Top Banner
COMPUTER VIRUSES AND RELATED THREATS Presented by :- Dharmesh Kumar Sharma B.Tech (C.S.E) 1348610004 Submitted to :- Mr. Shivendra Pratap Sin Asst. Professor (C.S.E)
48

Viruses andthreats@dharmesh

Jan 21, 2018

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Viruses andthreats@dharmesh

COMPUTER VIRUSES AND RELATED THREATS

Presented by:-

Dharmesh Kumar Sharma

B.Tech (C.S.E)

1348610004

Submitted to:-Mr. Shivendra Pratap SinghAsst. Professor (C.S.E)

Page 2: Viruses andthreats@dharmesh

WELCOMETO The 21st Century...

Malware Rules The Environment Of Computer System

Page 3: Viruses andthreats@dharmesh

We Are The Devils Of Your Computer System

Page 4: Viruses andthreats@dharmesh

Flow of Presentation● What is Malware?

● Types of Malwares

● Virus Introduction

● Symptoms

● How does virus spread?

● Types of Computer Viruses

● Prevention and Cure

● Antivirus Software

● How antivirus works?

● Conclusion

● References

Page 5: Viruses andthreats@dharmesh

What Is Malware?● Malware is a software designed to harm or secretly

access a computer system without the owner's informed consent.

● Malware, short for malicious software,also known as pestware.

● In general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

Page 6: Viruses andthreats@dharmesh

Types Of Malwares

● Virus● Trojan Horse● Spyware● Worms● Trapdoor● Crimeware

Page 7: Viruses andthreats@dharmesh
Page 8: Viruses andthreats@dharmesh

Lets Int roduce The Common Ones. . .

Page 9: Viruses andthreats@dharmesh

VIRUS:● Computer viruses are a type of

software program that, like a biological virus, reproduces and spreads itself.

● Some virus may display only a message on the screen, others may slow down the Pc

● They can also erase files or even format your floppy or hard disk and crash the system

Page 10: Viruses andthreats@dharmesh

VIRUS:● A computer virus is a small program written to alter the way

a computer operates, without the permission or knowledge of the user. With an ability to replicate itself, thus continuing to spread. Also, known as Malicious Software, a program that can cause damage to a computer.

● The computer viruses can damage or corrupt data, modify existing data, or degrade the performance of the system by utilizing resources such as memory or disk space. It may spread over a network (internet), carried it on a removable medium such as a Floppy disk, CD/DVD Drive, USB Drive.

Page 11: Viruses andthreats@dharmesh

Why termed as Virus? They are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person

• Need a host for residence.• Capable of self-replicate.• Cause damage to host.

Page 12: Viruses andthreats@dharmesh

● Symptoms:

● The hard disk runs out of space.●

● The computer does not boot.●

● The computer system becomes slow.●

● Display unwanted messages.●

Page 13: Viruses andthreats@dharmesh

How does Virus spread?

● Computer viruses spread by attaching themselves to other computer program files

● When you exchange a file or pen drive with a virus, the virus spreads from one computer to the another

Ø Downloadable Programs

Ø Cracked Software

Ø Email Attachments

Ø Internet

Ø Booting From CD

Page 14: Viruses andthreats@dharmesh

The virus waits until user transmits the infected object to another computer

User transmits an infected object to another computer

The virus locates and infects suitable objects on the new computer

A typical lifecycle of a computer virusA typical lifecycle of a computer virus

Page 15: Viruses andthreats@dharmesh

Classification of Computer viruses:

•Boot sector virus••Master Boot Record (MBR) virus••File infector virus

•Macro virus

Page 16: Viruses andthreats@dharmesh

BOOT SECTOR VIRUS:

• Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard drive.

• It attaches itself to the primary active partition of the hard disk that is read by the computer upon boot up.

MASTER BOOT RECORD VIRUS:

● MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. However it, infects the MBR of the system, gets activated when the BIOS activates the Master boot code.

