SlideShare uma empresa Scribd logo
1 de 27
Week - 12
Computer Viruses
Viruses
Classification of Viruses
Macro viruses
Logic bomb
Boot sector viruses
Multipartite Viruses
Polymorphic Virus
File infectors
Trojan horses
Worms
Protection from viruses (Anti Viruses)
2
 Infact viruses are malicious code.
 Malicious code means a program that can be harmful for computer, its
program and data present in the computer.
 Malicious code are categorized into three types.
 Computer Virus
 Trojan Horse
 Worms
Introduction
3
Computer Virus
 A computer virus is program that can affects or infect a
computer without permission or knowledge of the user.
 It can delete files, programs and any data present on
computer hard disk.
 Some times it may damage computer hardware.
4
Classification of Viruses
 Viruses can be subdivided into a number of types based on their
feature.
 Macro viruses
 Logic bomb
 Boot sector viruses
 Multipartite Viruses
 Polymorphic Virus
 File infectors
5
Macro viruses
 A macro virus is a virus composed of a sequence of instructions that is
interpreted rather than executed directly.
 Macro viruses are designed to infect different types of documents
like Word, Excel and Power point presentation.
 May delete these files or may convert them into unreadable form.
 First macro virus was written for Microsoft Word and was discovered
in August 1995.
 Today, there are thousand of macro viruses in existence, some
example are Relax, Melissa. A and Bablas.
6
Logic bomb
 A logic bomb employs code that lies inert until specific condition are
met.
 Logic bombs may reside within standalone programs, or they may part
of worms or viruses.
 An example of a logic bomb would be a virus that waits to execute
until it has infected a certain number of hosts.
 A time bomb is a subset of logic bomb, which is set to trigger on a
particular date & or time.
 Their objective is to destroy data on the computer once certain
conditions have been met.
 Logic bombs go undetected until launched, and the result can be
destructive.
 An example of a time bomb is the infamous ‘Friday the 13th’ virus.
7
Master Boot Record/Boot Sector Viruses
 Boot sector viruses alters or hide the boot sector, usually the Ist
sector of a bootable disk (hard drive, floppy disk|). or
 Boot Sector Viruses infect the boot sector of a hard disk or floppy
disk.
 They can also affect the Master Boot Record (MBR) of the hard disk.
 The MBR is the first software loaded onto your computer.
 The MBR resides on either a hard disk or floppy disk and when your
computer is turned on, the hardware locates and runs the MBR.
 This program then loads the rest of the operating system into
memory.
 Without a boot sector, computer software will not run.
8
Master Boot Record/Boot Sector Viruses
 A boot sector virus modifies the content of the MBR.
 It replaces the legitimate contents with its own infected version.
 A boot sector virus can only infect a machine if it is used to boot up
the computer.
 Boot sector virus (Apple Viruses 1,2,3, “Elk Cloner”), Pakistani Brain
(x86), Polyboot.B, AntiEXE.
9
Multipartite Viruses
 Multipartite Viruses infect the boot sector or Master Boot Record
and also infect program files.
 Such a virus typically has two parts, one for each type.
 When it infects an executable, it acts as an executable infector.
 When it infects a boot sector, it works as a boot sector infector.
 Such viruses come in through infected media and reside in memory
then they move on to the boot sector of the hard drive. Form there,
the virus infects executable files on the hard drive and spreads
across the system.
 A well known multipartite virus is Ywinz.
10
Polymorphic Virus
 Polymorphic Viruses change their own code each time they duplicate
themselves.
 In this way, each new copy is a variation of the original virus, in order
to evade detection by antivirus software.
 Polymorphic viruses encrypt or encode themselves in a different way
(using different algorithms and encryption keys) every time they
infect a system.
 This makes it impossible for antivirus to find them using string or
signature searches (because they are different in each encryption)
and also enables them to create a large number of copies of
themselves.
 Some examples include: Elkern, Marburg, Satan Bug, Tuareg and Dark
Avenger.
11
File infectors
 File Viruses infect program files and device drivers by attaching
