computer viruses

26

Upload: anand-dabasara

Post on 09-Nov-2015

28 views

Category:

Documents


2 download

DESCRIPTION

CV

TRANSCRIPT

  • Virus- A small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must execute and replicate itself. (symantec.com)

  • * Computer Viruses came on the seen in the late 1980s with the phone modem.* Bulletin Boards were the target, these were simple games and spreadsheets used by phone.* The Trojan Horse was the second point of attack, these were documents that sounded cool so you downloaded them, through the Internet.* The Floppy Disk was the last to be picked on, these viruses infiltrated your computer through your Operating System.

  • * The Computer Viruses wouldnt be so despised if all they did was replicate, but they also attack and do damage to your computer.* So to prevent these damages you could run a secure operating system like UNIX (costly).* Buying virus protecting software is the most common way to defend yourself, i.e.. McAfee.* Overall, just avoid programs from unknown sources and never open E-mail attachments from people you do not know.

  • Software (floppy disks and CDs)E-mail

  • File infector virusesBoot sector virusesMaster boot record virusesMulti-partite virusesMacro virusesScript virusesCompanion viruses

  • Infect program files.Can infect other files when infected program is run from floppy, hard drive, or network.Many are memory resident.After memory is infected, any non-infected executable that runs becomes infected.Examples: Jerusalem and cascade (Symantec.Com)

  • Infect the system area of a disk. (boot record on floppy/hard disks)Activate when user starts up from infected disk.Always memory resident in nature.Once in memory, all non-write protected floppy disks will become infected when accessed.Examples: Form, Disk Killer, Michelangelo, and Stoned(Symantec.com)

  • Similar to boot sector virus except viral code is located in different area.Prevents computer from booting.Examples: NYB, AntiExe, and unashamed (Symantec.com)

  • Infect boot records and program files.Difficult to repair.Boot area and files must both be cleaned of virus or re-infection will occur.Examples: One_Half, Emperor, Anthrax, and Tequila (symantec.com)

  • Most common type of virus. Infect data files word, excel, power point and access files.Use another programs internal programming language which was created to allow users to automate certain tasks within that program.Examples:w97m.Melissa, WM.NiceDay, and W97M.Groov(Symantec.Com)

  • Infect various script languages such as DOS, Java Script, and Visual Basic Script.(www3.ca.com)

  • Execute through operating system rather than directly infecting programs or boot sectors. When you execute the command ABC, ABC.COM executes before ABC.EXE Thus, a companion virus could place its code in a COM file with its first name matching that of an existing EXE file. When the user next executed the ABC command, the virus ABC.COM program would be run. (www3.ca.com)

  • Worms spreads by creating duplicates of itself on other drives, systems, or networks.Trojan horses- programs that pretend to have a set of useful or desirable features, but actually contains a damaging payload. Not technically viruses, since they do not replicate. Virus hoaxes - email message that warns of a non-existent virus. This can do harm by spreading fear.

  • Install an anti-virus program.Remove disks from disk drive before shutting down/restarting computer.Be cautious of email attachments from unknown sources.1Do not set your email program to auto-run attachments.Write protect floppy disks when finished.

  • Why is a Firewall Necessary?While the only way to fully protect your computer is to turn it off, a firewall can at least provide sufficient security when one's computer is connected to the Internet.Installing a security system makes it more difficult for individuals to gain unlawful access to one's computer.* It allows the user to block programs from accessing his/her computer. In essence, it is similar to the homeowner preventing whom cannot enter his/her home.

  • Norton AntivirusMcAfee virus scan

  • *Basically a firewall serves as a protective barrier to keep destructiveforces from your property.* It is comparative to a physical firewall that keeps fire from spreading from one area to the next.* A firewall can stop hackers, but only if the user tells the firewall to block this traffic.

  • * There are many ways in which individuals can access or abuse unprotected computers.Some of these ways include:Remote login-when an individual is able to connect to someone else's computer and control it. Operating System Bugs- some operating system (ex. Windows XP) have backdoors. Some have insufficient security, along with bugs which an experienced hacker can take advantage of.

  • Denial of Service- the hacker can cause a site to slow or even crash.Emails Bombs- someone sends the same email hundreds of times causing your email system to no longer accept messages.Spam- can contain links, which if accidentally clicked could allow a cookie to the backdoor of your computer.Continuedhttp://computer.howstuffworks.com/firewall.htm

  • Hoax Categories: Malicious Code (Virus and Trojan) Warning Urban Myths Give Aways Inconsequential Warnings Sympathy Letters and Requests to Help Someone Traditional Chain Letters Threat Letters Scam Chains Scare Chains Jokes True Legends Hacked History Unknown Origins

  • There are two factors that make a Hoax successful:Technical sounding language.

    Credibility by association.An example of a Known Hoax is:

  • A hookA threatA requestRecognizing a Hoax:Virus Hoaxes are false reports about non-existent viruses, often claiming to do impossible things.

  • Why people Send Hoax MessagesTo see how far a letter will go.

    To harass another person.

    To bilk money out of people using a pyramid scheme.

    To kill some other chain letter.

    To damage a persons or organizations reputation.

  • Hoaxbustershttp://hoaxbusters.ciac.org/HBHoaxCategories.htmlMcAfee Securityhttp://vil.mcafee.com/hoax.aspSnopeshttp://www.snopes.com/computer/virus/virus.htmVirus Hoax Bustershttp://www.stockhelp.net/virus.html

    **************************