU
time, accessing private information, corrupting data,
displaying political or humorous messages on the user's
screen, spamming their contacts, or logging their
keystrokes.
What's A Computer Virus
●

●

●

The defining characteristic of viruses is that they are
self-replicating computer programs which install
themselves without the user's consent.
Virus writers use social engineering and exploit detailed
knowledge of security vulnerabilities to gain access to
their hosts' computing resources.
The vast majority of viruses (over 99%) target systems
running Microsoft Windows, employing a variety of
mechanisms to infect new hosts, and often using
complex anti-detection/stealth strategies to evade
antivirus software.
World 1st Computer Virus
●

●

The first ever computer virus was developed in 1986 by
two Pakistani brothers in Lahore Pakistan.
It was named “Brain” and was designed by Amjad
Farooq Alvi and Basit Farooq Alvi with the intention of
discouraging the piracy of a software written by them.
Why Computer Malware(Virus)
Why Computer Malware(Virus)
●

Seeking profit

●

Desire to send a political message

●

Personal amusement

●

To demonstrate that a vulnerability exists in software

●

For sabotage and denial of service

●

To explore evolutionary algorithms

●

Cause systems failures.

●

Steal information.

●

To prove a point, to prove it can be done, to prove ones
skill or for revenge purposes.
How Viruses Are Created
How Viruses Are Created
●

●

●

●

The first step is that someone will create the virus.
The 2nd step is to pick out the program that the person
wants to attach to.
The 3rd step is attaching the virus to the program.
The 4th step is to try to lure or advertise the program,
so someone will download it in to your computer.

●

The 5th step is to have the virus get in to the computer.

●

The 6th step is to infect the computer.

●

The 7th step is to destroy all of the files on the
computer & more.
How Viruses Are Spread
How Viruses Are Spread
●

Email attachments

●

●

Rogue Websites

●

●

Networks

Instant Messaging
Fake Anti Virus
Software

Infected Boot Disks

●

From Mobile Devices

●

Phishing Schemes

●

Friends and Relatives

●

Infected Software

●

Hackers

●
Types Of Malware
Types Of Malware
●

●

Trojan horses : A Trojan horse is simply a computer
program. The program claims to do one thing (it may
claim to be a game) but instead does damage when
you run it (it may erase your hard disk). Trojan horses
have no way to replicate automatically.
Worms : A worm is a small piece of software that uses
computer networks and security holes to replicate itself.
A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself
to the new machine using the security hole, and then
starts replicating from there, as well.
Types Of Malware

●

Viruses : A virus is a small piece of software that
piggybacks on real programs. For example, a virus
might attach itself to a program such as a spreadsheet
program. Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to reproduce (by
attaching to other programs).
Types Of Malware

●

E-mail viruses : An e-mail virus travels as an
attachment to e- mail messages, and usually replicates
itself by automatically mailing itself to dozens of people
in the victim's e-mail address book. Some e-mail
viruses don't even require a double-click -- they launch
when you view the infected message in the preview
pane of your e-mail software
Types Of Viruses
Types Of Viruses
●

Boot Sector Virus

●

Browser Hijacker

●

Direct Action Virus

●

File Infector Virus

●

Macro Virus

●

Multipartite Virus

●

Polymorphic Virus

●

Resident Virus

●

Web Scripting Virus
How To Detect A Virus
How To Detect A Malware(Virus)?
●

Programs takes longer to load.

●

The programs sizes keep changing.

●

The drive light keeps flashing when you are not doing
anything(Loading).

●

User created files have strange names.

●

The computer doesn't remember CMOS settings.

●

System crashes for no reason.

●

Screen sometimes flicker.

●

Files/directories sometimes disappear.
How To Detect A Malware(Virus)?
●

It might change the power ratings of your computer and
could blast the system.

●

You cannot print items correctly.

●

Disks or disk drives are inaccessible.

●

Applications on the computer do not work correctly.

●

Strange sounds or music plays from the speakers
unexpectedly.

●

Computer restarts every few minutes automatically.

