A computer virus is a malware program that when executed replicates by inserting copies of itself into other computer programs, data files. When this replication succeeds, the affected areas are then said to be infected. Viruses often perform some type of harmful activity on the infected hosts such as accessing private information, corrupting data or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves.
A computer virus is a malware program that when executed replicates by inserting copies of itself into other computer programs, data files. When this replication succeeds, the affected areas are then said to be infected. Viruses often perform some type of harmful activity on the infected hosts such as accessing private information, corrupting data or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves.
antivirus software: consists of history, identification methods, popular anti viruses in the market, pros and issues of it.
Extremely basic ppt- can be used for college presentations & competitions- doesnt have enough info to be the winner, but certainly useful. :)
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
This presentation is about Ransomware. It tells you about how ransomware creates problem and how it can be removed. It also describes different types of Ransomware.
A short presentation on the basics of Malicious Software and Viruses and methods to detect, prevent and remove them and to spread awareness of this growing issue.
Malicious Software,Terminology of malicious programme,Malicious programs,Nature of Viruses,Virus Operation-four phases or life cycle of virus,Virus Structure,Types of Viruses,Anti-Virus Software
antivirus software: consists of history, identification methods, popular anti viruses in the market, pros and issues of it.
Extremely basic ppt- can be used for college presentations & competitions- doesnt have enough info to be the winner, but certainly useful. :)
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
This presentation is about Ransomware. It tells you about how ransomware creates problem and how it can be removed. It also describes different types of Ransomware.
A short presentation on the basics of Malicious Software and Viruses and methods to detect, prevent and remove them and to spread awareness of this growing issue.
Malicious Software,Terminology of malicious programme,Malicious programs,Nature of Viruses,Virus Operation-four phases or life cycle of virus,Virus Structure,Types of Viruses,Anti-Virus Software
Computer Introduction-Lecture04 for applied scince college students, Seiyun University , yemen 2023-2024 Academic year. لطلاب كلية العلوم التطبيقية بجامعة سيئون
مقدمة في علوم الحاسوب المحاضرة الرابعة
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
OBJECTIVES
Introduction
What Is Virus?
Why Virus Are Called “Virus”?
How Do Virus Spread?
Virus Operation
How Virus work?
Common Virus Entry Points
Symptoms Of Virus Attack
Types of Computer Virus
Techniques used by Viruses
Anti-Virus Software
Methods used by Antivirus Software
Actions to Prevent Virus Infection
Conclusion
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. It is a replicating program.
Can produce a copy of itself by attaching itself to another program
For example Software that piggybacks on real programs. Every
time MS Word runs, virus runs too. Virus reproduces (by
attaching copies of itself to other programs & files)
Typical transmission via:
File Downloads
Infected Disks / USB / Flash drives
Email Attachments
What is a Virus
3. Some Viruses will affect computers as soon as there code is
executed.
Others will remain dormant until pre-determined logical
circumstances are met.
Types & Growth
4. Design
Virus code developed using a program language or a virus construction kit.
Replication
The virus replicated itself within the target system over a period of time.
Launch
Virus is activated when the user performs a certain action such as running a
program.
Detection
A new virus has been identified typically after data corruption, system
malfunctioning and damage has taken place.
Incorporation.
Antivirus software developers assemble defence against the virus
Elimination
Antivirus defence is deployed as an update
Virus Life Stages
5. • Inflict damage to competitors
• Research projects
• Prank / Vandalism
• Targeted attack of specific company (Stuxnet)
• Distribute a political message (Injustice)
• Identity theft, Spyware (CoolWebSearch)
• Financial Gain
• Cryptoviral extortion (Gpcode)
– This is a Trojan that encrypts files with certain extensions on local and remote
drives and then asks a user to contact its author to buy a decryption solution.
Motivations in Virus Creation
6. • Programs taking longer to load
• Hard Drive available capacity falling without
usage
• Drive usage even when unused
• Unknown files appearing on your system
• Unexpected graphic displays
• File name changes
• Program size keeps changing
• High Memory usage & system slows down
Indications of Virus infection
7. • File downloads without verifying the source
• Virus infected files sent via mail with the aim of getting
the recipient to open the mail and / or execute the virus.
• Virus is incorporated onto popular software programs and
the infected software is uploaded onto websites intended
for software downloads.
