SlideShare uma empresa Scribd logo
1 de 31
MOST RECENT ATTACKS BY
VIRUS,
WORMS & TROJANS
INDEX
   VIRUS
•    What Is Computer Virus?
•    History Of Computer Virus.
•    Background
•    Virus Through The Internet.
•    Symptoms Of Virus Attack.
•    Typical Things That Computer
•    Viruses Do.
•    Prevention of Virus.
   WORMS
•   What Is Worms?
•   History Of Worms.
•   Anatomy of Worms.
•   Types Of Worms.
•   Harmful Effects Of Worms.
•   Prevention of Worms
   TROJANS
•    What Are Trojans?
•    Types Of Trojans.
•    What Trojans Can Do.
•    Detection Of Trojans.
•    Prevention of Trojans
   COUNTER-MEASURE OF TROJAN,VIRUS,WORMS
   DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
VIRUS
 A computer virus is a computer program that can copy
  itself and infect a computer.
 The term "virus" is also commonly used to refer to other
  types of malware, adware and spyware.
 Viruses can increase their chances of spreading to other
  computers by infecting files on a network file system or
  a file system that is accessed by another computer.
 Once it’s running, it spreads by inserting copies of itself
  into other executable code or documents
THE HISTORY OF COMPUTER VIRUSES

•   1981 Apple Viruses 1, 2, & 3
•   1980’s Fred Cohen
•   1987 Lehigh Virus
•   1988 The first anti virus software
•   1990 The first polymorphic viruses
•   1991 Symantec releases Norton Anti Virus
•   1992 The Michelangelo Virus
•   1994 Kaos4 virus spreads via adult websites.
•   1996 The Concept virus
•   1999 The Melissa Virus
•   2000 The I Love You Virus
•   2001 The Code Red Worm
•   2003 The Slammer Worm.
•   2004 MyDoom
BACKGROUND
 There are estimated 30,000 computer viruses in existence
 Over 300 new ones are created each month

 First virus was created to show loopholes in software



Virus through the Internet
  Today almost 87% of all viruses are spread through
   the internet (source: ZDNet)
  Transmission time to a new host is relatively
   low, on the order of hours to days
  “Latent virus”
SYMPTOMS OF VIRUS ATTACK
 Computer runs slower then usual
 Computer no longer boots up

 Screen sometimes flicker

 PC speaker beeps periodically

 System crashes for no reason

 Files/directories sometimes disappear

 Denial of Service (DOS)
TYPICAL THINGS THAT SOME CURRENT
PERSONAL COMPUTER (PC) VIRUSES DO
 Display a message.
 Erase files

