Virus presentation
-
Upload
abhinav-bansal -
Category
Education
-
view
2.387 -
download
1
Transcript of Virus presentation
04/12/23 1
A kind of software programs
produced by unknown people and harmful
to the computers
Some varieties of these software are the
Viruses, Worms and Trojan horses
04/12/23 2
The term “Virus" is often used in
common
to describe all kinds of malware (malicious
software) including adware and
spyware programs that do not have the
reproductive ability.
04/12/23 3
Trojan horse perform a desirable function for the user in addition to the expected function
Leaks information Usually does not reproduce
04/12/23 4
A worm is a self replicating malware computer program, which uses a computer network to send copies of itself to other computers and it may do so without any user intervention. It does not need to attach itself to an existing program.
04/12/23 5
Sometimes display unwanted messages
Some tend to destroy programs or data
Clog computer memory and hence sometimes result
in system crashes
Format hard disks, Damage programs, Delete files
04/12/23 6
Viruses
Simply replicate themselves
Presents text, video, or audio messages
making the user know their presence
Bug-ridden, and these bugs may lead to
system crashes and data loss
04/12/23 7
A viruses can copy itself and infect a
computer
without permission or knowledge of the
user
attaches itself to other software
programs or data files 04/12/23 8
Spreads from computer to computer
when the host is taken to the
uninfected computer
over a network such as over the Internet or
carrying it on a removable medium - a floppy
disk, CD, or USB drive
04/12/23 9
Many viruses are existed in the
Internet today and new ones are
discovered every day.
spread via downloaded software and data
files, and email attachments etc.
04/12/23 10
Some old viruses are installed
themselves into the disk boot sector
runs when the user boot the computer from
the disk
04/12/23 11
Some viruses spread through instant messaging
A virus, in an infected machine, may send a web address link
as a message to other contacting machines
Thinking the link is from a friend (a trusted source), the
recipient may sometimes follow the link to the website.
04/12/23 12
ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts Javascript
04/12/23 13
Unlike biological viruses, computer
viruses do not simply evolve by
themselves
deliberately created by programmers, or by
people who use virus creation software
04/12/23 14
Viruses are written as
research projects, pranks, vandalism,
to attack the products of specific
companies,
to distribute political messages,
and financial gain from identity theft,
spyware, and cryptoviral extortion.
04/12/23 15
Some virus writers
consider their creations to be works of art
See virus writing as a creative hobby
04/12/23 16
Releasing computer viruses is a crime in most
jurisdictions
File infector virusInfect program files
Boot sector virusInfect the system area of a disk
Master boot record virusinfect disks in the same manner as boot sector
viruses. The difference between these two virus types is where the viral code is located.
04/12/23 17
Multi-partite virusInfect both boot records and program files.
Macro virusInfect data files. Example: Microsoft Office Word,
Excel,
PowerPoint and Access files
04/12/23 18
Melissa virus spread in Microsoft Word documents sent via e-mail.
How it works ? Created the virus as word document Uploaded to an internet newsgroup Anyone who download the document and
opened it would trigger the virus. Send friendly email messages to first 50
people in person’s address book
04/12/23 19
Melissa Virus was the fastest spreading virus ever seen.
Forced a number of large companies to shut down their e-mail systems.
04/12/23 20
Contained a piece of code as an attachment.
Double Click on the attachment triggered the code.
Sent copies of itself to everyone in the victim’s address book
Started corrupting files on the victim’s machine.
04/12/23 21
Code Red made huge headlines in 2001 It slowed down internet traffic when it
began to replicate itself. Each copy of the virus scanned the
internet for Windows NT or Windows 2000 that don’t have security patch installed.
Each time it found an unsecured server, the virus copied itself to that server.
04/12/23 22
Designed to do three things
Replicate itself for the first 20 days of each monthReplace web pages on infected servers with a page that declares “Hacked by Chinese”Launch a concreted attack on the White House Web server.
04/12/23 23
The Morto virus emerged in the summer of 2011.
It attempts to propagate itself to additional computers via the Remote Desktop Protocol
(RDP). Morto spreads by forcing infected systems
to scan for servers allowing RDP login. Once Morto finds an RDP-accessible
system, it attempts to log in to a domain or local system account named 'Administrator' using a number of common passwords.
04/12/23 24
To avoid detection by users, viruses
employ different deception methods
They do not make themselves to
change the date of last modified
increase file sizes
damage the files
04/12/23 25
They kill the tasks associated with antivirus
software before it can detect them.
04/12/23 26
Take regular backups (including OS) on
different media, unconnected to the
system (most of the time)
04/12/23 27
How to prevent damages caused by viruses?
Use backups on optical media like CD and
DVD (read-only), as they can no longer be
affected by viruses.
Use an OS on a bootable, to start the
computer if the installed OS become
unusable.04/12/23 28
How to prevent damages caused by viruses?
Install reliable anti-virus software
the most important step you can take towards keeping
your computer clean of viruses
Update your anti-virus software
regularly
variations of viruses and new ones can be slipped if
your software is not current
04/12/23 29
Get immediate protection
Configure your anti-virus software to boot
automatically on start-up and run at all times
04/12/23 30
Don't automatically open attachments
ensure that you examine and scan email and other
attachments before they run as they might contain
viruses
Scan all incoming email attachments
Do not open any email attached files if the subject line is
questionable, unexpected or the source (address) is
unknown, suspicious or untrustworthy
04/12/23 31
Delete chain emails and junk email
Do not forward or reply to any of them, they clogs up
the network
Some viruses can replicate themselves and spread
through email as a chain
04/12/23 32
Be careful when downloading files
from the Internet
Ensure that the source is a legitimate and reputable
one
save all downloads to one folder and test them with
your own anti-virus software before use
04/12/23 33
Backup your files on a regular basis
Always scan new files for viruses
before you use them
04/12/23 34
If your computer is on a network,
make sure you have security steps in
place to prevent unauthorized users
putting files on your computer
04/12/23 35
Take care using USB flash cards, CDs,
zip
and floppy disks
The more computers flash cards, CDs, zip cards
and floppies have been used on, the better the chance
of a virus infecting them – clean them before use
04/12/23 36
04/12/23 37