Cruda, mayday pp tx 2

33
Advance Computer Skills Computer VIRUS Module By: Mayday R Cruda

description

my presentation during 6.09

Transcript of Cruda, mayday pp tx 2

Page 1: Cruda, mayday pp tx 2

Advance Computer

Skills

Computer VIRUSModule

By: Mayday R Cruda

Page 2: Cruda, mayday pp tx 2

Objectives

• Name some Computer Virus

• List different attacks of computer viruses

Page 3: Cruda, mayday pp tx 2

HISTORYOF

COMPUTERVIRUS

Page 4: Cruda, mayday pp tx 2

1966 70’s 80’s 90’s 2000

Johnvon Newman

RABBITFork Bomb

CreeperANIMAL

ELK cloner

BRAINBoot sector

Ping Pong

Morris Ghostball

Melissa

LOVE BUG

Anna Kournikova

CODE RED

Netsky and Sasser

Storm worm

Page 5: Cruda, mayday pp tx 2

COMPUTER VIRUS

Page 6: Cruda, mayday pp tx 2
Page 7: Cruda, mayday pp tx 2

Program that spread,replicateandInterferes computer operation

Page 8: Cruda, mayday pp tx 2

How does it

AFFECTComputers?

Page 9: Cruda, mayday pp tx 2

Viruses can

• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable

Page 10: Cruda, mayday pp tx 2

Viruses behave in different ways

• Hide in the system• Replace files• Replicate files• Delete files• Run programs• Send files and info• Deny access• Reboot computers• Clog your memory

Page 11: Cruda, mayday pp tx 2

How virus spreads

Page 12: Cruda, mayday pp tx 2

Email attachmentsRogue WebsitesNetworksInfected storage disksInfected SoftwareFake Anti Virus SoftwarePirated programsFrom Mobile Devices

Page 13: Cruda, mayday pp tx 2

Different types of

Computer Virus

Page 14: Cruda, mayday pp tx 2

• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus

• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits

Page 15: Cruda, mayday pp tx 2

• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus

• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits

Page 16: Cruda, mayday pp tx 2

OVERWRITE VIRUS

deletes information contained in the files that it infects and sometimes reboot the system

EX. WayTrj.RebootTrivial.88.D

DAMAGE: files may be partially or totally useless

Page 17: Cruda, mayday pp tx 2

DIRECTORY VIRUS (CLUSTER)changing the path that indicates the location of a file and renaming all

executable to non-executable extensions. When you run the program, you first run the virus

EX. Dir-2 virus (creeping death)

DAMAGE: Once infected, it becomes impossible to locate the original files.

Page 18: Cruda, mayday pp tx 2

FAT virus

Damaged the part of a disk used to store all the information about the location of files, available space, unusable space, etc.FILE ALLOCATION TABLE

Ex. Link Virus

Damage: cause serious damage to computer reformat needed.

Page 19: Cruda, mayday pp tx 2

WEB scripting Virus

originated from websites used for social networking. Attached a link that could lead to other harmful sites.

SymptomsYahoo and Google search will be re-directedHomepage of web browser, desktop background often get

changed automatically

Damage: slow down the performance of the machine

Page 20: Cruda, mayday pp tx 2

Trojans• Disguise as a useful program• steal end-user information (credit card info, banks etc.)

• perform destructive harm on the target computer• download additional computer malware

Took its name From the Greek myth ‘Trojan Horse’ex. Chernobyl virus 1998

Damage: perform destructive features on the computer.

Page 21: Cruda, mayday pp tx 2

Wormsreplicates itself in order to spread to other computerssends out hundreds or thousands of copiescreating a huge devastating effect

Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000 ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages. 10% of all Internet-connected computers were hit.

Damageconsumes too much system memory(or network bandwidth), causing Web servers, network servers and individual computers to stop responding

Page 22: Cruda, mayday pp tx 2

Rootkitallow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlookWorst case:

control your computer and turn it into ‘Zombie’

“secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely”

Page 23: Cruda, mayday pp tx 2

HOW TO COUNTER

COMPUTER VIRUS

Page 24: Cruda, mayday pp tx 2

SCAN EMAIL ATTACHMENTS

Page 25: Cruda, mayday pp tx 2

USE WINDOWS FIREWALL

Page 26: Cruda, mayday pp tx 2

INSTALL A RELIABLE ANTIVIRUS

Page 27: Cruda, mayday pp tx 2

AVOID SUSPICIOS WEBSITE

Page 28: Cruda, mayday pp tx 2

WATCH YOUR DOWNLOADS

Page 29: Cruda, mayday pp tx 2

ANY

Page 30: Cruda, mayday pp tx 2

recap

Page 31: Cruda, mayday pp tx 2

Computer Virus• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus

• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits

Page 32: Cruda, mayday pp tx 2

Viruses can

• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable

Page 33: Cruda, mayday pp tx 2

END