understanding viruses
TRANSCRIPT
-
7/28/2019 Understanding Viruses
1/19
Understanding Viruses
-
7/28/2019 Understanding Viruses
2/19
-
7/28/2019 Understanding Viruses
3/19
Computer Viruses
A true virus can only spread from one computer toanother in some form of executable code when its host is
taken to the target computer; for instance because a user
sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, orUSB drive.
-
7/28/2019 Understanding Viruses
4/19
How Computer Viruses Work
i. Infection Phase:
ii. Attack Phase:
-
7/28/2019 Understanding Viruses
5/19
Different Types of Computer Viruses
1) Resident Viruses
2) Direct Action Viruses
3) Overwrite Viruses
4) Boot Virus
5) Macro Virus
6) Directory Virus
7) Polymorphic Virus
8) File Infectors
9) Companion Viruses
10) FAT Virus
-
7/28/2019 Understanding Viruses
6/19
Popular Viruses
1) Anna Kournikova
2) Autorun
3) Michelangelo
-
7/28/2019 Understanding Viruses
7/19
WORMS
In a computer, a worm is a self-replicating virus thatdoes not alter files but resides in active memory and
duplicates itself.
-
7/28/2019 Understanding Viruses
8/19
Types of Worms
a) Email Worms
b) Instant Messaging
Worms
c) Internet Worms
d) IRC Worms
e) File-sharing Networks
Worms
-
7/28/2019 Understanding Viruses
9/19
Some Popular Worms
1) ILOVEYOU
2) Melissa
3) My Doom
4) Conficker
-
7/28/2019 Understanding Viruses
10/19
Trojans
A Trojan infection can allow total remote access to yourcomputer by a third party.
-
7/28/2019 Understanding Viruses
11/19
Objectives of Trojans
Using the Trojaned machine as part of a Botnetto stage another attack like DDOS etc.
Trojans can install Softwares so that they canupload or download files and data directly from
your computer. Trojans can modify or delete your files.
Trojans also supports Keystroke logging andthey can monitor people without theirknowledge.
Wasting computer storage space.
Crashing the computer.
-
7/28/2019 Understanding Viruses
12/19
Types of Trojan
i. Remote Access Trojans
ii. Password Sending Trojans
iii. Key loggers Trojans
iv. Proxy/Wingate Trojans
-
7/28/2019 Understanding Viruses
13/19
Name of The Trojan Software
i. Net Bus
ii. Subseveen
iii. Beast
iv. Prorat
v. Poison Ivy
vi. Turkojan
-
7/28/2019 Understanding Viruses
14/19
Malwares
Malware is a category of malicious code that includesviruses, worms, and Trojan horses. Destructive malware
will utilize popular communication tools to spread,
including worms sent through email and instant
messages, Trojan horses dropped from web sites, andvirus-infected files downloaded from peer-to-peer
connections. Malware will also seek to exploit existing
vulnerabilities on systems making their entry quiet and
easy.
-
7/28/2019 Understanding Viruses
15/19
Some Famous Malware
i. Stuxnet
ii. ZeuS 2.0
-
7/28/2019 Understanding Viruses
16/19
Spyware
Spyware is software that sends your personal informationto a third party without your permission or knowledge.
This can include information about Web sites you visit
or something more sensitive like your user name and
password.
-
7/28/2019 Understanding Viruses
17/19
Name of Spywares
1) CoolWebSearch
2) Internet Optimizer
3) Key Logger
i. Hardware Key-Logger
ii. Software Key-Logger
-
7/28/2019 Understanding Viruses
18/19
Some Famous Software Key-Logger
i. Ardamax Keylogger
ii. Actual Spy Keylogger
iii. Spytector Keylogger
iv. Ultimate Keylogger
-
7/28/2019 Understanding Viruses
19/19
THE END