Computer Viruses

35
Computer Virus and Antivirus

description

Submitted by Act Academy

Transcript of Computer Viruses

Page 1: Computer Viruses

Computer Virus and

Antivirus

Page 2: Computer Viruses

A computer virus is a computer program that can reproduce itself and spread from one computer to another. and leaving infections as it travels, Like a human virus.

Some virus may cause only testing effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file.

It is important to note that a virus cannot be spread without a human action.

Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.

COMPUTER VIRUS

Page 3: Computer Viruses

It can slow down your computer. It might corrupt your system files. It might make some programs faulty or

corrupt. It might damage your boot sector creating

problems when you boot into the windows. it might steal important information from

your computer and send to some other person.

It might change the power ratings of your computer and could blast the system.

EFFECT OF COMPUTER VIRUS

Page 4: Computer Viruses

Programs. Some viruses may impair your certain computer programs and applications. As a result, you may not be able to access the software or operate it smoothly.

Files. There are viruses that may modify, corrupt or delete files in your machine owing to which you may not be able to access them.

Hard disk. Some viruses may attack the data present on your computer’s hard disk, resulting in its crash. You may need to reformat the disk in such cases.

Operational impact. Some viruses may not apparently harm your system’s integrity and may limit themselves to displaying text messages, images, audio and Video.

VIRUS IMPACT ON SYSTEM ACCESSORIES

Page 5: Computer Viruses

To take control of a computer and use it for specific tasks

To generate money

To steal sensitive information (credit card numbers, passwords, personal details, data etc.)

To prove a point, to prove it can be done, to prove ones skill or for revenge purposes

WHY DO PEOPLE CREATE COMPUTER VIRUS

Page 6: Computer Viruses

Hardware. No computer viruses are capable of damaging your hardware yet. They just work on all the files and data of your system, make them useless and disable them.

 Speed. Your system may slow down under the influence of viruses as they consume your system’s memory for their execution.

Booting. Your system may suddenly restart and at times may not load properly. In few cases, you may not be able to access your disk drives.

 Applications. Viruses may modify, damage or delete your program files and system files because of which applications on your system may not be able to work appropriately.

VIRUS IMPACT ON SYSTEM ACCESSORIES

Page 7: Computer Viruses

Reinstall. Some computer viruses are designed in the gravest way possible. They cannot be uninstalled easily from your system and some reinstall themselves even after they have been removed.

 Peripherals. Some viruses may impact device driver software in your computer resulting in the relevant operational issues. For example, disturbed software setting for printer may impair its function.

VIRUS IMPACT ON SYSTEM ACCESSORIES

Page 8: Computer Viruses

Elk Cloner has the distinction of being the first wild virus for a home computer.

Coded by then-high-school student, Richard Skrenta, around 1982.

who created the search engine blekko. Happy Birthday Joshi',

the virus was first discovered in India in June 1990

The first known virus was created in 1971 by Cambridge and was called the Creeper Virus.

Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971.

COMPUTER VIRUS HISTORY

Page 9: Computer Viruses

This virus was spread using the Advanced Research Projects Agency Network (ARPANET).

It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the Concept of a "computer virus" did not exist in the 1970s

When the computers were infected, the message "I'm the creeper, catch me if you can!"

This year marks the 40th anniversary of Creeper.

COMPUTER VIRUS HISTORY

Page 10: Computer Viruses

World's first computer virus was created to infect IBM PCs by two Pakistani brothers, Amjad and Basit Farooq in 1986.

While they were trying to explore their expertise and potential of MS DOS operating system, Virus travelled beyond their imagination through Asia, Europe and was picked up in USA.

Amjad and Basit Farooq Alvi

FIRST VIRUS FROM PAKISTAN

Page 11: Computer Viruses

The first computer virus named “Brain” was designed by Amjad Farooq Alvi and Basit

Farooq Alvi.

"Beware of this VIRUS...Contact us for vaccination,". This message was put on the screen.

The interesting fact remains that the location of the “Brain Pvt Limited” is exactly the same where the virus was first developed. 

FIRST VIRUS FROM PAKISTAN

Page 12: Computer Viruses

Virus name Spreading DamageDiscovere

d

Backdoor.IRCBot.Dorkbot.A MEDIUM MEDIUM 2011 May 15

Backdoor.Lavandos.A MEDIUM HIGH 2011 Jan 06

Trojan.Android.Geinimi.A VERY LOW HIGH 2011 Jan 03

Java.Trojan.Downloader.OpenConnection.AI

HIGH MEDIUM 2010 Nov 12

Java.Backdoor.ReverseBackdoor.A LOW MEDIUM 2010 Nov 12

Win32.Ramnit.G VERY LOW VERY LOW 2010 Oct 28

Trojan.Spy.Ursnif.F MEDIUM HIGH 2010 Oct 20

Win32.Worm.Stuxnet.A HIGH MEDIUM 2010 Oct 07

Win32.Worm.Prolaco.S MEDIUM MEDIUM 2010 Oct 06

Exploit.CplLnk.Gen MEDIUM LOW 2010 Jul 19

10 LATEST COMPUTER VIRUS

Page 13: Computer Viruses

Surreptitious Sircam Sircam appeared in July 2001 on PCs running Windows 95, 98, and

Me. The worm appeared in e-mail in-boxes with an attachment the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como

estas?”