●

…........
How To Protect Yourself
How To Protect Yourself
●

Use Antivirus Programs

●

Use Firewalls

●

Make Passwords Encrypted

●

Scan your PC Daily

●

Switch off net when not using

●

Don’t download software from unknown source

●

Disable Auto run

●

Read reviews before installing software
How To Protect Yourself
●

Download anti-spyware program

●

Don’t open e-mail that you are not sure

●

Keep backups

●

Keep OS up to date

●

Scan removable storages
Top Anti-Virus Programs
Top Anti-Virus Programs
●

Bitdefender Antivirus

●

Kaspersky Anti-Virus

●

Norton AntiVirus

●

F-Secure Anti-Virus

●

AVG Anti-Virus

●

Avast! Pro Antivirus

●

McAfee AntiVirus

●

Panda Antivirus Pro
Buzzwords
FireWalls
●

●

A firewall is a software or hardware-based network
security system that controls the incoming and
outgoing network traffic by analyzing the data packets
and determining whether they should be allowed
through or not, based on applied rule set.
Firewalls can be defined in many ways according to
your level of understanding. A firewall establishes a
barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is not assumed
to be secure and trusted.
FireWalls
Antivirus software
●

●

●

Antivirus, anti-virus, or AV software is computer software used
to prevent, detect and remove malicious computer viruses.
Most software described as antivirus also works against other
types of malware, such as malicious Browser Helper Objects
(BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs,
dialers, fraudtools, adware and spyware.
Computer security, including protection from social
engineering techniques, is commonly offered in products and
services of antivirus software companies.
Boot sector
●

●

A boot sector or boot block is a region of a hard disk,
floppy disk, optical disc, or other data storage device
that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in
firmware.
The purpose of a boot sector is to allow the boot
process of a computer to load a program (usually, but
not necessarily, an operating system) stored on the
same storage device.
Encryption
●

●

●

Encryption is the process of encoding messages (or
information) in such a way that third parties cannot read
it, but only authorized parties can.
Encryption doesn't prevent hacking but it prevents the
hacker from reading the data that is encrypted.
The message or information (referred to as plaintext) is
encrypted using an encryption algorithm, turning it into
an unreadable ciphertext.
That's It!!!
Bottom Line
●

●

Computer viruses currently cause billions of dollars
worth of economic damage each year, due to causing
systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc.
In response, free, open-source anti-virus tools have
been developed, and a multi-billion dollar industry of
anti-virus software vendors has cropped up, selling
virus protection to Windows users. Unfortunately, no
currently existing anti-virus software is able to catch all
computer viruses.
References
●

www.makeuseof.com/tag/types-computer-viruses-watch/

More Related Content

What's hot

Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
NMEICT
NMEICTNMEICT
NMEICT
PoojaWalia6
 
Recent Innovations in Educational Technology in India for the Delivery of Lif...
Recent Innovations in Educational Technology in India for the Delivery of Lif...Recent Innovations in Educational Technology in India for the Delivery of Lif...
Recent Innovations in Educational Technology in India for the Delivery of Lif...
Anup Kumar Das
 
E learning tools - an overview
E learning tools - an overviewE learning tools - an overview
E learning tools - an overviewDavid Jeckells
 
Role of education in ICT ppt
Role of education in ICT pptRole of education in ICT ppt
Role of education in ICT ppt
akashtoppo2
 
M learning
M  learning M  learning
M learning
Dr.Amol Ubale
 
ICT in lesson plan & evaluation
ICT in lesson plan & evaluationICT in lesson plan & evaluation
ICT in lesson plan & evaluation
Dr.Suresh Isave
 
Virtual learning environment(vle)
Virtual learning environment(vle)Virtual learning environment(vle)
Virtual learning environment(vle)Saurav Kumar
 
Home language vs school language
Home language vs school languageHome language vs school language
Home language vs school language
Hathib KK
 
Higher education system in india
Higher education system in indiaHigher education system in india
Higher education system in india
Maddali Swetha
 
Multi Sensory Approach in Education Technology
Multi Sensory Approach in Education TechnologyMulti Sensory Approach in Education Technology
Multi Sensory Approach in Education Technology
Suresh Babu
 
About E learning
About E learning About E learning
About E learning
Lili Lulu
 
Presentation on MOBILE LEARNING
Presentation on MOBILE LEARNINGPresentation on MOBILE LEARNING
Presentation on MOBILE LEARNING
Aditya Sarkar
 
role of educational technology in CCE
role of educational technology in CCErole of educational technology in CCE
role of educational technology in CCE
Educational Learner
 
SWAYAM
SWAYAMSWAYAM
SWAYAM
DivyaDubey36
 
E-Content Development for Effective Learning
E-Content Development for Effective LearningE-Content Development for Effective Learning
E-Content Development for Effective Learning
Dr.(Mrs).Gethsiyal Augasta
 
