SlideShare a Scribd company logo
1 of 27
The Computer Malware
By Afeef Imad Khateeb
Palestine Polytechnic University
Date :the 22th of July 2012
Outline
• The malware.
• The effect of the malware.
• Timeline of malwares .
• Main characteristics of malwares.
• Types of malwares.
• Virus classification based on target .
• Detecting the virus
• The antivirus
• who write the viruses
• Stuxnet
• Recommendation
Abstract
• The internet has become a powerful tool for enhancing
innovation and productivity .nevertheless , the increasing
dependency on the internet and other communication network
means that the internet has become a popular and efficient
way to spread the computer viruses and other types of
malicious software or
Malware .
The Malware
What is a malware ?
It is a program that can spread across computers
and network by making copies of itself usually
without the knowledge of the user
The effect of the malwares
1)Slow down email
2)Steal confidential data.
3)Use your computer to attack websites
4)Let other users hijack your computer.
5)And more ………
Timeline of viruses
• 1950-2010
The first virus- at bell lab
The most powerful virus in the 20th century -
Michelangelo virus
The most powerful virus in the 21th century –Stuxnet
The Main Characteristics Of the
Malware
1) self-replication
2) the population of growth.
3) Parasitic malware
Types of viruses
• Logic –bomb
• Trojan horse
• Back door
• Spyware
• Adware
• Virus
Logic bomb
• Logic –bomb:
self replicate :no .
population growth : zero.
parasitic : possibly.
Trojan horse
• Trojan horse :
self replicate :no
population growth : zero
parasitic : yes
Back door
Back door :
self replicate : no.
population growth : zero.
parasitic : possibly.
Example
“”username = read_username()
password = read_password()
if tisername i s "133t h4ck0r":
return ALLOW^LOGIN
if username and password are valid:
return ALLOW_LOGIN
e l s e:
return DENY^LOGIN””
Spyware
• Spyware :
self replicate :No
population growth : Zero
parasitic : No
Attacks
1)Email addresses
2)Username/password
3)Bank account
4)Software licence
Adware
• Adware :
self replicate : No
population of growth: Zero
parasitic : No
This is similar to spyware but it is concentrated ti
advertisement
Viruses
Viruses or (Virii) :
self replicate : yes
population of growth : positive
parasitic : yes
Definitions of viruses
1)Germ
2)Intended
3)Dormant
Virus classification by target
• Boot sector infection
Virus classification by target cont
• File infector
• Macro
How to detect viruses
Command prompt
• The first way is to use the command prompt
• Very easy
• …/cd/windows/system32/setup
The antivirus
• The second way we use is the antivirus
What is the antivirus Definition :
Antivirus is a software that can delete viruses
,prevent access to infected files and often
eliminate the infection.
Types of antivirus of the antivirus
1)Heuristics detection.
2)virus scanners.
A)On-Access.
B)On-Demand.
Three steps the antivirus use
1)Detection: detecting whether or not some code is a
virus or not which is in purest form of detection
results in a Boolean value yes there is a virus- so it is
infected no there is no virus.
2)Identification : once a virus is detected the
identification process may be distinct from detection or
identification may occur as a side effect of detection .
3)Disinfection : is the process of removing detected
viruses this is something called cleaning .
Who write viruses
• If your computer, or your network, is hit by a
virus, the first thing you’re likely to say –
expletives apart – is “Why do people write
these viruses?”
Stuxnet
• Now we will see the video which talks about
stuxnet
1)zero days
2)Iran enrichment facility
3)”Israel” and USA
4) The purpose of Stuxnet
Recommendation and conclusion
I have found that there is no possibility that someone could
prevent himself from malware %100 because every
malware has its own characteristics and works different
than any other malware so the user must take care and pay
attention when using the internet or using any other
peripherals like USB –Flash and also the user must make
sure that an Email is from a known place and also the
websites are famous, chose a good antivirus and make sure
of its updates .
Make a small virus using the notepad
• Now we will make a small virus using the
notepad …….
Questions and answers
References
• 1) John Aycock, Springer, computer viruses and
malware 2006, definition and timeline pp. 11-33
andpp.53-70.
• 2) Cio website for the malware timeline
• http://www.cio.com/article/116250/A_Brief_History_o
f_Malware_and_Cybercrime _(accessed july15, 2012)
• 3) Eric Filio, Springer, computer viruses from theory to
application2005, viruses or worms life cycle, pp.87-90.
• 4) Paul Oldfield, Sophos, viruses and spam what you
need to know, 2004, pp.27-52.