themselves to the program file or by inserting themselves into the
program code.
 This type of virus infects programs or executable files (files with an
.EXE or .COM extension).
 When one of these programs is run, directly or indirectly, the virus is
activated, producing the damaging effects it is programmed to carry
out.
 The majorities of existing viruses belong to this category, and can be
classified according to the actions that they carry out.
12
Trojan Horse
 Malicious program that hides within a friendly program
 A Trojan horse is a file that appears harmless until executed.
 Can erase or overwrite data on a computer
 Corrupting files & Spreading other malware, such as viruses.
(Trojan horse is called a 'dropper‘)
 Installing a backdoor on a computer system.
13
Trojan Horse (Cont’d)
 The Trojan Horse gets its name from Greek history and the story of
Trojans war.
 Greek warriors hide inside a wooden horse, which the Trojans took
within the walls of the city of Troy.
 When night fell and the Trojans were asleep, the Greek warrior came
out of the horse and open the gates to the city, letting the Greek
army enter the gates and destroy the city of Troy.
14
Worms Attacks
 A program or algorithm that replicates itself over a computer network
or through e-mail
 Sometimes performs malicious actions such as using up the computer
and network resources and possibly destroying data.
 Can spread itself over a network, doesn’t need to be sent
 Slow down the computer or network
 Some examples of worms include:
 Klez, Nimda, Code Red, PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D
and Mapson.
15
Famous Viruses
 Two of the most famous viruses to date were
 Mellissa, struck in March, 1999,
 ILOVEYOU virus, hit in May, 2000
 Both viruses cost organization and individuals billion of dollars
 Mellissa virus spread in MS Word documents sent via e-mail
 When the document was opened, the virus was triggered
 Mellissa accessed the MS Outlook address book on that computer and
automatically sent the infected Word attachment by e-mail to the first
50 people in the address book. Each time another person opened the
attachment, the virus would send out another 50 messages.
 The ILOVEYOU virus was sent as an attachment to an e-mail posing as
a love letter.
 The message in the e-mail said “Kindly check the attached love letter
coming from abc”
16
Famous Viruses (Cont’d)
 These viruses corrupt all type of files, including system files.
 Network at companies and government organizations world wide were
shut down for days trying to remedy the problem.
 Estimates for damage caused by the virus were as high as $10 to $15
billion, with the majority of the damage done in just few hours.
 In June, 2000, a worm named Timofonica that was propagated via e-
mail quickly made its way into the cellular phone network in Spain,
sending prank calls and leaving text messages on the phones
17
Web Defacing
 Another popular form of attack by hackers is web defacing
 Hackers illegally change the content of a Web site
 One notable case of Web defacing occurred in 1996 when Swedish
hackers changed the Central Intelligence Agency Web site (
www.odci.gov/cia ) to read “Central Stupidity Agency”
 Many other popular and large Web sites have been defaced
18
Protection against viruses
 A virus can only spread from one computer to another when its hosts
is taken to the uninfected computer, for instance by a user sending it
over a network or carrying it on a removable medium such as a floppy
disk, CD, or USB drive.
 Additionally, viruses can spread to other computes by infecting files
on a network file system or a file system that is accessed by another
computer.
 Today’s viruses may also take advantage of network services such as
the World Wide Web, e-mail and file sharing systems to spread.
 If we want to protect our computer from computer viruses than we
must have to install Antivirus Software and must update it from
internet on regular basis.
19
Antivirus Software
 Antivirus software consist of computer programs that attempt to
identify and eliminate computer viruses and other malicious
software (malware).
 Antivirus software typically uses two different techniques to
accomplish this:
 Examining (scanning) files to look for known viruses matching
definitions in a virus dictionary.
