SlideShare a Scribd company logo
Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity
Topic: Project _Virus_ Security Date: November 25, 2019
Contents
1.1 Introduction to Virus. 1
1.2 Types of Viruses 2
1.3 Virus Detection Methods 4
1.4 Virus and Worm Countermeasures 4
1.5 Penetration Testing for Virus 5
1.6 What has happened in real life? 5
Conclusions 5
1.1 Introduction to Virus.
Stands for VIRUS is (Vital Information Resource Under Siege). A virus is a self-replicating program that produces its
own copy by attaching itself to another program, computer boot sector or document. Viruses are generally transmitted
through file downloads, infected disk/flash drives and as Email attachments. Viruses Characteristics are (Infects other
program, alters data, transforms itself, encrypts itself, Corrupts files and Programs and Self-replication).
Stages of Virus Life:
1. Design: Developing virus code using programming languages or construction kits.
2. Replication: it replicates for a period within the target system and then spread itself.
3. Launch: it gets activated with the user performing certain actions such as running an infected program.
4. Elimination: Users install antivirus updates and eliminate the virus threats.
5. Incorporation: Antivirus software developers assimilate defenses against the virus.
6. Detection: A virus is identified as threat infecting target system.
Working of Viruses:
1. Infection Phase: the virus replicates itself and attaches to an .EXE file in the system.
2. Attack Phase: Viruses are programmed with trigger events to activate and corrupt systems. Some viruses
infect each time they are run, and others infect only when a certain predefined condition is met such as a
user’s specific task, a day, time, or a particular event.
Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity
Topic: Project _Virus_ Security Date: November 25, 2019
Why Do People Create Computer Viruses?
• Inflict damage to competitors
• Vandalism
• Play prank
• Research projects
• Financial benefits
• Cyber terrorism
• Distribute political messages
Indications of Virus Attack:
❖ Abnormal Activities: if the system acts in an unprecedented manner, you can suspect a virus attack.
❖ False Positives: However, not all glitches can be attributed to virus attacks.
How does a Computer Get Infected by Viruses?
When a user accepts files and downloads without checking property for the source. Opening infected Email
attachments. Installing pirated software. Not updating and not installing new version of plug-ins. Not running the
latest Antivirus application.
1.2Types of Viruses
Virus has many types, but we can classify into two parts like (How do they infect? What do they infect?)
1) What do they infect?
❖ System or Boot Sector Viruses:
Boot sector virus moves MBR to another location on the hard disk and copies itself to the original location of MBR.
When system boots, virus code is executed first, and the control is passed to original MBR.
Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity
Topic: Project _Virus_ Security Date: November 25, 2019
❖ File and Multipartite Viruses:
▪ File Viruses: infect files which are executed or interpreted in the system such as (COM, EXE, SYS, OVL, OBJ, PRG,
MNU and BAT) files. It can be either direct action or memory resident.
▪ Multipartite Virus: infect the system boot sector and the executable files at the same time
❖ Macro Viruses: infected files created by Microsoft Word or Excel. Most macro viruses are written using macro
language Visual Basic for Applications (VBA). Also, it infects templates or convert infected documents into
template files, while maintaining their appearance of ordinary document files.
❖ Cluster Viruses: modify directory table entries so that it points users or system processes to the virus code
instead of the actual program. There is only one copy of the virus on the disk infection all the programs in the
computer system. It will launch itself first when any program on the computer system is started and then the
control is passed to actual program.
2) How do they infect?
❖ Encryption Viruses: uses simple encryption to encipher the
code. The virus is encrypted with a different for each
infected file. AV scanner can’t directly detect these types of
viruses using signature detection methods.
❖ Polymorphic code: is a code that mutates while keeping the original algorithm intact. To enable polymorphic