• Failing to install / update security patches
• Failing to use latest versions of antivirus signature files.
• Social engineering, where the attacker tricks the end-user
to go to an innocent looking webpage containing malware.
(Discuss Spear-phishing also)
• Compromised legitimate websites
• Fake antivirus software
Infection methods
8. Types of Virus
Email virus:
Moves around in email messages. Replicates by auto mailing itself
to people on victim’s email address book
Worm:
Software that uses computer networks & security holes to replicate
itself. Copy of worm scans network for other computer with a
specific security hole & replicates there as well…
Trojan horse:
Program that claims to do one thing (e.g. game) `but instead does
damage when you run it (e.g. erase hard disk). Do not auto replicate
How they spread
9. Some More Types
• Encryption Virus
• Polymorphic Virus
• Metamorphic Virus
• File extension Virus
• Macro Virus
10. Encryption Virus
• Consists of a encrypted copy of the virus
• Also contains a decryption module remains
consistent
• Different Keys used for encryption
• Attached decryption module contains the Key to
decrypt the virus.
• Virus signature keeps changing
• Virus scanners must determine the Signature of
the decrypting module instead
11. Polymorphic Virus
• Modify their code each time they replicate
• They change their encryption module on
replication.
• Virus signature keeps changing
• Mutation Engine used by the Virus to
change is also used by the antivirus
software for detection.
• Can be difficult to detect
12. Metamorphic Virus
• Virus that rewrite itself
• Original algorithm remains intact but the
code changes to avoid detection.
• Complex to code
• Better than Polymorphic at avoiding
detection.
13. File extension Virus
• Used to trick the end-user into opening what
looks to be a valid file
• If the end-user file extension view is turned
off a file such as BAD.TXT.VBS will be
visible as BAD.TXT
14. Macro Virus
• Word or similar applications infected with this type of
virus.
• Typically written in a macro language such as VBA Visual
Basic for Applications.
• Typically spread via Email
• The line between data files and applications becoming
blurred.
• Files such as Word, Excel, PowerPoint and windows help,
PDF files can contain exploit macrocode.
15. Mydoom (Norvarg) Worm/Email Virus:
Infected 250,000 computers in single day in 2004. Windows PCs only.
When users click on email attachment, it runs the virus
Used double extension to fool user (name.txt.exe)
Targeted SCO and Microsoft with HTTP requests from infected hosts.
Distributed Denial of Service (DDOS)
Also floods computers with mass emailing
20% to 30% of all Email traffic at its peak
Melissa Macro Virus:
1999. Infects machines with MS Word 97. Propagated by user opening
an infected Word doc. Infects Normal.dot & hence all Word files. Virus
then creates an email message containing an infected Word doc as
attachment. Doc contains references to pornographic web sites.
Virus propagated if macros enabled on the PC
Examples of Famous Viruses
16. ILOVEU virus :
May 2000. Comes in an email with “I LOVE YOU” in
subject line an attachment. When attachment opened,
sends message to everyone in MS Outlook address book.
Also deletes all JPEG, MP3, & certain other files on
your hard disk!
Reached 45 million users in one day.
Some large companies had to shut down email
completely.
VBS
$15 billion to remove the worm
More Famous Viruses
17. Bubble Boy Virus
• Not harmful
• Worm executes as soon as the message is
viewed in the preview pane
• Changes user name and company name to
“BubbleBoy”
• Opens Outlook through ActiveX and mails
itself to everyone in the address book
18. Blaster
• Worm
• August 2003
• Xp & 2000, 2003 server
• Opens a remote command shell that listens on
TCP port 4444
• sleeps for 20-second intervals and awakens to look
for new machines to infect
• Worm starts a TCP SYN Flood attack on
windowsupdate.com
• Mblast.exe
19. THE CONFICKER WORM
• One of the most notorious worms that has been
unleashed on the internet in recent times
• Speculation is that the worm was let loose by one
or more government organizations to test its
power to propagate
• Worm infected a large number of machines
around the world
• Infected only Windows machines
20. THE CONFICKER WORM
• Symptoms
– could also lock out certain user accounts
– disabled the Automatic Updates feature
– impossible for the infected machine to carry out
DNS lookup for the hostnames that correspond
to anti-virus software vendors
– modifications to the Windows registry
21. Infection method
• On the older Windows platforms, a machine would be infected with the worm by any
machine sending it a specially crafted packet disguised as an RPC (Remote Procedure
Call).