 Scramble data on a hard disk

 Cause erratic screen behavior

 Halt the PC

 Many viruses do nothing obvious at all except spread!
PREVENTION OF VIRUS
• Most antivirus are capable of detecting and removal of
  major virus.
• Get the latest Anti-Virus Software.
• As prevention is concern use of any detection tool is
  preferred e.g. adware, spyware.
• Not to open any unknown source downloads. To prevent
  attacks.
• Even after using these precautions, if the virus creeps
  into your system, it can be detected in various ways
  apart from using a virus scanner for it.
• Always keep backup of your data/programs
• Keep floppies Write-protected (especially if they are
  bootable.)
WORMS
 The actual term "worm"' was first used in John Brunner’s
  1975 novel, The Shockwave Rider.
 A computer worm is a self-replicating malware
  computer program, which uses a computer network to
  send copies of itself to other nodes and it may do so
  without any user intervention.
 Unlike a computer virus, it does not need to attach itself
  to an existing program. Worms almost always cause at
  least some harm to the network, even if only by
  consuming bandwidth, whereas viruses almost always
  corrupt or modify files on a targeted computer.
HISTORY OF WORMS
 The  first worm to attract wide attention, the
  Morris worm, was written by Robert Tappan
  Morris, who at the time was a graduate student at
  Cornell University.
 It was released on November 2, 1988
 Morris himself was convicted under the US
  Computer Crime and Abuse Act and received
  three years probation, community service and a
  fine in excess of $10,000.
ANATOMY OF WORMS
   Attack Mechanism
   Payload
   New target selection
TYPES OF WORMS
   Conficker Worm
   Email and Instant Message Worms
   Internet Worms (Morris Worm)
   IRC Worms
   File-Sharing Network Worms
   Slapper Worm
HARMFUL EFFECTS OF WORMS
 A worm uses a compromised system to spread through
  email, file sharing networks, instant messenger, online
  chats and unprotected network shares.
 Infects files, corrupts installed applications and damages
  the entire system.
 Steals or discloses sensitive personal
  information, Valuable documents, passwords, etc.
 The worm installs a backdoor or drops other dangerous
  parasite.
 Connection speed & System performance.
TROJANS
 A Trojan horse or Trojan, is a destructive program that
  masquerades as an application.
 The Trojan Horse, at first glance will appear to be useful
  software but will actually do damage once installed or
  run on your computer.
 Trojans are also known to create a backdoor on your
  computer that gives malicious users access to your
  system.
 Unlike viruses and worms, Trojans do not reproduce by
  infecting other files nor do they self-replicate.
 Some well known Trojans:Net-bus,Girl friend, Back
  orrifice ,Flooder, Vundo Trojan etc.
PREVENTION OF WORMS
• A personal firewall should be run on any system that
is not behind a corporate firewall. This should be done
on any computer that connects to the internet.

•Patching your system with updates to fix the
vulnerabilities.

•Patching is the act of downloading updates to the
vulnerable operating system or application and
applying the update to the program.

•sometimes the worm can infect the system before the
anti-virus software can detect it.
TYPES OF TROJANS
1)   Remote access Trojans
2)   Password sending Trojans
3)   Keyloggers
4)   Destructive
5)   Denial of service(DOS) Attack Trojans
6)   Mail-Bomb Trojans
7)   Proxy-Wingate Trojans
8)   FTP Trojans
9)   Software Detection Trojans
WHAT TROJANS CAN DO?
 Use  of the machine as part of a Botnet (e.g. to
  perform automated spamming or to distribute
  Denial-of-service.)
 Uninstallation of software, including third-party
  router drivers.
 Downloading or uploading of files on the
  network hdd.
 Watching the user’s screen.
 Spreading other malware? Such as viruses. In
  this case? The Trojan horse is called a dropper or
  vector.
WHAT TROJANS CAN DO?
 Modification  or deletion of files.
 Data theft(e.g. retrieving username or postal
  code information)
 Erasing or overwriting data on a computer.

 Encrypting files in a crypto viral extortion
  attack.
 Crashing the computer.

 Corrupting files in a subtle way.

 Setting up networks of zombie computers in
  order to launch Dodos attacks or send spam.
WHAT TROJANS CAN DO?
 Spying   on the user of a computer and covertly
  reporting data like browsing habits to other
  people.
 Logging keystrokes to stealing formation such as
  passwords and credit card numbers (also known
  as a key logger)
 Phish for bank or other account details? Which
  can be used for criminal activities.
 Installing a backdoor on a computer system
DETECTION OF TROJANS
a)   Suspicious open ports:
b)   Monitoring outgoing traffic:
c)   Detection tools:
d)   Start up files:
PREVENTION OF TROJAN

• One of most important difference between
  Trojan and his friends is that it does not
  replicate.

• Thus limit the destruction.