 Identifying suspicious behavior from any computer program
which might indicate infection.
 Such analysis may include data captures, port monitoring and
other methods.
 Most commercial antivirus software uses both of these approaches
with an emphasis on the virus dictionary approach.
20
Antivirus Software Options
 Available antivirus software solutions. Compare these to see which
might meet the needs of your organization.
 Aladdin Knowledge Systems - http://www.esafe.com
 Frisk Software International - http://www.complex.is
 Alwil Software - http://www.avast.com
 Kaspersky Lab - http://www.kaspersky.com
 AVG Antivirus - http://www.grisoft.com
 McAfee - http://www.mcafee.com
 Central Command, Inc. - http://www.centralcommand.com
 Network Associates, Inc. - http://www.nai.com
 Command Software Systems, Inc. - http://www.commandcom.com
 Computer Associates International - http://www.cai.com
 Panda Software - http://www.pandasoftware.com
 Data Fellows Corporation - http://www.datafellows.com
 Dr. Solomon's Software, Inc. - http://www.drsolomon.com
 ESET Software - http://www.mod32.com
 Symantec Corporation - http://www.symantec.com
 Finjan Software - http://www.finjan.com
21
Firewalls
 A firewall is software program or device that checks information
coming from the Internet or a network, and then either blocks it
or allows it to pass through to your computer, depending on your
firewall settings.
 Protects local area network (LAN) from outside intruders
 Prohibit all data not allowed or permit all data not prohibited
 Types of firewalls
 Packet-filtering firewalls
 Rejects all data with local addresses from outside
 Examine only source not content
 Small metal box filled with plug openings, or ports.
 Hook your computer network into the box (just as other
peripherals') then set it up on your computer.
 Hardware firewalls are typically owned by larger businesses.
22
Firewalls (Cont’d)
 Application level firewalls
 Attempt to scan data
 Help block computer viruses and worms from reaching your computer.
 Detect or disable computer viruses and worms if they are already on your
computer.
 Ask for your permission to block or unblock certain connection requests.
 Some software firewall also include parental controls to manage what kind
of websites the children visit.
 Some package will also allow you to block photos and specific text content
that you do not want your children to view.
23
Kerberos
 Kerberos is a computer network authentication protocol, which allows
nodes communicating over a non-secure network to prove their
identity to one another in a secure manner.
 Uses symmetric secret-key cryptography to authenticate users in
a network
 Freely available, open source protocol developed by MIT.
24
Biometrics
 Biometrics is an authentication and security techniques
 Uses unique personal information to identify
 Recognize or verify an individual’s identity.
 Examples are fingerprints, eyeball iris scans or face scans, voice-
recognition might be used to enable access to a computer, to a
room, or to an electronic commerce account
25
Steganography
 Steganography (covered writing)
 Practice of hiding information within other information
 Hides existence of message
 Using only a subset of letters/words in a longer message marked in
some way
 For example, if you want to tell your stock broker to buy, vs sell a
stock and your message must be transmitted over insecure
channel, you could send the message “BURIED UNDER YARD” if
you have agreed in advance that your message is hidden in the
first letter of each word, the stock broker picks these letters off
and sees “BUY”.
26
Steganorgraphy (Cont’d)
 An increasing popular application of Steganography is digital
watermarking.
 Hidden within documents and can be shown to prove ownership
 Example of a conventional watermark
27
 Example: A German spy sent the following “harmless”
message in WWII
 Apparently neutral’s protest is thoroughly discounted and
ignored. Isman hard hit. Blockade issue affects pretext for
embargo on by-products, ejecting suets and vegetable oils.
 If we extract the 2nd letter in each word, we get:
 Apparently neutral’s protest is thoroughly discounted and
ignored. Isman hard hit. Blockade issue affects pretext for
embargo on by-products, ejecting suets and vegetable oils.
 Or the secret message:
 Pershing sails from NY June I.
Steganorgraphy (Cont’d)

