A Trip to ICT and Society Series 1 : INFECTED! PART 2
-
Upload
ianpoblete13 -
Category
Education
-
view
108 -
download
0
Transcript of A Trip to ICT and Society Series 1 : INFECTED! PART 2
By: Group 2 ICT-TLEGrade 7-Newton
Members will follow via discussion
INFECTED!!!
Expansion Pack
A trip to ICT and Society
A trip to ICT and Society
This Expansion Pack Course provides 3 more topics to discuss. Click on the module of your
choice:THE TOP 10 ...
MOST LETHAL COMPUTER
VIRUSES OF ALL TIME
LATEST COMPUTER
VIRUSES
BEST ANTIVIRUS SOFTWARE
TODAY
INFECTED!!! EXPANSION PACK VERSION 20.24
EXIT
10
MELISSA VIRUS
In the spring of 1999, a man named David L. Smith created acomputer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida.
30%
70%
DAMAGE RATIO
ESTIMATED DAMAGE
9
ILOVEYOU
A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm, it was a standalone program capable of replicating itself. It bore the name ILOVEYOU.
50%50%
DAMAGE RATIO
ESTIMATED DAMAGE
8
KLEZ VIRUS
It debuted in late 2001. The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book. The Klez virus could act like a normal computer virus, a worm or a Trojan horse. 70%
30%
DAMAGE RATIO
ESTIMATED DAMAGE
7
CODE RED (I AND II)
The Code Red and Code Red II worms popped up in the summer of 2001. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. 75%
25%
DAMAGE RATIO
ESTIMATED DAMAGE
6
NIMDA WORM
Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. According to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks . 80%
20%
DAMAGE RATIO
ESTIMATED DAMAGE
5
SQL SLAMMER/SAPPHIRE
In late January 2003, a new Web server virus spread across the Internet. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. 85%
15%
DAMAGE RATIO
ESTIMATED DAMAGE
4
MYDOOMThe MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus -- there have been several variants -- had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. 95%
5%
DAMAGE RATIO
ESTIMATED DAMAGE
3
SASSER AND NETSKYThe Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems.
The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment 95%
5%
DAMAGE RATIO
ESTIMATED DAMAGE
2
LEAP-A/OOMPA-AIn 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image. 80%
20%
DAMAGE RATIO
ESTIMATED DAMAGE
1
STORM VIRUSThe Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create abotnet and use it to send spam mail across the Internet. 99%
1%
DAMAGE RATIO
ESTIMATED DAMAGE
10
EXPLOIT CVE -2013-5065.A
Adobe Reader crashes when trying to open a PDF file.
9
SIREFEF.GEN VIRUS
Displays unwanted advertisements in your system, and also allows hacking by an exploiter.
8
MBR.TDSS VIRUS FAMILY
Infection with TDSS is extremely difficult to spot because of the rootkit component that hides the actual payload. Usually, search engine search results are redirected to third-party sites
that display ads or sell fake products.
7
FAKE ANTIVIRUS (FAKEAV)
Delivers fake messages saying computer is infected with an exaggerated number of threats showing.
6
START PAGE
Hijacks the start page of a browser by laban.vn.
5
OLYMPIC GAMES
Causes Adobe Reader to crash.
4
Sky Wiper
Downloads and executes malicious directories and files.
3
Reveton Ransom Virus
Initiates a DoS or Denial-of-Service. Locks the computer, saying you have violated the law and must pay a fine via
uKash, an unidentified payment provider.
2
DORKBOT
Increases HTTP traffic, making the internet slower.
1
TROJAN HORSE GEINIMI
(not mispelled) This creates a service known as AndroidIME.
10
MCAFFE ANTI-VIRUS PLUS
$24.99McAfee AntiVirus Plus
protects against viruses, worms, spyware, Trojans and rootkits. It also detects and avoids attacks from hackers,
phishing scams, dialers, adware and malicious scripts. It is one of the only antivirus
software applications to include a two-way firewall.
10
9
AVAST! PRO ANTI-VIRUS
$39.99Avast Pro Antivirus uses several layers of
protection, keeping your PC and resources safe from several angles. With built-in protection from spyware, rootkits and
Trojans, the software is equipped for all major security threats. The application
includes protection from malware spread through email (by scanning both inbound
and outbound messages), and it also has an integrated IM shield. Avast also includes
specific protection for several popular P2P file-sharing applications.
9
8
PANDA ANTIVIRUS
PRO
$35.99Panda Security SL, formerly
Panda Software, is one of the dominant computer security
software vendors. AV-Test gives it excellent scores.
Industry analysts praise its technology innovations. There
are also Panda Security franchises in another 44
countries.
8
7
G DATA ANTIVIRUS
$29.95The software incorporates advanced protection from
malware spread through email or IM. The software goes as
far as scanning outbound email for viruses and other
malware, so you won’t accidentally pass along a threat to your friends or
coworkers. Also recommended as BEST AV
SOLUTION FOR PC.
7
6
BULLGUARD ANTIVIRUS
$29.95BullGuard antivirus software
earned certification from ICSA labs, which tests and retest
products at least on a quarterly basis in order to
ensure that they are able to defend your computer against emerging threats. This product
can also claim VB 100 certification, which means
Virus Bulletin has tested it for its ability to detect in-the-wild
viruses and its ability to generate no false positives.
6
5
AVG ANTIVIRUS
$34.995
4
F-SECURE ANTIVIRUS
$39.99AV-Test out of Germany places
F-Secure among the leaders when it comes to
performance. F-Secure is also among the handful of antivirus
software products to win an Advanced A+ rating from AV
Comparatives. The Virus Bulletin found F-Secure right on par with most of the best
antivirus software competitors.
4
3
NORTON ANTIVIRUS
$39.99Norton AntiVirus detects
malware based on the behavior of suspected files and it also uses the more
traditional method of detecting viruses via known
signatures. It protects Firefox and Internet Explorer from malware that attempts to
exploit browser vulnerabilities.
3
2
KASPERSKY ANTIVIRUS
$59.95Kaspersky Anti-Virus delivers
superb protection and security. As one of the best
antivirus software applications, it integrates
innovative technologies to defend against even the
newest threats. It's a great option for protection and
peace of mind. Independent test lab results confirm that it
is incredibly effective at protecting computers from
malware.
2
1
BITDEFENDER ANTIVIRUS
PLUS
$29.95Bitdefender beats the threats from viruses, worms, Trojans
and other malware. It protects against the dangers that appear on social media
networks. And it protects you from dangerous emails and
malicious web sites. It is effective at what it does, as documented by the most
respected third-party test labs. It behaves well if you are
playing games or your laptop is unplugged.
1
EXIT RETRY