code, the virus has to have a polymorphic engine. A well-written polymorphic virus therefore has no parts that
stay the same on each infection.
❖ File Overwriting or Cavity Viruses: Cavity virus overwrites a part of the host file that is a constant “Usually
NULL” without increasing the length of the file and preserving its functionality.
Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity
Topic: Project _Virus_ Security Date: November 25, 2019
❖ Companion/Camouflage Viruses: creates a companion file for each executable file the virus infects. Therefore,
a companion virus may save itself as notepad.com and every time a user executes notepad.exe. then the
computer will load notepad.com virus and infect the system.
❖ Shell Viruses: Virus code forms a shell around the target host program’s code, making itself the original
program and host code as its sub-routine. Almost all boot program viruses are shell viruses.
❖ File Extension Viruses: change the extensions of the files. “.TXT” is safe as
it indicates a pure text file. With extensions turned off, if someone sends
you a file named “BAD.TXT.VBS”, you will only see BAD.TXT. if you have
forgotten that extensions are turned off, you may think this is a text file
and open it. This is an executable visual basic script virus file and could do
serious damage. Countermeasure is to turn off “Hide file extensions” in
Windows.
1.3Virus Detection Methods
Virus Detection Methods
Scanning Once a virus has been detected, it is possible to write scanning programs that look for
signature string characteristics of the virus.
Integrity
Checking
Integrity checking products work by reading the entire disk and recording integrity data that
acts as a signature for the files and systems sectors.
Interception The interceptor monitors the OS requests that are written to the disk.
Code
Emulation
The AV executes the malicious code inside a virtual machine to simulate CPU and memory
activities. This technique is considered very effective polymorphic viruses if the virtual
machine mimics the real machine.
Heuristic
Analysis
It can be static or dynamic. In static the AV analyses the file format and code structure to
determine if the code is viral. In dynamic the AV performs a code emulation of the suspicious
code to determine if the code is viral.
1.4 Virus and Worm Countermeasures
1. Install AV software that detects and remove infections as they appear.
2. Generate an AV policy for safe computing and distribute it to the stuff.
3. Pay attention to the instructions while Downloading files or any program from the internet.
4. Update the AV regularly.
5. Avoid opening the attachments received from an unknown sender as viruses spread via Email attachments.
6. Possibility of virus infection may corrupt data, thus regularly maintain data backup.
7. Schedule regular scans for all drives after the installation of AV.
8. Don’t accept disks or programs without checking them first using a current version of an AV program.
Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity
Topic: Project _Virus_ Security Date: November 25, 2019
Anti-Virus Tools
AVG Antivirus F-Secure Antivirus Bitdefender
Kaspersky Antivirus ESET Smart Security 7 Avast Pro Antivirus 2014
Norton Antivirus McAfee Antivirus Plus 2014 Total Defense Internet Security Suite
1.5Penetration Testing for Virus
1. Test for suspicious system behavior: first, install AV program, then update the Av software, next enable real
time scanning and finally, scan the system for viruses, which helps to repair damage or delete files infected
with viruses.
1.6What has happened in real life?
Prezi Presentation link: https://prezi.com/view/0o0fN6jS4JJhx4ZReIHF/
Conclusions
In conclusion, during in this report I explained some important about general Viruses in any system because we have
another type of viruses in medicine field. First, I introduced what is virus in general system? what are stages of any
virus? and how is it working. Then classified types of system viruses into two main parts which are (How do they
infect? What do they infect?) and explained some type of viruses in each part. Next discussed methods how virus will
be detected and Virus countermeasures and some AV tools. After that I talked about penetration testing for viruses.
Finally, what happened in the real life and I mentioned the virus with name “I LOVE YOU” in 2000.