Digital Education
Digital EducationDigital Education
Digital Education
Mohammad Jilani
 
M learning ppt
M learning pptM learning ppt
M learning ppt
GangaJsparu
 
Basic idea on ict in education
Basic idea on ict in educationBasic idea on ict in education
Basic idea on ict in education
Prakash Neupane
 

What's hot (20)

Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
NMEICT
NMEICTNMEICT
NMEICT
 
Recent Innovations in Educational Technology in India for the Delivery of Lif...
Recent Innovations in Educational Technology in India for the Delivery of Lif...Recent Innovations in Educational Technology in India for the Delivery of Lif...
Recent Innovations in Educational Technology in India for the Delivery of Lif...
 
E learning tools - an overview
E learning tools - an overviewE learning tools - an overview
E learning tools - an overview
 
Role of education in ICT ppt
Role of education in ICT pptRole of education in ICT ppt
Role of education in ICT ppt
 
M learning
M  learning M  learning
M learning
 
ICT in lesson plan & evaluation
ICT in lesson plan & evaluationICT in lesson plan & evaluation
ICT in lesson plan & evaluation
 
Virtual learning environment(vle)
Virtual learning environment(vle)Virtual learning environment(vle)
Virtual learning environment(vle)
 
Home language vs school language
Home language vs school languageHome language vs school language
Home language vs school language
 
Higher education system in india
Higher education system in indiaHigher education system in india
Higher education system in india
 
Multi Sensory Approach in Education Technology
Multi Sensory Approach in Education TechnologyMulti Sensory Approach in Education Technology
Multi Sensory Approach in Education Technology
 
About E learning
About E learning About E learning
About E learning
 
Presentation on MOBILE LEARNING
Presentation on MOBILE LEARNINGPresentation on MOBILE LEARNING
Presentation on MOBILE LEARNING
 
role of educational technology in CCE
role of educational technology in CCErole of educational technology in CCE
role of educational technology in CCE
 
College Autonomy
College AutonomyCollege Autonomy
College Autonomy
 
SWAYAM
SWAYAMSWAYAM
SWAYAM
 
E-Content Development for Effective Learning
E-Content Development for Effective LearningE-Content Development for Effective Learning
E-Content Development for Effective Learning
 
Digital Education
Digital EducationDigital Education
Digital Education
 
M learning ppt
M learning pptM learning ppt
M learning ppt
 
Basic idea on ict in education
Basic idea on ict in educationBasic idea on ict in education
Basic idea on ict in education
 

Viewers also liked

Avalon 2016 Overview
Avalon 2016 OverviewAvalon 2016 Overview
Avalon 2016 Overview
Avalon Media System
 
風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。
Kenichirou Igari
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategy
Mark Blessington
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R LibraryDavid Faris
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahiImran Ismail
 
Archivo pdf
Archivo pdfArchivo pdf
Avalon 5.0 and Beyond
Avalon 5.0 and BeyondAvalon 5.0 and Beyond
Avalon 5.0 and Beyond
Avalon Media System
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)
Vikas Pandey
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy dramatimeclarke94
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
Avalon Media System
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
Avalon Media System
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module
Jm Olaybar
 
EL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBEREL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBER
María Pedrayes
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar
Avalon Media System
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]
yatie1977
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement Statistic
Mark Blessington
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)
plamen79
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-C
Vikas Pandey
 

Viewers also liked (20)

Avalon 2016 Overview
Avalon 2016 OverviewAvalon 2016 Overview
Avalon 2016 Overview
 
風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。
 
Presentasi kk 2
Presentasi kk 2Presentasi kk 2
Presentasi kk 2
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategy
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R Library
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahi
 
Archivo pdf
Archivo pdfArchivo pdf
Archivo pdf
 
Avalon 5.0 and Beyond
Avalon 5.0 and BeyondAvalon 5.0 and Beyond
Avalon 5.0 and Beyond
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module
 
EL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBEREL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBER
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement Statistic
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-C
 
презентация для франчайзи
презентация для франчайзипрезентация для франчайзи
презентация для франчайзи
 

Similar to Computer Viruses & Management Strategies

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
Anirudh Kannan
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
Eduardo Chavarro
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
Bipulok
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 

Similar to Computer Viruses & Management Strategies (20)

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malwares
MalwaresMalwares
Malwares
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Computer Viruses & Management Strategies

