computer viruses - a daily harm

22
Computer Viru ses By- Anubhav Sinha IX A

Upload: anubhav125

Post on 15-Aug-2015

21 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Computer viruses - A daily harm

Computer Viruses

By-Anubhav Sinha

IX A

Page 2: Computer viruses - A daily harm

What’s Inside?

• What is a virus?• More about virus • Who wrote it and why?• How do they spread?• Kinds of virus……………….

• What is a worm?• Difference between virus and

worms• 2014

Page 3: Computer viruses - A daily harm

What is a virus?

– An executable code

– That could make copies of itself or attach itself to other executable codes

– Most of computer viruses have their latency period.

– Attack programs or data on your hard drive on a specific day when conditions has been fulfilled.

Page 4: Computer viruses - A daily harm

More about Virus…..

• A virus is a small piece of software that piggybacks on real programs.

• Computer viruses are called viruses because they share some of the same traits of biological viruses.

Page 5: Computer viruses - A daily harm

Who write virus and why?

To prove their own theories.– To see if they can do it.– People who are political, religionary

ardor.– People usually publish their virus

source codes in BBSes or the Internet for users who are interested in computer virus programming.

–Most of them belong to specific organizations

Page 6: Computer viruses - A daily harm

Difference between a worm and a virus

• Virus– Usually small size programs ( 3-30k )– Designed to evade detection

•Worm– Sends itself to other systems– Bigger in size than virus– Not easy to write

Page 7: Computer viruses - A daily harm

From where does these virus spread?

•Medium– Hard disk , Floppy disks , Tape– Optical media– Memory

• Internet– E-mail attachments– .exe .bat .vbs

• Research : One in every five hundred e-mail messages contain a virus.

Page 8: Computer viruses - A daily harm

Kinds of virus

Page 9: Computer viruses - A daily harm
Page 10: Computer viruses - A daily harm

Memory Resident Virus

Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed

• Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc.

• Examples: Randex, CMJ, Meve, and MrKlunky

• Protection: Install an antivirus program.

Page 11: Computer viruses - A daily harm

Direct Action Viruses

Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory.

• Target: It can corrupt files.• Examples: Vienna virus• Protection: Install an antivirus scanner.

Page 12: Computer viruses - A daily harm

Overwrite Viruses

Hideout: The virus replaces the file content. However, it does not change the file size.

• Examples: Way, Trj.Reboot, Trivial.88.D

• Protection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Page 13: Computer viruses - A daily harm

Boot Sector Virus

• HIdeout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it.

• Examples: Polyboot.B, AntiEXE• Protection: Ensure that floppy disks

are write-protected

Page 14: Computer viruses - A daily harm

Macro Virus

Hideout: These hide in documents that are shared via e-mail or networks.Examples: Relax, Melissa. A, Bablas, O97M/Y2Protection: Avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.

Page 15: Computer viruses - A daily harm

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.Examples: Elkern, Marburg, Satan Bug and Tureen.Protection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.

Page 16: Computer viruses - A daily harm

FAT Virus

Hideout FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Examples: Link VirusProtection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed.

Page 17: Computer viruses - A daily harm

Multipartite Virus

Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk.Examples: Invader, Flip and TequilaProtection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it.

Page 18: Computer viruses - A daily harm

Trojans

• Trojans In fact, it is a program which disguises itself as a useful program or application.

▶ Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it.

Page 19: Computer viruses - A daily harm

2014's Worst Viruses

! Flame: It is said to be the first of its kind that uses Bluetooth as the spread medium. It was first detected in a Russian lab.

! Belgian Computer Crime Virus: This virus spread globally and asked the users for some vital information and a processing fee, claiming that it was for police records.

! Shamoon: This virus is dangerous as it creates files of the data on your hard disk, and then this compiled data is sent to the attacker.

Page 20: Computer viruses - A daily harm
Page 21: Computer viruses - A daily harm
Page 22: Computer viruses - A daily harm