20
Computer Viruses

Computer Viruses. Malware Malicious software Programs designed to infiltrate or damage a computer system without the owner's informed consent. Viruses,

Embed Size (px)

Citation preview

Page 1: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Computer Viruses

Page 2: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

MalwareMalicious softwarePrograms designed to infiltrate or damage a computer system without the owner's informed consent.

Viruses, worms, Trojan horses, adware, spyware

Page 3: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Virus

• A virus is a program that reproduces its own code by attaching itself to other executable files

• The virus code is executed when the infected file is executed.

• Most viruses do their "job" by placing self-replicating code in other programs

Page 4: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

The Life Cycle

• Viruses embed themselves into the code of software

• They are harmless until the infected program is actually started (executed)

Page 5: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Who Writes Viruses- and Why?

• Viruses can be written by anyone • It could include researchers for demonstration

purposes • In some cases, they can be written by

pranksters. • These viruses get passed around and can be

altered by other people.

Page 6: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Are All Computer Viruses Harmful?

• Every computer virus ever written takes up disk space

• Many of them are able to remain in the computer's memory taking control

• Some viruses are written to halt the computer • There are viruses created to deliberately

destroy data on the disk

Page 7: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

What do they do?

• slower processing• decreased memory • a disk drive LED lighting up for no apparent

reason • a screen going blank when you touch a certain

letter on your keyboard • delete data• copy password

Page 8: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

How do you get the virus??

• Viruses are contracted by downloading files from the Internet

• Close to 75% of all viruses are contracted through friendly means

Page 9: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

How do you prevent virus??

Use less popular e-mail clients; virus developers don't target these e-mail clients.

Mac users are less prone to contracting computer viruses (remember virus creators are looking for the highest body count)

Anti-virus software is not a ‘cure all’ Run a virus scan on any executable (.exe) files or

MS Word/Excel Files that are emailed to you

Page 10: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Common Types

• Boot Sector - Stays resident by infecting the boot sector of the computer

• FAT Virus - infects the File Allocation Table of a hard drive, these usually cause a loss of files that are on a hard drive

• Memory viruses - execute and stay resident in memory

Page 11: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Macro viruses - viruses that attach themselves to documents in the form of macros. Usually in Microsoft Word and Microsoft Excel documents

• CMOS viruses - viruses that make themselves resident in the CMOS . These viruses can damage the hardware of the computer

Page 12: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

• Worms - A computer worm is a software program that is designed to copy itself from one computer to another, without human interaction.

• Unlike a computer virus, a worm can copy itself automatically.

• You might have heard of specific computer worms, including the Sasser worm, the Blaster worm, and the Conficker worm.

Page 13: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Trojan Horse - designed to cause damage or do something malicious to a system, but are disguised as something useful.

Unlike viruses, these don't make copies of themselves.

Trojan horses are designed to allow a hacker remote access to a target computer system.

Page 14: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Spyware

• Software that performs certain behaviors, generally without appropriately obtaining your consent first, such as: – Advertising – Collecting personal information – Changing the configuration of your computer

Page 15: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Spam

• Unsolicited e-mail• annoying and time consuming • people have lost money to bogus offers

Page 16: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Phishing• “We suspect an unauthorized transaction on your

account. To ensure that your account is not compromised, please click the link below and confirm your identity.”

• “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”

• “We are updating all email accounts on our mail server. Please click the link below and update your username and password. If you don’t reply within 48 hours your account will be closed”

Page 17: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Hackers

• a hacker is a person who breaks into computers, usually by gaining access to administrative controls

• most hackers are thieves, looking for personal data or bank/ credit card information

Page 18: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

How do hackers gain access to your account?

• worms, viruses and Trojan horse programs make your computer vulnerable to remotely controlled exploits

• Use ’security holes’ through which they can gain entry without much trouble

• use programs that are designed to figure out the passwords to your accounts

• use Brute Force password attacks

Page 19: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

The Bottom Line• To prevent your computer from contracting a

virus, use a virus protection program. • Keep up-dated on what viruses are going

around. • Don't open email that is suspicious or that you

don't recognize the senders name. • Activate firewall• Always back up your files! • If your computer does contract a virus, be

prepared to reformat and start all over again!

Page 20: Computer Viruses. Malware  Malicious software  Programs designed to infiltrate or damage a computer system without the owner's informed consent.  Viruses,

Hopefully, you will not be the victim of a virus or hacker!