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Presentation2
Presentation2Presentation2
Presentation2
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
What is malware
What is malwareWhat is malware
What is malware
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Semelhante a Computer Viruses and Classification lecture slides ppt

Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 

Semelhante a Computer Viruses and Classification lecture slides ppt (20)

W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
virus
virusvirus
virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Mais de Osama Yousaf

Training needs analysis
Training needs analysisTraining needs analysis
Training needs analysisOsama Yousaf
 
Lesson training planner calculator
Lesson training planner calculatorLesson training planner calculator
Lesson training planner calculatorOsama Yousaf
 
Training needs analysis template tool
Training needs analysis template toolTraining needs analysis template tool
Training needs analysis template toolOsama Yousaf
 
Manager training needs analysis
Manager training needs analysisManager training needs analysis
Manager training needs analysisOsama Yousaf
 
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...Osama Yousaf
 
Training and development Session design and Guide | Communication Skill Sessi...
Training and development Session design and Guide | Communication Skill Sessi...Training and development Session design and Guide | Communication Skill Sessi...
Training and development Session design and Guide | Communication Skill Sessi...Osama Yousaf
 
Management Information System BANK ALFALAH
Management Information System BANK ALFALAHManagement Information System BANK ALFALAH
Management Information System BANK ALFALAHOsama Yousaf
 
Performance Management Case study A
Performance Management Case study APerformance Management Case study A
Performance Management Case study AOsama Yousaf
 
Performance Management Conducting Performance Reviews
Performance Management Conducting Performance ReviewsPerformance Management Conducting Performance Reviews
Performance Management Conducting Performance ReviewsOsama Yousaf
 
Performance Management Measuring Performance
Performance Management Measuring PerformancePerformance Management Measuring Performance
Performance Management Measuring PerformanceOsama Yousaf
 
Performance Management | Defining Objectives and performance standards
Performance Management | Defining Objectives and performance standardsPerformance Management | Defining Objectives and performance standards
Performance Management | Defining Objectives and performance standardsOsama Yousaf
 
Performance Management Performance Planning
Performance Management Performance PlanningPerformance Management Performance Planning
Performance Management Performance PlanningOsama Yousaf
 
Performance Management Systems Southwood school
Performance Management Systems Southwood school Performance Management Systems Southwood school
Performance Management Systems Southwood school Osama Yousaf
 
Compensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’sCompensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’sOsama Yousaf
 
Problem and Prospects of E-Commerce
Problem and Prospects of E-CommerceProblem and Prospects of E-Commerce
Problem and Prospects of E-CommerceOsama Yousaf
 
Aggregate Planning, Guide numericals
Aggregate Planning, Guide numericalsAggregate Planning, Guide numericals
Aggregate Planning, Guide numericalsOsama Yousaf
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerceOsama Yousaf
 
Leadership and motivation
Leadership and motivationLeadership and motivation
Leadership and motivationOsama Yousaf
 
The performance management process
The performance management processThe performance management process
The performance management processOsama Yousaf
 
Performance management presentation
Performance management presentationPerformance management presentation
Performance management presentationOsama Yousaf
 

Mais de Osama Yousaf (20)

Training needs analysis
Training needs analysisTraining needs analysis
Training needs analysis
 
Lesson training planner calculator
Lesson training planner calculatorLesson training planner calculator
Lesson training planner calculator
 
Training needs analysis template tool
Training needs analysis template toolTraining needs analysis template tool
Training needs analysis template tool
 
Manager training needs analysis
Manager training needs analysisManager training needs analysis
Manager training needs analysis
 
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...
Nadra COMMUNICATION SKILL SESSION DESIGN | Training and development Session d...
 
Training and development Session design and Guide | Communication Skill Sessi...
Training and development Session design and Guide | Communication Skill Sessi...Training and development Session design and Guide | Communication Skill Sessi...
Training and development Session design and Guide | Communication Skill Sessi...
 
