SlideShare a Scribd company logo
Objectives

• Name some Computer Virus

• List different attacks of computer viruses
HISTORY
    OF
COMPUTER
  VIRUS
COMPUTER VIRUS
Program that spread,
replicate
and
Interferes computer
operation
How does it

AFFECT
Computers?
Viruses can

•   slow down your computer
•   corrupt your system files
•   make some programs faulty or corrupt
•   damage your boot sector
•   Tie up Internet traffic
•   turn your computer into a slave
•   steal important information from your computer
•   change the power ratings and blast your computer
•   worst case
    can make your computer unusable
Viruses behave in different ways

•   Hide in the system
•   Replace files
•   Replicate files
•   Delete files
•   Run programs
•   Send files and info
•   Deny access
•   Reboot computers
•   Clog your memory
Email attachments
Rogue Websites
Networks
Infected storage disks
Infected Software
Fake Anti Virus Software
Pirated programs
From Mobile Devices
Different types
         of

Computer Virus
•   Memory Resident Virus   •   Companion Viruses
•   Direct Action Viruses   •   FAT Virus
•   Overwrite Viruses
                            •   Multipartite Virus
•   Boot Sector Virus
                            •   Web Scripting Virus
•   Macro Virus
                            •   Worms
•   Directory Virus
•   Polymorphic Virus       •   Trojans
                            •   Logic Bombs
                            •   Rootkits
•   Memory Resident Virus   •   Companion Viruses
•   Direct Action Viruses   •   FAT Virus
•   Overwrite Viruses
                            •   Multipartite Virus
•   Boot Sector Virus
                            •   Web Scripting Virus
•   Macro Virus
                            •   Worms
•   Directory Virus
•   Polymorphic Virus       •   Trojans
                            •   Logic Bombs
                            •   Rootkits
OVERWRITE VIRUS

      deletes information contained in the files that it infects and
sometimes reboot the system

EX.
       Way
       Trj.Reboot
       Trivial.88.D

DAMAGE: files may be partially or totally
      useless
DIRECTORY VIRUS (CLUSTER)
       changing the path that indicates the location of a file and renaming all
executable to non-executable extensions. When you run the program, you first
run the virus

EX. Dir-2 virus (creeping death)

DAMAGE: Once infected, it becomes impossible to locate the original files.
FAT virus
Damaged the part of a disk used to store all the information about the location of
files, available space, unusable space, etc.
FILE ALLOCATION TABLE

Ex. Link Virus

Damage:
cause serious damage to computer
reformat needed.
WEB scripting Virus
originated from websites used for social networking.
Attached a link that could lead to other harmful sites.

Symptoms
       Yahoo and Google search will be re-directed
       Homepage of web browser, desktop          background often
get changed automatically

Damage: slow down the performance of the machine
Trojans
    •   Disguise as a useful program
    •   steal end-user information (credit card info, banks etc.)
    •   perform destructive harm on the target computer
    •   download additional computer malware

    Took its name From the Greek myth ‘Trojan Horse’
                     ex. Chernobyl virus 1998




                              Damage: perform destructive features   on the
                              computer.
Worms
replicates itself in order to spread to other computers
sends out hundreds or thousands of copies
creating a huge devastating effect

Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000
    ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages.        10% of all Internet-
connected computers were hit.


                      Damage
                      consumes too much system memory(or network
                      bandwidth), causing Web servers, network servers and individual
                      computers to stop responding
Rootkit
allow viruses and malware to “hide in plain sight” by disguising as necessary files that
your antivirus software will overlook
Worst case:
         control your computer and turn it into ‘Zombie’
            “secretly compromised by hacking tools which allow a third party to control the   computer and its resources
remotely”
HOW TO COUNTER



COMPUTER VIRUS
SCAN EMAIL ATTACHMENTS
USE WINDOWS FIREWALL
INSTALL A RELIABLE ANTIVIRUS
AVOID SUSPICIOS WEBSITE
WATCH YOUR DOWNLOADS
Computer Virus
•   Memory Resident Virus          •   Companion Viruses
•   Direct Action Viruses          •   FAT Virus
•   Overwrite Viruses              •   Multipartite Virus
•   Boot Sector Virus              •   Web Scripting Virus
•   Macro Virus                    •   Worms
•   Directory Virus                •   Trojans
•   Polymorphic Virus              •   Logic Bombs
                                   •   Rootkits
Viruses can

