Computer viruses - A daily harm
-
Upload
anubhav125 -
Category
Technology
-
view
21 -
download
3
Transcript of Computer viruses - A daily harm
![Page 1: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/1.jpg)
Computer Viruses
By-Anubhav Sinha
IX A
![Page 2: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/2.jpg)
What’s Inside?
• What is a virus?• More about virus • Who wrote it and why?• How do they spread?• Kinds of virus……………….
• What is a worm?• Difference between virus and
worms• 2014
![Page 3: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/3.jpg)
What is a virus?
– An executable code
– That could make copies of itself or attach itself to other executable codes
– Most of computer viruses have their latency period.
– Attack programs or data on your hard drive on a specific day when conditions has been fulfilled.
![Page 4: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/4.jpg)
More about Virus…..
• A virus is a small piece of software that piggybacks on real programs.
• Computer viruses are called viruses because they share some of the same traits of biological viruses.
![Page 5: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/5.jpg)
Who write virus and why?
To prove their own theories.– To see if they can do it.– People who are political, religionary
ardor.– People usually publish their virus
source codes in BBSes or the Internet for users who are interested in computer virus programming.
–Most of them belong to specific organizations
![Page 6: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/6.jpg)
Difference between a worm and a virus
• Virus– Usually small size programs ( 3-30k )– Designed to evade detection
•Worm– Sends itself to other systems– Bigger in size than virus– Not easy to write
![Page 7: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/7.jpg)
From where does these virus spread?
•Medium– Hard disk , Floppy disks , Tape– Optical media– Memory
• Internet– E-mail attachments– .exe .bat .vbs
• Research : One in every five hundred e-mail messages contain a virus.
![Page 8: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/8.jpg)
Kinds of virus
![Page 9: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/9.jpg)
![Page 10: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/10.jpg)
Memory Resident Virus
Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed
• Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc.
• Examples: Randex, CMJ, Meve, and MrKlunky
• Protection: Install an antivirus program.
![Page 11: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/11.jpg)
Direct Action Viruses
Hideout: The viruses keep changing their location into new files whenever the code is executed, but are generally found in the hard disk's root directory.
• Target: It can corrupt files.• Examples: Vienna virus• Protection: Install an antivirus scanner.
![Page 12: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/12.jpg)
Overwrite Viruses
Hideout: The virus replaces the file content. However, it does not change the file size.
• Examples: Way, Trj.Reboot, Trivial.88.D
• Protection: The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
![Page 13: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/13.jpg)
Boot Sector Virus
• HIdeout: It hides in the memory until DOS accesses the floppy disk, and whichever boot data is accessed, the virus infects it.
• Examples: Polyboot.B, AntiEXE• Protection: Ensure that floppy disks
are write-protected
![Page 14: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/14.jpg)
Macro Virus
Hideout: These hide in documents that are shared via e-mail or networks.Examples: Relax, Melissa. A, Bablas, O97M/Y2Protection: Avoid opening e-mails from unknown senders. Also, disabling macros can help to protect your useful data.
![Page 15: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/15.jpg)
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.Examples: Elkern, Marburg, Satan Bug and Tureen.Protection: Install a high-end antivirus as the normal ones are incapable of detecting this type of virus.
![Page 16: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/16.jpg)
FAT Virus
Hideout FAT virus attacks the FAT section and may damage crucial information. It can be especially dangerous as it prevents access to certain sections of the disk where important files are stored. Examples: Link VirusProtection: Before the virus attacks all the files on the computer, locate all the files that are actually needed on the hard drive, and then delete the ones that are not needed.
![Page 17: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/17.jpg)
Multipartite Virus
Hideout: In the initial phase, these viruses tend to hide in the memory as the resident viruses do; then they infect the hard disk.Examples: Invader, Flip and TequilaProtection: You need to clean the boot sector and also the disk to get rid of the virus, and then reload all the data in it.
![Page 18: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/18.jpg)
Trojans
• Trojans In fact, it is a program which disguises itself as a useful program or application.
▶ Beware of the fact that these viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it.
![Page 19: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/19.jpg)
2014's Worst Viruses
! Flame: It is said to be the first of its kind that uses Bluetooth as the spread medium. It was first detected in a Russian lab.
! Belgian Computer Crime Virus: This virus spread globally and asked the users for some vital information and a processing fee, claiming that it was for police records.
! Shamoon: This virus is dangerous as it creates files of the data on your hard disk, and then this compiled data is sent to the attacker.
![Page 20: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/20.jpg)
![Page 21: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/21.jpg)
![Page 22: Computer viruses - A daily harm](https://reader030.fdocuments.us/reader030/viewer/2022032506/55ce30babb61eb291c8b46f2/html5/thumbnails/22.jpg)