● MBR infectors normally save a legitimate copy of the master boot record in an different location.

Page 17: Viruses andthreats@dharmesh

File Infector Virus:

• File Infector viruses infect program files. • Normally infect executable code, such as .com, .sys, .bat

and .exe files. • They can infect other files when an infected program is run

from floppy, hard drive, or from the network. • Many of these viruses are memory resident. After memory

becomes infected, any uninfected executable file that runs becomes infected.

E.g. Snow.A, Jerusalem, Cascade.

Page 18: Viruses andthreats@dharmesh

Macro Virus:

• Macro are mini-programs which make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

• Macro viruses infect files that are created using certain applications or programs that contain macros.

• They are platform-independent since the virus itself are written in language of the application and not the operating system.

• They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files.

E.g.W97M.Melissa,Bablas,WM.NiceDay,W97M.Groov.

Page 19: Viruses andthreats@dharmesh

Other Threats are:-

Page 20: Viruses andthreats@dharmesh

Trojan Horse:●

● Trojan horses are impostors that claim to be something desirable but, in fact, are malicious. Trojan horse programs do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data.

E.g. Trojan.Vundo● Retrieving user’s critical information. i.e. name, password.● Erasing or overwriting data on a computer.● Spying on a user to gather his information like browsing habits, sites

visited etc.

Page 21: Viruses andthreats@dharmesh
Page 22: Viruses andthreats@dharmesh

WORMS:

● Worms are programs that replicate themselves from system to system without the use of a host file. The worms are spread through networks like LAN, WAN and also through Internet. There are various ways by which a worm spreads, through Internet like E-mails, Messaging and Chats.

● Worms almost always cause harm to the network, like consuming network bandwidth.

E.g.W32.Mydoom.AX@mm

Page 23: Viruses andthreats@dharmesh

Logical Bomb:●

● A logical bomb is a destructive program that performs an activity when a certain action has occurred.

● Examples of conditions that can be used as triggers for a logic bomb are the presence or absence of certain files, a particular day of the week or date or a particular user running the application.

● Once triggered, a bomb may alter or delete data or entire files, cause a machine halt or some other damage.

Page 24: Viruses andthreats@dharmesh

Trapdoor:● A Trapdoor or Backdoor is a secret means of

access to a computer program that bypasses security mechanisms.

● Sometimes these entries are left by system designers or maintenance staff for troubleshooting or other purposes.

● Whether installed as an administrative tool or a means of attack, a trapdoor is a security risk when unscrupulous programmers use them to gain unauthorized access.

Page 25: Viruses andthreats@dharmesh

SPYWARE:It is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer.

ADWARE:It is any software package which automatically plays, displays, or downloads advertisements to a computer. It is a type of malware which steals information. Example Bonzi Buddy, an application marketed as an "Intelligent Software Agent", corrupted many of the user's system files, forcing the display of many obscene advertisements.

Page 26: Viruses andthreats@dharmesh

Dexter:● It is computer virus or Point of Sale (PoS)

malware which infects computers running MS-Windows and was discovered by IT security from Seculert in DEC 2012.

● It infects PoS systems worldwide and steals sensitive information such as credit card and debit card information.

Page 27: Viruses andthreats@dharmesh

Prevention and Cure:

● Install an Antivirus software

● Regularly update the program

● Open email attachment files only if you are expecting the attached files, or the sender is known and has confirmed sending the file

● Try to avoid downloading and installing software from the Internet

● Install only registered copies of software on the system

Page 28: Viruses andthreats@dharmesh

Your Time Is Up, My Time Is Now....

Page 29: Viruses andthreats@dharmesh

We Are The Angels Of Your Computer System. We Protect Your System Round The Clock

Page 30: Viruses andthreats@dharmesh

What is Antivirus Software?

● Computer programs intended to Identify and Eliminate Computer Viruses.