•   slow down your computer
•   corrupt your system files
•   make some programs faulty or corrupt
•   damage your boot sector
•   Tie up Internet traffic
•   turn your computer into a slave
•   steal important information from your computer
•   change the power ratings and blast your computer
•   worst case
    can make your computer unusable
 Cruda, mayday pp tx 2

More Related Content

What's hot

Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
Nikhil Pandit
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
Louise Balicat
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Virus
VirusVirus
Virus
plsriram8
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Virus
VirusVirus
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
dixitas
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Know Your Worm (Conficker)
Know Your Worm (Conficker)Know Your Worm (Conficker)
Know Your Worm (Conficker)
avahe
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
Anuj Khandelwal
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
Ranjeta Muniandy
 

What's hot (20)

Viruses And Hacking
Viruses And HackingViruses And Hacking
Viruses And Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Virus
VirusVirus
Virus
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Virus
VirusVirus
Virus
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Conficker
ConfickerConficker
Conficker
 
Backdoor
BackdoorBackdoor
Backdoor
 
Data Base Attack
Data Base AttackData Base Attack
Data Base Attack
 
Kernel.org Hacked & Rooted
Kernel.org Hacked & RootedKernel.org Hacked & Rooted
Kernel.org Hacked & Rooted
 
Know Your Worm (Conficker)
Know Your Worm (Conficker)Know Your Worm (Conficker)
Know Your Worm (Conficker)
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Conficker
ConfickerConficker
Conficker
 

Viewers also liked

Como de grandes son tus datos
Como de grandes son tus datosComo de grandes son tus datos
Como de grandes son tus datosAntonio Rodriguez
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1
luki_83
 
Dividend and dividend act
Dividend and dividend actDividend and dividend act
Dividend and dividend actAltacit Global
 
Contexto Histórico
Contexto HistóricoContexto Histórico
Contexto Histórico
Paulo Otávio Cardoso Borges
 
Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013zerr0
 
реком для презентаций
реком для презентацийреком для презентаций
реком для презентацийzerr0
 
EXAMEN COMPUTACION
EXAMEN COMPUTACIONEXAMEN COMPUTACION
EXAMEN COMPUTACION
vegsonia
 
Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Frédérique Prévost
 
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...YouthEduForum
 
Carol Foy - CV
Carol Foy - CVCarol Foy - CV
Carol Foy - CVCarol Foy
 
Éducation et numérique : quelques étapes
Éducation et numérique : quelques étapesÉducation et numérique : quelques étapes
Éducation et numérique : quelques étapes
Benoit Lacherez
 
تريز
تريزتريز
تريز
pietyword
 
Historia de la informática
Historia de la informáticaHistoria de la informática
Historia de la informática
Cecilia_Teobaldo
 
Interactive upload
Interactive uploadInteractive upload
Interactive upload
SS Free
 
Doença cardíaca crônica e Anemia
Doença cardíaca crônica e AnemiaDoença cardíaca crônica e Anemia
Doença cardíaca crônica e Anemia
Michael Collan
 
Звернення
ЗверненняЗвернення
Звернення
Игорь Кулик
 
Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Altacit Global
 

Viewers also liked (20)

8086 Architecture by Er. Swapnil Kaware
8086 Architecture by Er. Swapnil Kaware8086 Architecture by Er. Swapnil Kaware
8086 Architecture by Er. Swapnil Kaware
 
Como de grandes son tus datos
Como de grandes son tus datosComo de grandes son tus datos
Como de grandes son tus datos
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1
 
Dividend and dividend act
Dividend and dividend actDividend and dividend act
Dividend and dividend act
 
Contexto Histórico
Contexto HistóricoContexto Histórico
Contexto Histórico
 
Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013Родительское собрание ЕГЭ-2013
Родительское собрание ЕГЭ-2013
 
реком для презентаций
реком для презентацийреком для презентаций
реком для презентаций
 
EXAMEN COMPUTACION
EXAMEN COMPUTACIONEXAMEN COMPUTACION
EXAMEN COMPUTACION
 
Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01Du2013poynardtraitementhcv 130118061904-phpapp01
Du2013poynardtraitementhcv 130118061904-phpapp01
 
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
Танго Милонгера Скопје - Танго, комерцијала, стереотип, идеологија, политика ...
 