• On newer Windows platforms, the infecting packet had to be received from a user who
could be authenticated by the victim machine
• First discovered in October 2008
• The worm infection spread by exploiting a vulnerability in the executable svchost.exe
on a Windows machine
22. svchost.exe
• The job of the always-running process that executes the svchost.exe file is to facilitate
the execution of the dynamically-linkable libraries (DLLs) that the different applications
reside in or use.
• The Svchost process does by replicating itself for each DLL that needs to be executed.
So we could say that any DLL that needs to be executed must “attach” itself to the
svchost process
• The svchost process checks the services part of the registry to construct a list of services
(meaning a list of DLLs) it must load.
23. Infection method
• A machine running a pre-patched version of the Windows Server Service svchost.exe
could be infected because of a vulnerability with regard to how it handled remote code
execution needed by the RPC requests coming in through port 445.
• So if a machine allowed for remote code execution in a network perhaps because it
made some resources available to clients it would be open to infection through this
mechanism.
• Once a machine was infected, the worm could drop a copy of itself in the hard disks on
the other machines mapped in the previously infected machine (Network Shares) If it
needed a password in order to drop a copy of itself at these other locations, the worm
came equipped with a list of 240 commonly used passwords. If it succeeded, the worm
created a new folder at the root of these other disks where it placed a copy of itself.
• The worm could also drop a copy of itself as the autorun.inf file in USB media such as
memory sticks. This allowed the worm copy to execute when the drive was accessed (if
Autorun was enabled).
24. Detection
• The worm prevented an automatic download of the latest virus signatures from the anti-virus
software vendors by altering the DNS software on the infected machine. When a machine could not
be disinfected through automatic methods, you had to resort to a more manual intervention consisting
of downloading the anti-virus tool on a separate clean machine, possibly burning a CD with it, and,
finally, installing and running the tool on the infected machine.
• Since the worm was capable of resetting the system restore points that rendered this approach
impossible for system recovery.
• For the next step, as worm instructs the firewall to open a randomly selected high-numbered port to
the internet. It then uses this port to reach out to the network in order to infect other machines. In
order to succeed with propagation, the worm must become aware of the IP address of the host on
which it currently resides. This it accomplishes by reaching out to a web site like
http://checkip.dyndns.com
25. Problems it caused
• A French Navy computer network, was infected with Conficker on 15 January 2009.
The network was subsequently quarantined, forcing aircraft at several airbases to be
grounded because their flight plans could not be downloaded
• The United Kingdom Ministry of Defence reported that some of its major systems and
desktops were infected. The virus had spread across administrative offices, NavyStar/N*
desktops aboard various Royal Navy warships and Royal Navy submarines, and
hospitals across the city of Sheffield reported infection of over 800 computers.
26. Stuxnet Worm
• Discovered in 2010
• The first publicly known intentional act of
cyberwarfare to be implemented
• Stuxnet reportedly ruined almost one-fifth
of Iran's nuclear centrifuges
• Stuxnet is typically introduced to the target
environment by an infected USB flash drive
27. Spyware:
Collects personal info about users without their
consent.
Record personal info through logging
keystrokes, recording web browser history, or
scanning hard disk docs.
Purposes include criminal intent, advertising, or
just to be annoying
Identity theft, stealing credit card numbers, etc
Other unwanted software
28. What is Anti-Virus Software?
Program that searches hard drive (& other
drives) for any known or potential viruses or
malware.
Works in 2 ways:
1. Scan files for viruses contained in virus
dictionary (DAT file)
2. Identify suspicious behaviour (e.g. data
capture, monitoring)
Anti-Virus Software
29. • Very similar products.
For home & home-office use
Enterprise edition for corporate environments
Integrates anti-virus, firewall, & anti-spyware
Performance hits?
Live updates.
Pricing usually based on subscription (1 year).
Get program updates for free, but pay for virus updates!
McAfee VirusScan & Norton AntiVirus
30. Virus Protection
Install after Service Packs
Anti-virus software runs as a process
Schedule to run at specific times (e.g. every day)
Specify which disks to scan
Run each time computer boots up?
Config for auto updates (DAT files) from web
Anti-Virus Software:
McAfee, Norton
Install/Config Anti-Virus Software