virus presentation
TRANSCRIPT
![Page 1: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/1.jpg)
04/12/23 1
![Page 2: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/2.jpg)
A kind of software programs
produced by unknown people and harmful
to the computers
Some varieties of these software are the
Viruses, Worms and Trojan horses
04/12/23 2
![Page 3: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/3.jpg)
The term “Virus" is often used in
common
to describe all kinds of malware (malicious
software) including adware and
spyware programs that do not have the
reproductive ability.
04/12/23 3
![Page 4: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/4.jpg)
Trojan horse perform a desirable function for the user in addition to the expected function
Leaks information Usually does not reproduce
04/12/23 4
![Page 5: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/5.jpg)
A worm is a self replicating malware computer program, which uses a computer network to send copies of itself to other computers and it may do so without any user intervention. It does not need to attach itself to an existing program.
04/12/23 5
![Page 6: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/6.jpg)
Sometimes display unwanted messages
Some tend to destroy programs or data
Clog computer memory and hence sometimes result
in system crashes
Format hard disks, Damage programs, Delete files
04/12/23 6
Viruses
![Page 7: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/7.jpg)
Simply replicate themselves
Presents text, video, or audio messages
making the user know their presence
Bug-ridden, and these bugs may lead to
system crashes and data loss
04/12/23 7
![Page 8: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/8.jpg)
A viruses can copy itself and infect a
computer
without permission or knowledge of the
user
attaches itself to other software
programs or data files 04/12/23 8
![Page 9: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/9.jpg)
Spreads from computer to computer
when the host is taken to the
uninfected computer
over a network such as over the Internet or
carrying it on a removable medium - a floppy
disk, CD, or USB drive
04/12/23 9
![Page 10: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/10.jpg)
Many viruses are existed in the
Internet today and new ones are
discovered every day.
spread via downloaded software and data
files, and email attachments etc.
04/12/23 10
![Page 11: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/11.jpg)
Some old viruses are installed
themselves into the disk boot sector
runs when the user boot the computer from
the disk
04/12/23 11
![Page 12: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/12.jpg)
Some viruses spread through instant messaging
A virus, in an infected machine, may send a web address link
as a message to other contacting machines
Thinking the link is from a friend (a trusted source), the
recipient may sometimes follow the link to the website.
04/12/23 12
![Page 13: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/13.jpg)
ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts Javascript
04/12/23 13
![Page 14: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/14.jpg)
Unlike biological viruses, computer
viruses do not simply evolve by
themselves
deliberately created by programmers, or by
people who use virus creation software
04/12/23 14
![Page 15: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/15.jpg)
Viruses are written as
research projects, pranks, vandalism,
to attack the products of specific
companies,
to distribute political messages,
and financial gain from identity theft,
spyware, and cryptoviral extortion.
04/12/23 15
![Page 16: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/16.jpg)
Some virus writers
consider their creations to be works of art
See virus writing as a creative hobby
04/12/23 16
Releasing computer viruses is a crime in most
jurisdictions
![Page 17: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/17.jpg)
File infector virusInfect program files
Boot sector virusInfect the system area of a disk
Master boot record virusinfect disks in the same manner as boot sector
viruses. The difference between these two virus types is where the viral code is located.
04/12/23 17
![Page 18: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/18.jpg)
Multi-partite virusInfect both boot records and program files.
Macro virusInfect data files. Example: Microsoft Office Word,
Excel,
PowerPoint and Access files
04/12/23 18
![Page 19: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/19.jpg)
Melissa virus spread in Microsoft Word documents sent via e-mail.
How it works ? Created the virus as word document Uploaded to an internet newsgroup Anyone who download the document and
opened it would trigger the virus. Send friendly email messages to first 50
people in person’s address book
04/12/23 19
![Page 20: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/20.jpg)
Melissa Virus was the fastest spreading virus ever seen.
Forced a number of large companies to shut down their e-mail systems.
04/12/23 20
![Page 21: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/21.jpg)
Contained a piece of code as an attachment.
Double Click on the attachment triggered the code.
Sent copies of itself to everyone in the victim’s address book
Started corrupting files on the victim’s machine.
04/12/23 21
![Page 22: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/22.jpg)
Code Red made huge headlines in 2001 It slowed down internet traffic when it
began to replicate itself. Each copy of the virus scanned the
internet for Windows NT or Windows 2000 that don’t have security patch installed.
Each time it found an unsecured server, the virus copied itself to that server.
04/12/23 22
![Page 23: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/23.jpg)
Designed to do three things
Replicate itself for the first 20 days of each monthReplace web pages on infected servers with a page that declares “Hacked by Chinese”Launch a concreted attack on the White House Web server.
04/12/23 23
![Page 24: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/24.jpg)
The Morto virus emerged in the summer of 2011.
It attempts to propagate itself to additional computers via the Remote Desktop Protocol
(RDP). Morto spreads by forcing infected systems
to scan for servers allowing RDP login. Once Morto finds an RDP-accessible
system, it attempts to log in to a domain or local system account named 'Administrator' using a number of common passwords.
04/12/23 24
![Page 25: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/25.jpg)
To avoid detection by users, viruses
employ different deception methods
They do not make themselves to
change the date of last modified
increase file sizes
damage the files
04/12/23 25
![Page 26: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/26.jpg)
They kill the tasks associated with antivirus
software before it can detect them.
04/12/23 26
![Page 27: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/27.jpg)
Take regular backups (including OS) on
different media, unconnected to the
system (most of the time)
04/12/23 27
How to prevent damages caused by viruses?
![Page 28: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/28.jpg)
Use backups on optical media like CD and
DVD (read-only), as they can no longer be
affected by viruses.
Use an OS on a bootable, to start the
computer if the installed OS become
unusable.04/12/23 28
How to prevent damages caused by viruses?
![Page 29: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/29.jpg)
Install reliable anti-virus software
the most important step you can take towards keeping
your computer clean of viruses
Update your anti-virus software
regularly
variations of viruses and new ones can be slipped if
your software is not current
04/12/23 29
![Page 30: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/30.jpg)
Get immediate protection
Configure your anti-virus software to boot
automatically on start-up and run at all times
04/12/23 30
![Page 31: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/31.jpg)
Don't automatically open attachments
ensure that you examine and scan email and other
attachments before they run as they might contain
viruses
Scan all incoming email attachments
Do not open any email attached files if the subject line is
questionable, unexpected or the source (address) is
unknown, suspicious or untrustworthy
04/12/23 31
![Page 32: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/32.jpg)
Delete chain emails and junk email
Do not forward or reply to any of them, they clogs up
the network
Some viruses can replicate themselves and spread
through email as a chain
04/12/23 32
![Page 33: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/33.jpg)
Be careful when downloading files
from the Internet
Ensure that the source is a legitimate and reputable
one
save all downloads to one folder and test them with
your own anti-virus software before use
04/12/23 33
![Page 34: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/34.jpg)
Backup your files on a regular basis
Always scan new files for viruses
before you use them
04/12/23 34
![Page 35: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/35.jpg)
If your computer is on a network,
make sure you have security steps in
place to prevent unauthorized users
putting files on your computer
04/12/23 35
![Page 36: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/36.jpg)
Take care using USB flash cards, CDs,
zip
and floppy disks
The more computers flash cards, CDs, zip cards
and floppies have been used on, the better the chance
of a virus infecting them – clean them before use
04/12/23 36
![Page 37: Virus presentation](https://reader035.vdocuments.site/reader035/viewer/2022062303/555b61f4d8b42a66338b4c78/html5/thumbnails/37.jpg)
04/12/23 37