Management Information System BANK ALFALAH
Management Information System BANK ALFALAHManagement Information System BANK ALFALAH
Management Information System BANK ALFALAH
 
Performance Management Case study A
Performance Management Case study APerformance Management Case study A
Performance Management Case study A
 
Performance Management Conducting Performance Reviews
Performance Management Conducting Performance ReviewsPerformance Management Conducting Performance Reviews
Performance Management Conducting Performance Reviews
 
Performance Management Measuring Performance
Performance Management Measuring PerformancePerformance Management Measuring Performance
Performance Management Measuring Performance
 
Performance Management | Defining Objectives and performance standards
Performance Management | Defining Objectives and performance standardsPerformance Management | Defining Objectives and performance standards
Performance Management | Defining Objectives and performance standards
 
Performance Management Performance Planning
Performance Management Performance PlanningPerformance Management Performance Planning
Performance Management Performance Planning
 
Performance Management Systems Southwood school
Performance Management Systems Southwood school Performance Management Systems Southwood school
Performance Management Systems Southwood school
 
Compensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’sCompensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’s
 
Problem and Prospects of E-Commerce
Problem and Prospects of E-CommerceProblem and Prospects of E-Commerce
Problem and Prospects of E-Commerce
 
Aggregate Planning, Guide numericals
Aggregate Planning, Guide numericalsAggregate Planning, Guide numericals
Aggregate Planning, Guide numericals
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerce
 
Leadership and motivation
Leadership and motivationLeadership and motivation
Leadership and motivation
 
The performance management process
The performance management processThe performance management process
The performance management process
 
Performance management presentation
Performance management presentationPerformance management presentation
Performance management presentation
 

Último

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Computer Viruses and Classification lecture slides ppt