• Anti-virus can detect and safely deleted
  the Trojan.
COUNTER-MEASURE OF
TROJAN,VIRUS,WORMS
  •Virus
    -Virus detection/disinfection software

  •Trojan
    -Sandboxing
    - Code reviews

  •Worms
    -Sandboxing
    -Quick patching: fix holes, stop worm
DIFFERENCE BETWEEN VIRUS,WORMS &
             TROJANS
               VIRUS           WORMS               TROJAN
             A computer       A computer
Definition                    WORM is a self-
                                                     S
             virus attaches                       A Trojan, is
             itself it        contained
                              program (or set     software that
             travels to a
                              of programs),       appears to
             program or       that is able to     perform a
             file             spread              desirable
             enabling it to   functional copies   function for
             spread from      of itself or its    the user prior
             one computer     segments to
                                                  to run or
             to another,      other computer
                              systems (usually
                                                  install, but
             leaving                              steals
             infections       via network
                              connections).       information or
                                                  harms the
                                                  system
VIRUS         WORMS      TROJANS
TYPES   1.Trojan Horse             1.Remote
        2.Worm         1. “host    Access
        3.Macro        computer    Trojans
                       worms” &    2.Data
                                   Sending
                      2.”network
                                   Trojans
                      worms”.
                                   3.Destructive
                                   Trojans
                                   4.Proxy
                                   Trojans
                                   5.FTP
                                   Trojans
                                   6.security
                                   software
                                   disabler
                                   Trojans
                                   7.DoS
                                   Trojans
VIRUS            WORMS            TROJANS
What they   virus may exist   the worm          cause serious
            on your           consumes too      damage by
do?         computer but it   much system       deleting files and
            actually cannot   memory (or        destroying
            infect your       network           information on
            computer unless   bandwidth),       your system.
            you run or open   causing Web
            the malicious     servers,
            program           network servers
                              and individual
                              computers to
                              stop responding




EXISTENCE       NOT     NOT                     INDEPENDENT
            INDEPENDENT INDEPENDENT
VIRUS            WORMS             TROJANS
SELF-       . A virus attaches a worm is self-        Unlike virus and
REPLICATION itself to, and     contained and          worms
                becomes part of,   does not need to   Trojans do not
                another            be part of         reproduce by
                executable         another program    infecting other
                program            to propagate       files nor do they
                                   itself.            self-replicate.
VIRUS              WORMS           TROJANS
Propagation
              virus does not     Worms           . Trojans are
              have a             propagate and   also known to
              propagation        infect other    create a
              vector. i.e., it   computers.      backdoor on
              will only effect                   your computer
              one host and                       that gives
              does not                           malicious users
              propagate to                       access to your
              other hosts.                       system,
                                                 possibly
                                                 allowing
                                                 confidential or
                                                 personal
                                                 information to
                                                 be
                                                 compromised
VIRUS    WORMS      TROJAN
EXAMPLE   Melissa   Nimda,       S
S                   Code Red   I Love You
BIBLIOGRAPHY

•Virus-
http:// en.wikipedia.org/wiki/Computer_virus
•Trojan
http:// en.wikipedia.org/wiki/Trojan_horse
•Worm-
http://en.wikipedia.org/wiki/Computer_worm
Trojan Horses -
http://www.mpsmits.com/highlights/trojan_horses.sh
tml
Internet Security

Mais conteúdo relacionado

Mais procurados (20)

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Network security
Network securityNetwork security
Network security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Evolution of operating system
Evolution of operating systemEvolution of operating system
Evolution of operating system
 
Introduction to Firmware
Introduction to FirmwareIntroduction to Firmware
Introduction to Firmware
 
Computer virus
Computer virusComputer virus
Computer virus
 
FireWall
FireWallFireWall
FireWall
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Ide description
Ide descriptionIde description
Ide description
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Malware
MalwareMalware
Malware
 
Booting
BootingBooting
Booting
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Program security
Program securityProgram security
Program security
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
USB flash drive security
USB flash drive securityUSB flash drive security
USB flash drive security
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Computer virus
Computer virusComputer virus
Computer virus
 

Destaque

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the emailGianni Fiore
 

Destaque (17)

virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 

Semelhante a Internet Security

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 

Semelhante a Internet Security (20)

Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Information security
Information securityInformation security
Information security
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Mitppt
MitpptMitppt
Mitppt
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 