More Related Content

What's hot

The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security LandscapePeter Wood
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networksdtimal
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1Arbab Usmani
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Computer virus
Computer virusComputer virus
Computer virusomroyal
 
Spreading virus
Spreading virusSpreading virus
Spreading virusdixitas
 

What's hot (19)

The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus
VirusVirus
Virus
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
Malware
MalwareMalware
Malware
 
User wareness
User warenessUser wareness
User wareness
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Malwares
MalwaresMalwares
Malwares
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Internet threat
Internet threatInternet threat
Internet threat
 
Senior seminar virus
Senior seminar virusSenior seminar virus
Senior seminar virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 

Similar to Computer Malware Into

Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against RansomwareKevo Meehan
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harmAnubhav125
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Similar to Computer Malware Into (20)

Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
virus
virusvirus
virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
information about virus
information about virusinformation about virus
information about virus
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Malicious
MaliciousMalicious
Malicious
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Computer Malware Into

  • 1. The Computer Malware By Afeef Imad Khateeb Palestine Polytechnic University Date :the 22th of July 2012
  • 2. Outline • The malware. • The effect of the malware. • Timeline of malwares . • Main characteristics of malwares. • Types of malwares. • Virus classification based on target . • Detecting the virus • The antivirus • who write the viruses • Stuxnet • Recommendation
  • 3. Abstract • The internet has become a powerful tool for enhancing innovation and productivity .nevertheless , the increasing dependency on the internet and other communication network means that the internet has become a popular and efficient way to spread the computer viruses and other types of malicious software or Malware .
  • 4. The Malware What is a malware ? It is a program that can spread across computers and network by making copies of itself usually without the knowledge of the user
  • 5. The effect of the malwares 1)Slow down email 2)Steal confidential data. 3)Use your computer to attack websites 4)Let other users hijack your computer. 5)And more ………
  • 6. Timeline of viruses • 1950-2010 The first virus- at bell lab The most powerful virus in the 20th century - Michelangelo virus The most powerful virus in the 21th century –Stuxnet
  • 7. The Main Characteristics Of the Malware 1) self-replication 2) the population of growth. 3) Parasitic malware
  • 8. Types of viruses • Logic –bomb • Trojan horse • Back door • Spyware • Adware • Virus
  • 9. Logic bomb • Logic –bomb: self replicate :no . population growth : zero. parasitic : possibly.
  • 10. Trojan horse • Trojan horse : self replicate :no population growth : zero parasitic : yes
  • 11. Back door Back door : self replicate : no. population growth : zero. parasitic : possibly. Example “”username = read_username() password = read_password() if tisername i s "133t h4ck0r": return ALLOW^LOGIN if username and password are valid: return ALLOW_LOGIN e l s e: return DENY^LOGIN””
  • 12. Spyware • Spyware : self replicate :No population growth : Zero parasitic : No Attacks 1)Email addresses 2)Username/password 3)Bank account 4)Software licence
  • 13. Adware • Adware : self replicate : No population of growth: Zero parasitic : No This is similar to spyware but it is concentrated ti advertisement
  • 14. Viruses Viruses or (Virii) : self replicate : yes population of growth : positive parasitic : yes Definitions of viruses 1)Germ 2)Intended 3)Dormant
  • 15. Virus classification by target • Boot sector infection
  • 16. Virus classification by target cont • File infector • Macro
  • 17. How to detect viruses
  • 18. Command prompt • The first way is to use the command prompt • Very easy • …/cd/windows/system32/setup
  • 19. The antivirus • The second way we use is the antivirus What is the antivirus Definition : Antivirus is a software that can delete viruses ,prevent access to infected files and often eliminate the infection.
  • 20. Types of antivirus of the antivirus 1)Heuristics detection. 2)virus scanners. A)On-Access. B)On-Demand.
  • 21. Three steps the antivirus use 1)Detection: detecting whether or not some code is a virus or not which is in purest form of detection results in a Boolean value yes there is a virus- so it is infected no there is no virus. 2)Identification : once a virus is detected the identification process may be distinct from detection or identification may occur as a side effect of detection . 3)Disinfection : is the process of removing detected viruses this is something called cleaning .
  • 22. Who write viruses • If your computer, or your network, is hit by a virus, the first thing you’re likely to say – expletives apart – is “Why do people write these viruses?”
  • 23. Stuxnet • Now we will see the video which talks about stuxnet 1)zero days 2)Iran enrichment facility 3)”Israel” and USA 4) The purpose of Stuxnet
  • 24. Recommendation and conclusion I have found that there is no possibility that someone could prevent himself from malware %100 because every malware has its own characteristics and works different than any other malware so the user must take care and pay attention when using the internet or using any other peripherals like USB –Flash and also the user must make sure that an Email is from a known place and also the websites are famous, chose a good antivirus and make sure of its updates .
  • 25. Make a small virus using the notepad • Now we will make a small virus using the notepad …….
  • 27. References • 1) John Aycock, Springer, computer viruses and malware 2006, definition and timeline pp. 11-33 andpp.53-70. • 2) Cio website for the malware timeline • http://www.cio.com/article/116250/A_Brief_History_o f_Malware_and_Cybercrime _(accessed july15, 2012) • 3) Eric Filio, Springer, computer viruses from theory to application2005, viruses or worms life cycle, pp.87-90. • 4) Paul Oldfield, Sophos, viruses and spam what you need to know, 2004, pp.27-52.