  • 1. Week - 12 Computer Viruses Viruses Classification of Viruses Macro viruses Logic bomb Boot sector viruses Multipartite Viruses Polymorphic Virus File infectors Trojan horses Worms Protection from viruses (Anti Viruses)
  • 2. 2  Infact viruses are malicious code.  Malicious code means a program that can be harmful for computer, its program and data present in the computer.  Malicious code are categorized into three types.  Computer Virus  Trojan Horse  Worms Introduction
  • 3. 3 Computer Virus  A computer virus is program that can affects or infect a computer without permission or knowledge of the user.  It can delete files, programs and any data present on computer hard disk.  Some times it may damage computer hardware.
  • 4. 4 Classification of Viruses  Viruses can be subdivided into a number of types based on their feature.  Macro viruses  Logic bomb  Boot sector viruses  Multipartite Viruses  Polymorphic Virus  File infectors
  • 5. 5 Macro viruses  A macro virus is a virus composed of a sequence of instructions that is interpreted rather than executed directly.  Macro viruses are designed to infect different types of documents like Word, Excel and Power point presentation.  May delete these files or may convert them into unreadable form.  First macro virus was written for Microsoft Word and was discovered in August 1995.  Today, there are thousand of macro viruses in existence, some example are Relax, Melissa. A and Bablas.
  • 6. 6 Logic bomb  A logic bomb employs code that lies inert until specific condition are met.  Logic bombs may reside within standalone programs, or they may part of worms or viruses.  An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts.  A time bomb is a subset of logic bomb, which is set to trigger on a particular date & or time.  Their objective is to destroy data on the computer once certain conditions have been met.  Logic bombs go undetected until launched, and the result can be destructive.  An example of a time bomb is the infamous ‘Friday the 13th’ virus.
  • 7. 7 Master Boot Record/Boot Sector Viruses  Boot sector viruses alters or hide the boot sector, usually the Ist sector of a bootable disk (hard drive, floppy disk|). or  Boot Sector Viruses infect the boot sector of a hard disk or floppy disk.  They can also affect the Master Boot Record (MBR) of the hard disk.  The MBR is the first software loaded onto your computer.  The MBR resides on either a hard disk or floppy disk and when your computer is turned on, the hardware locates and runs the MBR.  This program then loads the rest of the operating system into memory.  Without a boot sector, computer software will not run.
  • 8. 8 Master Boot Record/Boot Sector Viruses  A boot sector virus modifies the content of the MBR.  It replaces the legitimate contents with its own infected version.  A boot sector virus can only infect a machine if it is used to boot up the computer.  Boot sector virus (Apple Viruses 1,2,3, “Elk Cloner”), Pakistani Brain (x86), Polyboot.B, AntiEXE.
  • 9. 9 Multipartite Viruses  Multipartite Viruses infect the boot sector or Master Boot Record and also infect program files.  Such a virus typically has two parts, one for each type.  When it infects an executable, it acts as an executable infector.  When it infects a boot sector, it works as a boot sector infector.  Such viruses come in through infected media and reside in memory then they move on to the boot sector of the hard drive. Form there, the virus infects executable files on the hard drive and spreads across the system.  A well known multipartite virus is Ywinz.
  • 10. 10 Polymorphic Virus  Polymorphic Viruses change their own code each time they duplicate themselves.  In this way, each new copy is a variation of the original virus, in order to evade detection by antivirus software.  Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.  This makes it impossible for antivirus to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.  Some examples include: Elkern, Marburg, Satan Bug, Tuareg and Dark Avenger.
  • 11. 11 File infectors  File Viruses infect program files and device drivers by attaching themselves to the program file or by inserting themselves into the program code.  This type of virus infects programs or executable files (files with an .EXE or .COM extension).  When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out.  The majorities of existing viruses belong to this category, and can be classified according to the actions that they carry out.
  • 12. 12 Trojan Horse  Malicious program that hides within a friendly program  A Trojan horse is a file that appears harmless until executed.  Can erase or overwrite data on a computer  Corrupting files & Spreading other malware, such as viruses. (Trojan horse is called a 'dropper‘)  Installing a backdoor on a computer system.
  • 13. 13 Trojan Horse (Cont’d)  The Trojan Horse gets its name from Greek history and the story of Trojans war.  Greek warriors hide inside a wooden horse, which the Trojans took within the walls of the city of Troy.  When night fell and the Trojans were asleep, the Greek warrior came out of the horse and open the gates to the city, letting the Greek army enter the gates and destroy the city of Troy.
  • 14. 14 Worms Attacks  A program or algorithm that replicates itself over a computer network or through e-mail  Sometimes performs malicious actions such as using up the computer and network resources and possibly destroying data.  Can spread itself over a network, doesn’t need to be sent  Slow down the computer or network  Some examples of worms include:  Klez, Nimda, Code Red, PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D and Mapson.
  • 15. 15 Famous Viruses  Two of the most famous viruses to date were  Mellissa, struck in March, 1999,  ILOVEYOU virus, hit in May, 2000  Both viruses cost organization and individuals billion of dollars  Mellissa virus spread in MS Word documents sent via e-mail  When the document was opened, the virus was triggered  Mellissa accessed the MS Outlook address book on that computer and automatically sent the infected Word attachment by e-mail to the first 50 people in the address book. Each time another person opened the attachment, the virus would send out another 50 messages.  The ILOVEYOU virus was sent as an attachment to an e-mail posing as a love letter.  The message in the e-mail said “Kindly check the attached love letter coming from abc”