  • 1. Computer Viruses & Management Strategies Dasun Hegoda Software Engineer
  • 2. What we are going to talk ● What's Malware ● Spyware, Adware, Backdoor ● What's A Computer Virus ● Why Computer Malware(Virus) ● How Viruses Are Created ● How Viruses Are Spread ● Types Of Malware ● Types Of Viruses
  • 3. What we are going to talk ● How To Detect A Malware(Virus) ● How To Protect Yourself ● Top Anti-Virus Programs ● BuzzWords ● Bottom Line
  • 5. Malware Definitions ● ● ● Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  • 7. Spyware ● ● ● ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information. Some spyware can interfere with your computer's system settings, which can result in a slower internet connection.
  • 8. Adware ● ● ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  • 9. Backdoor ● ● ● ● A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 11. What's A Computer Virus ● ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 12. What's A Computer Virus ● ● ● The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  • 13. World 1st Computer Virus ● ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  • 15. Why Computer Malware(Virus) ● Seeking profit ● Desire to send a political message ● Personal amusement ● To demonstrate that a vulnerability exists in software ● For sabotage and denial of service ● To explore evolutionary algorithms ● Cause systems failures. ● Steal information. ● To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
  • 16. How Viruses Are Created
  • 17. How Viruses Are Created ● ● ● ● The first step is that someone will create the virus. The 2nd step is to pick out the program that the person wants to attach to. The 3rd step is attaching the virus to the program. The 4th step is to try to lure or advertise the program, so someone will download it in to your computer. ● The 5th step is to have the virus get in to the computer. ● The 6th step is to infect the computer. ● The 7th step is to destroy all of the files on the computer & more.
  • 18. How Viruses Are Spread
  • 19. How Viruses Are Spread ● Email attachments ● ● Rogue Websites ● ● Networks Instant Messaging Fake Anti Virus Software Infected Boot Disks ● From Mobile Devices ● Phishing Schemes ● Friends and Relatives ● Infected Software ● Hackers ●
  • 21. Types Of Malware ● ● Trojan horses : A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms : A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 22. Types Of Malware ● Viruses : A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
  • 23. Types Of Malware ● E-mail viruses : An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  • 25. Types Of Viruses ● Boot Sector Virus ● Browser Hijacker ● Direct Action Virus ● File Infector Virus ● Macro Virus ● Multipartite Virus ● Polymorphic Virus ● Resident Virus ● Web Scripting Virus
  • 26. How To Detect A Virus
  • 27. How To Detect A Malware(Virus)? ● Programs takes longer to load. ● The programs sizes keep changing. ● The drive light keeps flashing when you are not doing anything(Loading). ● User created files have strange names. ● The computer doesn't remember CMOS settings. ● System crashes for no reason. ● Screen sometimes flicker. ● Files/directories sometimes disappear.
  • 28. How To Detect A Malware(Virus)? ● It might change the power ratings of your computer and could blast the system. ● You cannot print items correctly. ● Disks or disk drives are inaccessible. ● Applications on the computer do not work correctly. ● Strange sounds or music plays from the speakers unexpectedly. ● Computer restarts every few minutes automatically. ● …........
  • 29. How To Protect Yourself
  • 30. How To Protect Yourself ● Use Antivirus Programs ● Use Firewalls ● Make Passwords Encrypted ● Scan your PC Daily ● Switch off net when not using ● Don’t download software from unknown source ● Disable Auto run ● Read reviews before installing software
  • 31. How To Protect Yourself ● Download anti-spyware program ● Don’t open e-mail that you are not sure ● Keep backups ● Keep OS up to date ● Scan removable storages
  • 33. Top Anti-Virus Programs ● Bitdefender Antivirus ● Kaspersky Anti-Virus ● Norton AntiVirus ● F-Secure Anti-Virus ● AVG Anti-Virus ● Avast! Pro Antivirus ● McAfee AntiVirus ● Panda Antivirus Pro
  • 35. FireWalls ● ● A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
  • 37. Antivirus software ● ● ● Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
  • 38. Boot sector ● ● A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program (usually, but not necessarily, an operating system) stored on the same storage device.
  • 39. Encryption ● ● ● Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. The message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
  • 41. Bottom Line ● ● Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source anti-virus tools have been developed, and a multi-billion dollar industry of anti-virus software vendors has cropped up, selling virus protection to Windows users. Unfortunately, no currently existing anti-virus software is able to catch all computer viruses.