Último

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Último (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Internet Security

  • 1. MOST RECENT ATTACKS BY VIRUS, WORMS & TROJANS
  • 2. INDEX  VIRUS • What Is Computer Virus? • History Of Computer Virus. • Background • Virus Through The Internet. • Symptoms Of Virus Attack. • Typical Things That Computer • Viruses Do. • Prevention of Virus.  WORMS • What Is Worms? • History Of Worms. • Anatomy of Worms. • Types Of Worms. • Harmful Effects Of Worms. • Prevention of Worms  TROJANS • What Are Trojans? • Types Of Trojans. • What Trojans Can Do. • Detection Of Trojans. • Prevention of Trojans  COUNTER-MEASURE OF TROJAN,VIRUS,WORMS  DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
  • 3. VIRUS  A computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly used to refer to other types of malware, adware and spyware.  Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.  Once it’s running, it spreads by inserting copies of itself into other executable code or documents
  • 4. THE HISTORY OF COMPUTER VIRUSES • 1981 Apple Viruses 1, 2, & 3 • 1980’s Fred Cohen • 1987 Lehigh Virus • 1988 The first anti virus software • 1990 The first polymorphic viruses • 1991 Symantec releases Norton Anti Virus • 1992 The Michelangelo Virus • 1994 Kaos4 virus spreads via adult websites. • 1996 The Concept virus
  • 5. 1999 The Melissa Virus • 2000 The I Love You Virus • 2001 The Code Red Worm • 2003 The Slammer Worm. • 2004 MyDoom
  • 6. BACKGROUND  There are estimated 30,000 computer viruses in existence  Over 300 new ones are created each month  First virus was created to show loopholes in software Virus through the Internet  Today almost 87% of all viruses are spread through the internet (source: ZDNet)  Transmission time to a new host is relatively low, on the order of hours to days  “Latent virus”
  • 7. SYMPTOMS OF VIRUS ATTACK  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DOS)
  • 8. TYPICAL THINGS THAT SOME CURRENT PERSONAL COMPUTER (PC) VIRUSES DO  Display a message.  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread!
  • 9. PREVENTION OF VIRUS • Most antivirus are capable of detecting and removal of major virus. • Get the latest Anti-Virus Software. • As prevention is concern use of any detection tool is preferred e.g. adware, spyware. • Not to open any unknown source downloads. To prevent attacks. • Even after using these precautions, if the virus creeps into your system, it can be detected in various ways apart from using a virus scanner for it. • Always keep backup of your data/programs • Keep floppies Write-protected (especially if they are bootable.)
  • 10. WORMS  The actual term "worm"' was first used in John Brunner’s 1975 novel, The Shockwave Rider.  A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention.  Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 11. HISTORY OF WORMS  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 12. ANATOMY OF WORMS  Attack Mechanism  Payload  New target selection
  • 13. TYPES OF WORMS  Conficker Worm  Email and Instant Message Worms  Internet Worms (Morris Worm)  IRC Worms  File-Sharing Network Worms  Slapper Worm
  • 14. HARMFUL EFFECTS OF WORMS  A worm uses a compromised system to spread through email, file sharing networks, instant messenger, online chats and unprotected network shares.  Infects files, corrupts installed applications and damages the entire system.  Steals or discloses sensitive personal information, Valuable documents, passwords, etc.  The worm installs a backdoor or drops other dangerous parasite.  Connection speed & System performance.
  • 15. TROJANS  A Trojan horse or Trojan, is a destructive program that masquerades as an application.  The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Trojans are also known to create a backdoor on your computer that gives malicious users access to your system.  Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.  Some well known Trojans:Net-bus,Girl friend, Back orrifice ,Flooder, Vundo Trojan etc.