  • 16. 16 Famous Viruses (Cont’d)  These viruses corrupt all type of files, including system files.  Network at companies and government organizations world wide were shut down for days trying to remedy the problem.  Estimates for damage caused by the virus were as high as $10 to $15 billion, with the majority of the damage done in just few hours.  In June, 2000, a worm named Timofonica that was propagated via e- mail quickly made its way into the cellular phone network in Spain, sending prank calls and leaving text messages on the phones
  • 17. 17 Web Defacing  Another popular form of attack by hackers is web defacing  Hackers illegally change the content of a Web site  One notable case of Web defacing occurred in 1996 when Swedish hackers changed the Central Intelligence Agency Web site ( www.odci.gov/cia ) to read “Central Stupidity Agency”  Many other popular and large Web sites have been defaced
  • 18. 18 Protection against viruses  A virus can only spread from one computer to another when its hosts is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive.  Additionally, viruses can spread to other computes by infecting files on a network file system or a file system that is accessed by another computer.  Today’s viruses may also take advantage of network services such as the World Wide Web, e-mail and file sharing systems to spread.  If we want to protect our computer from computer viruses than we must have to install Antivirus Software and must update it from internet on regular basis.
  • 19. 19 Antivirus Software  Antivirus software consist of computer programs that attempt to identify and eliminate computer viruses and other malicious software (malware).  Antivirus software typically uses two different techniques to accomplish this:  Examining (scanning) files to look for known viruses matching definitions in a virus dictionary.  Identifying suspicious behavior from any computer program which might indicate infection.  Such analysis may include data captures, port monitoring and other methods.  Most commercial antivirus software uses both of these approaches with an emphasis on the virus dictionary approach.
  • 20. 20 Antivirus Software Options  Available antivirus software solutions. Compare these to see which might meet the needs of your organization.  Aladdin Knowledge Systems - http://www.esafe.com  Frisk Software International - http://www.complex.is  Alwil Software - http://www.avast.com  Kaspersky Lab - http://www.kaspersky.com  AVG Antivirus - http://www.grisoft.com  McAfee - http://www.mcafee.com  Central Command, Inc. - http://www.centralcommand.com  Network Associates, Inc. - http://www.nai.com  Command Software Systems, Inc. - http://www.commandcom.com  Computer Associates International - http://www.cai.com  Panda Software - http://www.pandasoftware.com  Data Fellows Corporation - http://www.datafellows.com  Dr. Solomon's Software, Inc. - http://www.drsolomon.com  ESET Software - http://www.mod32.com  Symantec Corporation - http://www.symantec.com  Finjan Software - http://www.finjan.com
  • 21. 21 Firewalls  A firewall is software program or device that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.  Protects local area network (LAN) from outside intruders  Prohibit all data not allowed or permit all data not prohibited  Types of firewalls  Packet-filtering firewalls  Rejects all data with local addresses from outside  Examine only source not content  Small metal box filled with plug openings, or ports.  Hook your computer network into the box (just as other peripherals') then set it up on your computer.  Hardware firewalls are typically owned by larger businesses.
  • 22. 22 Firewalls (Cont’d)  Application level firewalls  Attempt to scan data  Help block computer viruses and worms from reaching your computer.  Detect or disable computer viruses and worms if they are already on your computer.  Ask for your permission to block or unblock certain connection requests.  Some software firewall also include parental controls to manage what kind of websites the children visit.  Some package will also allow you to block photos and specific text content that you do not want your children to view.
  • 23. 23 Kerberos  Kerberos is a computer network authentication protocol, which allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner.  Uses symmetric secret-key cryptography to authenticate users in a network  Freely available, open source protocol developed by MIT.
  • 24. 24 Biometrics  Biometrics is an authentication and security techniques  Uses unique personal information to identify  Recognize or verify an individual’s identity.  Examples are fingerprints, eyeball iris scans or face scans, voice- recognition might be used to enable access to a computer, to a room, or to an electronic commerce account
  • 25. 25 Steganography  Steganography (covered writing)  Practice of hiding information within other information  Hides existence of message  Using only a subset of letters/words in a longer message marked in some way  For example, if you want to tell your stock broker to buy, vs sell a stock and your message must be transmitted over insecure channel, you could send the message “BURIED UNDER YARD” if you have agreed in advance that your message is hidden in the first letter of each word, the stock broker picks these letters off and sees “BUY”.
  • 26. 26 Steganorgraphy (Cont’d)  An increasing popular application of Steganography is digital watermarking.  Hidden within documents and can be shown to prove ownership  Example of a conventional watermark
  • 27. 27  Example: A German spy sent the following “harmless” message in WWII  Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.  If we extract the 2nd letter in each word, we get:  Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.  Or the secret message:  Pershing sails from NY June I. Steganorgraphy (Cont’d)