computer viruses

14
Computer Viruses Computer Viruses By Aidan Leitch and Eli Miloff By Aidan Leitch and Eli Miloff

Upload: cutter

Post on 20-Jan-2016

35 views

Category:

Documents


0 download

DESCRIPTION

Computer Viruses. By Aidan Leitch and Eli Miloff. Background Info. The first virus on the PC was created in Pakistan in 1986 by the Farooq Alvi brothers. It was spread on a floppy disk entitled Brain which was named after their company. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Computer Viruses

Computer VirusesComputer VirusesBy Aidan Leitch and Eli MiloffBy Aidan Leitch and Eli Miloff

Page 2: Computer Viruses

Background InfoBackground Info

The first virus on the PC was created in The first virus on the PC was created in Pakistan in 1986 by the Farooq Alvi brothers.Pakistan in 1986 by the Farooq Alvi brothers.

It was spread on a floppy disk entitled Brain It was spread on a floppy disk entitled Brain which was named after their company.which was named after their company.

It was meant to only explore the security loop It was meant to only explore the security loop holes in software.holes in software.

They left their names on the disk, because it They left their names on the disk, because it had nothing harmful on it.had nothing harmful on it.

Page 3: Computer Viruses

What Are viruses?What Are viruses?

Viruses are computer programs that can Viruses are computer programs that can replicate them selfs, much like the human replicate them selfs, much like the human virus.virus.

The term “virus is commonly used to describe The term “virus is commonly used to describe the word “Malware”the word “Malware”

Malware includes, computer viruses, computer Malware includes, computer viruses, computer worms, trojan horses, most root-kits, spyware, worms, trojan horses, most root-kits, spyware, dishonest adware and other malicious dishonest adware and other malicious unwanted programs.unwanted programs.

Page 4: Computer Viruses

How do Virus’s How do Virus’s Spread?Spread?Virus’s usually get spread by either emails or Virus’s usually get spread by either emails or files downloaded off of a website.files downloaded off of a website.

Virus’s are usually “installed when the user Virus’s are usually “installed when the user opens or downloads a file.opens or downloads a file.

Now a days virus’s can copy them selfs and Now a days virus’s can copy them selfs and email them to other computers and continue email them to other computers and continue the spread.the spread.

Page 5: Computer Viruses
Page 6: Computer Viruses

Catching A VirusCatching A Virus

Although Macintosh and Unix and Linux can Although Macintosh and Unix and Linux can catch virus’s hackers are always trying to find catch virus’s hackers are always trying to find weaknesses and loopholes in the security weaknesses and loopholes in the security software in anything Microsoft. software in anything Microsoft.

Hackers choose to distribute their virus’s on Hackers choose to distribute their virus’s on Microsoft because there are more users on Microsoft because there are more users on Microsoft so they get more bang for their buck.Microsoft so they get more bang for their buck.

Page 7: Computer Viruses

Modern Usage of Virus’sModern Usage of Virus’s

Hackers mostly use viruses these days for Hackers mostly use viruses these days for gathering information in companies, or gathering information in companies, or consumers databases.consumers databases.

This information could be credit card This information could be credit card information and emails accounts.information and emails accounts.

Page 8: Computer Viruses

MyDoom VirusMyDoom Virus

MyDoom was a virus that made its first appearance in 2004 and was intended to affect Microsoft Windows.

When this virus was discovered it had no name. The discoverer of this virus (Craig Schmugar) named it MyDoom because it had the text “mydom” within it.

After examination, it was found to be a variant of the Mimail worm (spread via email).

Page 9: Computer Viruses

The “Hoax” VirusThe “Hoax” VirusOlympic torch is computer virus hoax sent out by email.Olympic torch is computer virus hoax sent out by email.

The virus referred to as email did not actually exist.The virus referred to as email did not actually exist.

These emails were sent to peoples addresses titled These emails were sent to peoples addresses titled “invitation”. “invitation”.

It would erase the computers hard disc when opened.It would erase the computers hard disc when opened.

This virus has been reported by Microsoft as one of the This virus has been reported by Microsoft as one of the most destructive viruses ever.most destructive viruses ever.

The virus was also sent on facebook through the message The virus was also sent on facebook through the message “Facebook invitation”“Facebook invitation”

Don’t open it if you see it. Just delete it.Don’t open it if you see it. Just delete it.

Page 10: Computer Viruses

FlameFlame

Flame or otherwise know as Flamer or sKyWIper Flame or otherwise know as Flamer or sKyWIper is a computer Virus discovered in 2012.is a computer Virus discovered in 2012.

It attacks Windows ComputersIt attacks Windows Computers

The program is being used for targeted cyber The program is being used for targeted cyber espionage in Middle Eastern Countries.espionage in Middle Eastern Countries.

It was found out by the Centre of Iranian Nation It was found out by the Centre of Iranian Nation Computer Emergency Response Team (CERT).Computer Emergency Response Team (CERT).

Flame is one of the most sophisticated computer Flame is one of the most sophisticated computer virus ever found, because of its complexity.virus ever found, because of its complexity.

Page 11: Computer Viruses

Flame Flame

Page 12: Computer Viruses

Flame Cont.Flame Cont.

The United States and Israel jointly developed The United States and Israel jointly developed the computer malware to collect intel to the computer malware to collect intel to prepare for a cyber-sabotage aimed at Iran’s prepare for a cyber-sabotage aimed at Iran’s ability to develop nuclear weapons.ability to develop nuclear weapons.

The Program uses everything from bluetooth to The Program uses everything from bluetooth to screenshots to vacuum data in the Mid East screenshots to vacuum data in the Mid East without leaving a trace. without leaving a trace.

Page 13: Computer Viruses

BibliographyBibliographyWikipediaWikipedia http://en.wikipedia.org/wiki/Olympic_Torch_(hoaxhttp://en.wikipedia.org/wiki/Olympic_Torch_(hoax))

WikipediaWikipedia http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_virus

The Electric Web Matrix The Electric Web Matrix http://www.co-bw.com/DMS_computer_viruses.hthttp://www.co-bw.com/DMS_computer_viruses.htmm

http://www.youtube.com/watch?v=lnedOWfPKT0http://www.youtube.com/watch?v=lnedOWfPKT0

Photo Sean McDonald Photo Sean McDonald http://www.co-bw.com/DMS_computer_viruses.hthttp://www.co-bw.com/DMS_computer_viruses.htmm

WikipediaWikipedia http://en.wikipedia.org/wiki/Mydoomhttp://en.wikipedia.org/wiki/Mydoom

Greg Miller, G. (2012, June 19). U.s., israel developed flame computer virus to slow iranian nuclear efforts, officials say. The Washington Post. Retrieved from http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html

Page 14: Computer Viruses

The endThe end