● Antivirus program runs in the Random Accesses Memory of a computer.

Page 31: Viruses andthreats@dharmesh

ANTIVIRUS

An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks.

We should regularly run an antivirus program to scanand remove any possible virus attacks from a computer.

Page 32: Viruses andthreats@dharmesh

Anti-spyware

• They can provide real time protection against the installation of spywares on the computer. This type of spyware protection works the same way as that of anti-virus protection. It scans and blocks all incoming network threats as it comes across.

•• It can be used solely for detection and removal of

spyware that has already been installed into the computer. Anti-spyware scans the contents of the windows registry, operating system files, and installed programs on the computer and will provide a list of any threats found.

Page 33: Viruses andthreats@dharmesh

How An Antivirus Works...

Using dictionary Approach:

•The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.

•A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.

Page 34: Viruses andthreats@dharmesh

METHODS OF DETECTING THE VIRUS METHODS OF DETECTING THE VIRUS BY ANTI-VIRUS:BY ANTI-VIRUS:

Signature-Based Detection-Compare the contents of a file to a dictionary of virus.

v

Page 35: Viruses andthreats@dharmesh

Using Suspicious Behavior Approach:

•Antivirus software will constantly monitors the activity of all the programs.••If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus.••The advantage of this approach is that it can safeguard the computer against unknown viruses also.••The disadvantage is that it may create several false alerts too.

Page 36: Viruses andthreats@dharmesh

METHODS OF DETECTING METHODS OF DETECTING THE VIRUS BY ANTI-VIRUSTHE VIRUS BY ANTI-VIRUS

Behavior - Based Detection:● Observe how the program

execute in the computer Rather than looking for signature .

● Check the suspicious file and show warnings to the user.

1.

v

Page 37: Viruses andthreats@dharmesh

METHODS OF DETECTING THE METHODS OF DETECTING THE VIRUS BY ANTI-VIRUS VIRUS BY ANTI-VIRUS

Heuristic -Based Detection:

● Detect and remove all threats.

● Create a generic signature.

Page 38: Viruses andthreats@dharmesh

Virus Updates

Providing regular updates for the virus dictionary.An antivirus program should provide free virus updates on a periodic basis.

With the current outburst in macro and script-based viruses, virus updates that address the latest threats are essential.

Most commercial antivirus software in today’s scenario provide virus updates on daily basis.

Page 39: Viruses andthreats@dharmesh

What to do on Suspecting Virus attack?

•Disconnect the suspected computer system from the Internet as well as from the Local Network.••Start the system in Safe Mode or from the Windows boot disk, if it displays any problem in starting.••Take backup of all crucial data to an external drive.••Install antivirus software if you do not have it installed.••Now, download the latest virus definitions updates from the internet.••Perform a full system scan.

Page 40: Viruses andthreats@dharmesh

Virus found!!

•Repair•Quarantine•Delete•Rename•Ignore

Page 41: Viruses andthreats@dharmesh
Page 42: Viruses andthreats@dharmesh
Page 43: Viruses andthreats@dharmesh

Popular Anti-Virus And Anti-Spyware Softwares

Page 44: Viruses andthreats@dharmesh

Anti-Virus & Anti-Spyware Is The Bodyguard Of Your System It Is Us Who Rules, Not Malwares

Say No To

Page 45: Viruses andthreats@dharmesh

Conclusion● There are lots of viruses in the world and new viruses are

coming everyday. There are new antivirus programs and techniques developed too. It is good to be aware of viruses and other malwares and it is cheaper to protect your environment from rather being sorry.

● For better and safe computation anti-virus software should be installed and be help full for global network system freely.

Page 46: Viruses andthreats@dharmesh

References:● Wikipedia● Norton.com● Webopedia● Cryptography and Network Security by

Tanenboum.●

Page 47: Viruses andthreats@dharmesh

ANY Query

Page 48: Viruses andthreats@dharmesh