  • 16. PREVENTION OF WORMS • A personal firewall should be run on any system that is not behind a corporate firewall. This should be done on any computer that connects to the internet. •Patching your system with updates to fix the vulnerabilities. •Patching is the act of downloading updates to the vulnerable operating system or application and applying the update to the program. •sometimes the worm can infect the system before the anti-virus software can detect it.
  • 17. TYPES OF TROJANS 1) Remote access Trojans 2) Password sending Trojans 3) Keyloggers 4) Destructive 5) Denial of service(DOS) Attack Trojans 6) Mail-Bomb Trojans 7) Proxy-Wingate Trojans 8) FTP Trojans 9) Software Detection Trojans
  • 18. WHAT TROJANS CAN DO?  Use of the machine as part of a Botnet (e.g. to perform automated spamming or to distribute Denial-of-service.)  Uninstallation of software, including third-party router drivers.  Downloading or uploading of files on the network hdd.  Watching the user’s screen.  Spreading other malware? Such as viruses. In this case? The Trojan horse is called a dropper or vector.
  • 19. WHAT TROJANS CAN DO?  Modification or deletion of files.  Data theft(e.g. retrieving username or postal code information)  Erasing or overwriting data on a computer.  Encrypting files in a crypto viral extortion attack.  Crashing the computer.  Corrupting files in a subtle way.  Setting up networks of zombie computers in order to launch Dodos attacks or send spam.
  • 20. WHAT TROJANS CAN DO?  Spying on the user of a computer and covertly reporting data like browsing habits to other people.  Logging keystrokes to stealing formation such as passwords and credit card numbers (also known as a key logger)  Phish for bank or other account details? Which can be used for criminal activities.  Installing a backdoor on a computer system
  • 21. DETECTION OF TROJANS a) Suspicious open ports: b) Monitoring outgoing traffic: c) Detection tools: d) Start up files:
  • 22. PREVENTION OF TROJAN • One of most important difference between Trojan and his friends is that it does not replicate. • Thus limit the destruction. • Anti-virus can detect and safely deleted the Trojan.
  • 23. COUNTER-MEASURE OF TROJAN,VIRUS,WORMS •Virus -Virus detection/disinfection software •Trojan -Sandboxing - Code reviews •Worms -Sandboxing -Quick patching: fix holes, stop worm
  • 24. DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS VIRUS WORMS TROJAN A computer A computer Definition WORM is a self- S virus attaches A Trojan, is itself it contained program (or set software that travels to a of programs), appears to program or that is able to perform a file spread desirable enabling it to functional copies function for spread from of itself or its the user prior one computer segments to to run or to another, other computer systems (usually install, but leaving steals infections via network connections). information or harms the system
  • 25. VIRUS WORMS TROJANS TYPES 1.Trojan Horse 1.Remote 2.Worm 1. “host Access 3.Macro computer Trojans worms” & 2.Data Sending 2.”network Trojans worms”. 3.Destructive Trojans 4.Proxy Trojans 5.FTP Trojans 6.security software disabler Trojans 7.DoS Trojans
  • 26. VIRUS WORMS TROJANS What they virus may exist the worm cause serious on your consumes too damage by do? computer but it much system deleting files and actually cannot memory (or destroying infect your network information on computer unless bandwidth), your system. you run or open causing Web the malicious servers, program network servers and individual computers to stop responding EXISTENCE NOT NOT INDEPENDENT INDEPENDENT INDEPENDENT
  • 27. VIRUS WORMS TROJANS SELF- . A virus attaches a worm is self- Unlike virus and REPLICATION itself to, and contained and worms becomes part of, does not need to Trojans do not another be part of reproduce by executable another program infecting other program to propagate files nor do they itself. self-replicate.
  • 28. VIRUS WORMS TROJANS Propagation virus does not Worms . Trojans are have a propagate and also known to propagation infect other create a vector. i.e., it computers. backdoor on will only effect your computer one host and that gives does not malicious users propagate to access to your other hosts. system, possibly allowing confidential or personal information to be compromised
  • 29. VIRUS WORMS TROJAN EXAMPLE Melissa Nimda, S S Code Red I Love You