Raid raider Code Red burned brightly in the summer of 2001, Infecting hundreds of thousands of computers--mainly on corporate networks.

WORLD’S WORST COMPUTER VIRUS

Page 14: Computer Viruses

Maniacal MagistrMagistr is one of the most complex viruses to hit the Internet.

Its victims, users of Outlook Express, were hooked by an infected e-mail attachment.The virus, discovered in mid-March 2001,

Sent garbled messages to everyone in the infected user's e-mail address book

Melissa Melissa propagated via infected Microsoft Word documents and

mailed itself to Outlook contacts of the contaminated user.

WORLD’S WORST COMPUTER VIRUS

Page 15: Computer Viruses

Expletive Deleted) Explorer The Explorer.zip worm appeared in the summer of 1999. The worm deleted Word, Excel, and PowerPoint files and

types of files. Explorer traveled via e-mails that appeared to be from someone

the recipient knew.

Numbing Nimda Nimda (also known as the Concept Virus) appeared in September

2001, Attacking tens of thousands of servers and hundreds of thousands

of PCs. The worm modified Web documents and executable files The worm spread as an embedded attachment in an HTML e-mail

message that would execute as soon as the recipient opened the message

WORLD’S WORST COMPUTER VIRUS

Page 16: Computer Viruses

SOME COMPUTER SECURITY THREATS

Adware is software that displays advertisements on your computer.

A backdoor Trojan allows someone to take control of another user’scomputer via the internet without their permission.

Bluejacking is sending anonymous, unwanted messages to other userswith Bluetooth-enabled mobile phones or laptops.

Bluesnarfing is the theft of data from a Bluetooth phone.Like Bluejacking, Bluesnarfing depends on the ability of Bluetooth-enabled devices todetect and contact others nearby.

ADWARE

BACKDOOR TROJAN

BLUE SNARFING

BLUE JACKING

Page 17: Computer Viruses

Boot sector viruses spread by modifying the program that enables your computer to start up

Browser hijackers change the default home and search pages in yourinternet browser

In electronic chain letter is an email that urges you to forward copiesto other people.

Cookies are files on your computer that enable websites to rememberyour details.

A denial-of-service (DoS) attack prevents users from accessing a computer or website.

SOME COMPUTER SECURITY THREATSBOOT SECTOR VIRUS

BROWSER HIJACKERS

CHAIN LETTER

COOKIES

DENIAL OF SERVICE

Page 18: Computer Viruses

WormsWorms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect.Worms can spread over the Internet by exploiting security flaws in the software of computers that are connected to the Internet. Worms can also spread by copying themselves from disk to disk or by email.

ZombiesA Zombie is a hidden program that lies inactive on a computer. Zombies don’t normally damage the computer on which they reside but can damage other computers.Zombies often arrive as email attachments and when the attachment is opened they install themselves secretly and then wait to be activated.

PhishingA Phishing attack is when you are are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks, Internet service providers, on-line stores and so on, and both the email and the web site it links to appear genuine. When you enter your bank or credit card details they are then used fraudulently.

SOME COMPUTER SECURITY THREATS

Page 19: Computer Viruses

ADWARE

MALWARE

SPYWARE

TYPE OF COMPUTER WORMS

Page 20: Computer Viruses

Adware, or advertising-supported software, is any 

software package which automatically plays, displays, or

downloads advertisements to a computer.

These advertisements can be in the form of a pop-up.

They may also be in the user interface of the software or on a

screen presented to the user during the installation process.

The object of the Adware is to generate revenue for its author

Advertising functions are integrated into or bundled with the

software, which is often designed to note what Internet sites

the user visits 

ADWARE

Page 21: Computer Viruses

Malware, short for malicious software, Malware is a very general word for

software that deliberately harms, restricts, alters, or stops your computer

from working properly where the true purpose of the download or installation

is hidden or difficult to find and not clearly explained to the user .

Malware includes computer viruses, worms, trojan horses, spyware,

dishonest adware, scareware, crimeware, most rootkits, and other malicious

and unwanted software or program.

Malware can arrive through an internet download, as an email link or

attachment

as a file sent between users of instant messaging, social networking

communities, peer-to-peer file sharing programs, online games, online video

games or chatrooms or a link to a malicious webpage.