More Related Content

What's hot

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
Satyam Sangal
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
Jay Shah
 
Anti virus
Anti virusAnti virus
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
reasonsecurity
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Chapter 8
Chapter 8Chapter 8
Chapter 8
gofortution
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
Shabnam Bashir
 
Computer virus
Computer virusComputer virus
Computer virus
Flora Runyenje
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
khalid umer
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
rishi ram khanal
 
Virus part2
Virus part2Virus part2
Virus part2
Ajay Banyal
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
Jayesh Naik
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Ch19
Ch19Ch19
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Virus
VirusVirus
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
pratikpandya18
 
Viruses ppt
Viruses pptViruses ppt
Malicious
MaliciousMalicious
Malicious
ashraf karaimeh
 

What's hot (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Virus part2
Virus part2Virus part2
Virus part2
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Ch19
Ch19Ch19
Ch19
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Virus
VirusVirus
Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Malicious
MaliciousMalicious
Malicious
 

Similar to Dilsher idrees mustafa_6_a_vulnerabilities_study

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
prawinrajanIT
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Computer virus (sarthak)
Computer virus (sarthak)Computer virus (sarthak)
Computer virus (sarthak)
manveer gujar
 
Computer viruses
Computer virusesComputer viruses
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer virus
Computer virusComputer virus
Computer virus
nutantripathi
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
Anubhav125
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 

Similar to Dilsher idrees mustafa_6_a_vulnerabilities_study (20)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus (sarthak)
Computer virus (sarthak)Computer virus (sarthak)
Computer virus (sarthak)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 

Recently uploaded

Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 

Recently uploaded (20)

Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 

Dilsher idrees mustafa_6_a_vulnerabilities_study

  • 1. Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity Topic: Project _Virus_ Security Date: November 25, 2019 Contents 1.1 Introduction to Virus. 1 1.2 Types of Viruses 2 1.3 Virus Detection Methods 4 1.4 Virus and Worm Countermeasures 4 1.5 Penetration Testing for Virus 5 1.6 What has happened in real life? 5 Conclusions 5 1.1 Introduction to Virus. Stands for VIRUS is (Vital Information Resource Under Siege). A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector or document. Viruses are generally transmitted through file downloads, infected disk/flash drives and as Email attachments. Viruses Characteristics are (Infects other program, alters data, transforms itself, encrypts itself, Corrupts files and Programs and Self-replication). Stages of Virus Life: 1. Design: Developing virus code using programming languages or construction kits. 2. Replication: it replicates for a period within the target system and then spread itself. 3. Launch: it gets activated with the user performing certain actions such as running an infected program. 4. Elimination: Users install antivirus updates and eliminate the virus threats. 5. Incorporation: Antivirus software developers assimilate defenses against the virus. 6. Detection: A virus is identified as threat infecting target system. Working of Viruses: 1. Infection Phase: the virus replicates itself and attaches to an .EXE file in the system. 2. Attack Phase: Viruses are programmed with trigger events to activate and corrupt systems. Some viruses infect each time they are run, and others infect only when a certain predefined condition is met such as a user’s specific task, a day, time, or a particular event.
  • 2. Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity Topic: Project _Virus_ Security Date: November 25, 2019 Why Do People Create Computer Viruses? • Inflict damage to competitors • Vandalism • Play prank • Research projects • Financial benefits • Cyber terrorism • Distribute political messages Indications of Virus Attack: ❖ Abnormal Activities: if the system acts in an unprecedented manner, you can suspect a virus attack. ❖ False Positives: However, not all glitches can be attributed to virus attacks. How does a Computer Get Infected by Viruses? When a user accepts files and downloads without checking property for the source. Opening infected Email attachments. Installing pirated software. Not updating and not installing new version of plug-ins. Not running the latest Antivirus application. 1.2Types of Viruses Virus has many types, but we can classify into two parts like (How do they infect? What do they infect?) 1) What do they infect? ❖ System or Boot Sector Viruses: Boot sector virus moves MBR to another location on the hard disk and copies itself to the original location of MBR. When system boots, virus code is executed first, and the control is passed to original MBR.
  • 3. Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity Topic: Project _Virus_ Security Date: November 25, 2019 ❖ File and Multipartite Viruses: ▪ File Viruses: infect files which are executed or interpreted in the system such as (COM, EXE, SYS, OVL, OBJ, PRG, MNU and BAT) files. It can be either direct action or memory resident. ▪ Multipartite Virus: infect the system boot sector and the executable files at the same time ❖ Macro Viruses: infected files created by Microsoft Word or Excel. Most macro viruses are written using macro language Visual Basic for Applications (VBA). Also, it infects templates or convert infected documents into template files, while maintaining their appearance of ordinary document files. ❖ Cluster Viruses: modify directory table entries so that it points users or system processes to the virus code instead of the actual program. There is only one copy of the virus on the disk infection all the programs in the computer system. It will launch itself first when any program on the computer system is started and then the control is passed to actual program. 2) How do they infect? ❖ Encryption Viruses: uses simple encryption to encipher the code. The virus is encrypted with a different for each infected file. AV scanner can’t directly detect these types of viruses using signature detection methods. ❖ Polymorphic code: is a code that mutates while keeping the original algorithm intact. To enable polymorphic code, the virus has to have a polymorphic engine. A well-written polymorphic virus therefore has no parts that stay the same on each infection. ❖ File Overwriting or Cavity Viruses: Cavity virus overwrites a part of the host file that is a constant “Usually NULL” without increasing the length of the file and preserving its functionality.
  • 4. Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity Topic: Project _Virus_ Security Date: November 25, 2019 ❖ Companion/Camouflage Viruses: creates a companion file for each executable file the virus infects. Therefore, a companion virus may save itself as notepad.com and every time a user executes notepad.exe. then the computer will load notepad.com virus and infect the system. ❖ Shell Viruses: Virus code forms a shell around the target host program’s code, making itself the original program and host code as its sub-routine. Almost all boot program viruses are shell viruses. ❖ File Extension Viruses: change the extensions of the files. “.TXT” is safe as it indicates a pure text file. With extensions turned off, if someone sends you a file named “BAD.TXT.VBS”, you will only see BAD.TXT. if you have forgotten that extensions are turned off, you may think this is a text file and open it. This is an executable visual basic script virus file and could do serious damage. Countermeasure is to turn off “Hide file extensions” in Windows. 1.3Virus Detection Methods Virus Detection Methods Scanning Once a virus has been detected, it is possible to write scanning programs that look for signature string characteristics of the virus. Integrity Checking Integrity checking products work by reading the entire disk and recording integrity data that acts as a signature for the files and systems sectors. Interception The interceptor monitors the OS requests that are written to the disk. Code Emulation The AV executes the malicious code inside a virtual machine to simulate CPU and memory activities. This technique is considered very effective polymorphic viruses if the virtual machine mimics the real machine. Heuristic Analysis It can be static or dynamic. In static the AV analyses the file format and code structure to determine if the code is viral. In dynamic the AV performs a code emulation of the suspicious code to determine if the code is viral. 1.4 Virus and Worm Countermeasures 1. Install AV software that detects and remove infections as they appear. 2. Generate an AV policy for safe computing and distribute it to the stuff. 3. Pay attention to the instructions while Downloading files or any program from the internet. 4. Update the AV regularly. 5. Avoid opening the attachments received from an unknown sender as viruses spread via Email attachments. 6. Possibility of virus infection may corrupt data, thus regularly maintain data backup. 7. Schedule regular scans for all drives after the installation of AV. 8. Don’t accept disks or programs without checking them first using a current version of an AV program.
  • 5. Student: Dilsher Idrees Mustafa Course: Introduction to Cybersecurity Topic: Project _Virus_ Security Date: November 25, 2019 Anti-Virus Tools AVG Antivirus F-Secure Antivirus Bitdefender Kaspersky Antivirus ESET Smart Security 7 Avast Pro Antivirus 2014 Norton Antivirus McAfee Antivirus Plus 2014 Total Defense Internet Security Suite 1.5Penetration Testing for Virus 1. Test for suspicious system behavior: first, install AV program, then update the Av software, next enable real time scanning and finally, scan the system for viruses, which helps to repair damage or delete files infected with viruses. 1.6What has happened in real life? Prezi Presentation link: https://prezi.com/view/0o0fN6jS4JJhx4ZReIHF/ Conclusions In conclusion, during in this report I explained some important about general Viruses in any system because we have another type of viruses in medicine field. First, I introduced what is virus in general system? what are stages of any virus? and how is it working. Then classified types of system viruses into two main parts which are (How do they infect? What do they infect?) and explained some type of viruses in each part. Next discussed methods how virus will be detected and Virus countermeasures and some AV tools. After that I talked about penetration testing for viruses. Finally, what happened in the real life and I mentioned the virus with name “I LOVE YOU” in 2000.