Jeopardy 1
Jeopardy 1Jeopardy 1
Jeopardy 1
 
Alvin pp
Alvin ppAlvin pp
Alvin pp
 
Carol Foy - CV
Carol Foy - CVCarol Foy - CV
Carol Foy - CV
 
Éducation et numérique : quelques étapes
Éducation et numérique : quelques étapesÉducation et numérique : quelques étapes
Éducation et numérique : quelques étapes
 
تريز
تريزتريز
تريز
 
Historia de la informática
Historia de la informáticaHistoria de la informática
Historia de la informática
 
Interactive upload
Interactive uploadInteractive upload
Interactive upload
 
Doença cardíaca crônica e Anemia
Doença cardíaca crônica e AnemiaDoença cardíaca crônica e Anemia
Doença cardíaca crônica e Anemia
 
Звернення
ЗверненняЗвернення
Звернення
 
Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)Use and reputation – ft – case (ipab)
Use and reputation – ft – case (ipab)
 

Similar to Cruda, mayday pp tx 2

Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
Sreekanth Narendran
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
vivek pratap singh
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
glainAE
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
GrittyCC
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
malikmuzammil2326
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
KennethMorales26
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Viruses worms
Viruses wormsViruses worms
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
EimerejDlcrz
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 

Similar to Cruda, mayday pp tx 2 (20)

Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
It ppt new
It ppt newIt ppt new
It ppt new
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Cruda, mayday pp tx 2

  • 1.
  • 2. Objectives • Name some Computer Virus • List different attacks of computer viruses
  • 3. HISTORY OF COMPUTER VIRUS
  • 4.
  • 6.
  • 9. Viruses can • slow down your computer • corrupt your system files • make some programs faulty or corrupt • damage your boot sector • Tie up Internet traffic • turn your computer into a slave • steal important information from your computer • change the power ratings and blast your computer • worst case can make your computer unusable
  • 10. Viruses behave in different ways • Hide in the system • Replace files • Replicate files • Delete files • Run programs • Send files and info • Deny access • Reboot computers • Clog your memory
  • 11.
  • 12. Email attachments Rogue Websites Networks Infected storage disks Infected Software Fake Anti Virus Software Pirated programs From Mobile Devices
  • 13. Different types of Computer Virus
  • 14. Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  • 15. Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Polymorphic Virus • Trojans • Logic Bombs • Rootkits
  • 16. OVERWRITE VIRUS deletes information contained in the files that it infects and sometimes reboot the system EX. Way Trj.Reboot Trivial.88.D DAMAGE: files may be partially or totally useless
  • 17. DIRECTORY VIRUS (CLUSTER) changing the path that indicates the location of a file and renaming all executable to non-executable extensions. When you run the program, you first run the virus EX. Dir-2 virus (creeping death) DAMAGE: Once infected, it becomes impossible to locate the original files.
  • 18. FAT virus Damaged the part of a disk used to store all the information about the location of files, available space, unusable space, etc. FILE ALLOCATION TABLE Ex. Link Virus Damage: cause serious damage to computer reformat needed.
  • 19. WEB scripting Virus originated from websites used for social networking. Attached a link that could lead to other harmful sites. Symptoms Yahoo and Google search will be re-directed Homepage of web browser, desktop background often get changed automatically Damage: slow down the performance of the machine
  • 20. Trojans • Disguise as a useful program • steal end-user information (credit card info, banks etc.) • perform destructive harm on the target computer • download additional computer malware Took its name From the Greek myth ‘Trojan Horse’ ex. Chernobyl virus 1998 Damage: perform destructive features on the computer.
  • 21. Worms replicates itself in order to spread to other computers sends out hundreds or thousands of copies creating a huge devastating effect Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000 ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages. 10% of all Internet- connected computers were hit. Damage consumes too much system memory(or network bandwidth), causing Web servers, network servers and individual computers to stop responding
  • 22. Rootkit allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook Worst case: control your computer and turn it into ‘Zombie’ “secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely”
  • 26. INSTALL A RELIABLE ANTIVIRUS
  • 29.
  • 30.
  • 31. Computer Virus • Memory Resident Virus • Companion Viruses • Direct Action Viruses • FAT Virus • Overwrite Viruses • Multipartite Virus • Boot Sector Virus • Web Scripting Virus • Macro Virus • Worms • Directory Virus • Trojans • Polymorphic Virus • Logic Bombs • Rootkits
  • 32. Viruses can • slow down your computer • corrupt your system files • make some programs faulty or corrupt • damage your boot sector • Tie up Internet traffic • turn your computer into a slave • steal important information from your computer • change the power ratings and blast your computer • worst case can make your computer unusable