MALWARE

Page 22: Computer Viruses

The best-known types of malware, viruses and worms, are

known for the manner in which they spread, rather than

any other particular behavior.

The term computer virus is used for a program that has

infected some executable software and, when run, causes

the virus to spread to other executables .

On the other hand, a worm is a program

that actively transmits itself over a network to infect other

computers

MALWARE

Page 23: Computer Viruses

the browser’s home page keeps changing

Pop-up advertisements appear when your browser is closed,.

Strange icons appear on your desktop without your prompting

or knowledge of the program

The computer light is blinking (meaning that your computer is

processing information) at unusual or unexpected times.

Your browser settings keep changing, including the webpage

you designate as your internet start-up page

Files are uploaded or downloaded without your prompting or

permission.

INDICATION OF MALWARE

Page 24: Computer Viruses

Spyware is Internet language for Advertising Supported

software (Adware).

Spyware is tracking software that hides itself (runs in the

background) and gathers information without the computer

owner's or user's knowledge or permission for the benefit of

someone else

The first recorded use of the term spyware occurred on 16 October

1995.

showing them pop-up ads, or altering web-browser behavior for

the financial benefit of the spyware creator.

For instance, some spyware programs redirect search engine

results to paid advertisements.

SPYWARE

Page 25: Computer Viruses

Others, often called "stealware" by the media, overwrite affiliate marketing codes so that revenue is redirected to the spyware creator rather than the intended recipient.

The presence of spyware is typically hidden from the user, and can be difficult to detect

Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited,

As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems.

SPYWARE

Page 26: Computer Viruses

Not opening emails or email attachments from unknown senders

Block or don’t click on suspicious pop-up windows Don’t open files that are more prone to be

associated with malware such as .bat, .pif, .txt .vbs, .htm .exe or .vbs

Don’t download or execute applications from untrusted sources.

Avoid phishing scams. Use updated anti-virus and anti-spyware software

regularly.

GUIDELINE TO AVOID SPYWARE

Page 27: Computer Viruses

A utility that searches a hard disk for viruses and removes any that are

found.

Antivirus software is a computer program you install on your machine that scans

files for malicious (dangerous) programs and either deletes them or "heals" them

therefore eliminating the threat of damage to your computer. 

Most antivirus programs include an auto-update feature that enables the

program to download profiles of new viruses so that it can check for the

new viruses as soon as they are discovered.

Antivirus software is a computer program that detects, prevents, and takes

action to disarm or remove malicious software programs, such as viruses

and worms.

COMPUTER ANTIVIRUS

Page 28: Computer Viruses

The very first anti-virus software wasn't really an anti-virus software.It was a removal tool to remove a Polish virus named MKS vir. That removal tool was released in 1987, and the person who first had the idea of such removal tool

was Bernt Fix.

COMPUTER ANTIVIRUS HISTORY

Page 29: Computer Viruses

BENEFITS FROM ANTIVIRUS

Stop Virus-Related Damage

Maintain the PC's Security

Protect Against Email Threats/Spam

Financial Savings

Protect Data and Files

Page 30: Computer Viruses

Norton Antivirus Kaspersky Antivirus McAfee Antivirus Plus Avira Antivir Premium AVG Antivirus ESET NOD32 Antivirus ZoneAlarm Antvirus Panda Antivirus BitDefender Antivirus F-Secure Antivirus

TOP 10 ANTIVIRUS

Page 31: Computer Viruses

A personal firewall is an application which controls network

traffic to and from a computer, permitting or denying

communications based on a security policy.

A personal firewall will usually protect only the computer on which

it is installed.

Personal firewalls may also provide some level of trouble detection

, allowing the software to terminate or block connectivity.

Allows the user to control which programs can and cannot access

the local network and/or Internet.

Provide information about the destination server with which an

application is attempting to communicate.

FIREWALL

Page 32: Computer Viruses

They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.

Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.

FIREWALL

Page 33: Computer Viruses

FIREWALL PROTECTION CHART

Page 34: Computer Viruses

Ankit Fadia is an independent computer

security consultant

He runs a program on computer security for

corporates in alliance with Reliance Info

He started a website called

"HackingTruths". At 15, his book on 

Ethical Hacking made him the youngest

author to be published by Macmillan India.

Fadia sponsors 

Singapore Management University's "Ankit

Fadia Study Award", which consists of a

$1000 cash prize and Certificate which is

annually awarded to "an outstanding student“

ANKIT FADIA

Page 35: Computer Viruses

According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites“

Person of the Year India 2002’ by Limca Book of Records.

In December 2009 Fadia's business site, hackingmobilephones.com appeared.

Ankit Fadia’s Hacking Books--- The Unofficial Guide to Ethical Hacking  Network Security: A Hacker's Perspective Hacking Mobile Phones Tips and Tricks on Linux  Email Hacking

ANKIT FADIA