SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Computer Viruses and Worms
BY: HARENDRA
Overview
• Introduction
• Definitions
• Virus through the Internet
• Virus Languages
• Background
• Worms
• Trojan Horses
Overview Cont…
• Melissa virus
• I LOVE YOU VIRUS
• CODE RED (WORM)
• SYMPTOMS OF AN INFECTION
• Protection measures
• Conclusion
Introduction
• Computer virus have become today’s headline news
• With the increasing use of the Internet, it has
become easier for virus to spread
• Virus show us loopholes in software
• Most virus are targeted at the MS Windows OS
Virus
Virus : A true virus is capable of self replication
on a machine. It may spread between files or
disks, but the defining character is that it can
recreate itself on it’s own with out traveling to
a new host
Virus through the Internet
• Today almost 87% of all viruses are spread
through the internet
• Transmission time to a new host is relatively
low, on the order of hours to days
• “Latent virus”
Virus Languages
ANSI COBOL
C/C++
Pascal
VBA
Unix Shell Scripts
JavaScript
Basically any language that works on the system
that is the target
Which was the
First Computer
Virus
1. The Creeper Virus occurred in 1971 on
ARPANET was written by Bob Thomas at the
BBN Technologies lab.
2. Elk Cloner was the first personal computer
virus to appear in 1982 written by Richard
Skrenta.
3. Brain The first IBM PC virus created in 1986
by the Farooq Alvi Brothers in Lahore,
Pakistan
Background
• There are estimated 30,000
computer viruses in existence
• Over 300 new ones are created each
month
• First virus was created to show
loopholes in software
E-mail Viruses
• Moves around in e-mail messages
• Usually replicate itself by automatically
mailing itself to dozens of people in the
victim’s email address book.
• Example “MELISSA VIRUS”
• Example “I LOVE YOU VIRUS”
WORMS
• Small piece of software that uses computer
networks and security holes to replicate
itself.
• Copy itself to the new machine using the
security hole and start replicating.
• First worm released on the Internet was called
Morris worm, it was released on Nov 2, 1988.
• Example “CODE RED”
Trojan Horses
• A simple computer program
• It claim to be a game
• Erase your hard disk
• No way to replicate itself.
• Leaks information
• Usually does not reproduce
Hoaxes . . .
Too Good to be True
You receive an e-mail telling you that:
• There is a problem with your PayPal account. Your
personal information is needed to correct it.
• The government has discovered a problem with your
tax records. Your personal information is needed to
correct it.
• You just won a lottery that you didn't even know that
you had entered. Send a handling fee to receive your
winnings.
Melissa Virus (March 1999)
Melissa virus spread in Microsoft Word documents sent
via e-mail.
How it works ?
• Created the virus as word document
• Uploaded to an internet newsgroup
• Anyone who download the document and opened it
would trigger the virus.
• Send friendly email messages to first 50 people in
person’s address book.
Melissa Virus
• Melissa Virus was the fastest spreading virus
ever seen.
• Forced a number of large companies to shut
down their e-mail systems.
I Love You Virus (May,2000)
• Contained a piece of code as an attachment.
• Double Click on the attachment triggered the
code.
• Sent copies of itself to everyone in the victim’s
address book
• Started corrupting files on the victim’s
machine.
Code Red (Worm)
• Code Red made huge headlines in 2001
• It slowed down internet traffic when it began
to replicate itself.
• Each copy of the worm scanned the internet
for Windows NT or Windows 2000 that don’t
have security patch installed.
• Each time it found an unsecured server, the
worm copied itself to that server.
Code Red Worm
Designed to do three things
 Replicate itself for the first 20 days of each
month.
 Replace web pages on infected servers with a
page that declares “Hacked by Chinese”
 Launch a concreted attack on the White
House Web server
Symptoms of Infection
• Programs take longer to load than normal.
• Computer’s hard drive constantly runs out of
free space.
• The floppy disk drive or hard drive runs when
you are not using it.
• New files keep appearing on the system and
you don’t know where it come frm.
Symptoms of Infection Cont..
• Strange sounds or beeping noises come from
the computer.
• Strange graphics are displayed on your
computer monitor.
• Unable to access the hard drive when booting
from the floppy drive.
• Program sizes keep changing.
Protection/Prevention
• Knowledge
• Proper configurations
• Run only necessary programs
• Anti-virus software
Conclusion
• Have seen how viruses show us a loophole in
popular software
• Most viruses show that they can cause great
damage due to loopholes in programming
• Always backup your data.
• Keep up-to-date on new Anti virus software.
• Simply avoid programs from unknown
sources.
Computer viruses

Weitere ähnliche Inhalte

Was ist angesagt?

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Dasun Hegoda
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 

Was ist angesagt? (20)

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Andere mochten auch

Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)Tejas Kolge
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 

Andere mochten auch (10)

Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Viruses
VirusesViruses
Viruses
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 

Ähnlich wie Computer viruses

Ähnlich wie Computer viruses (20)

COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Virus09
Virus09Virus09
Virus09
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 

Mehr von Harendra Singh

Mehr von Harendra Singh (6)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Google glass
Google glassGoogle glass
Google glass
 
Chromebook
ChromebookChromebook
Chromebook
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in C
 
Hacking
Hacking Hacking
Hacking
 
E-learning vs Classroom learning
E-learning vs Classroom learningE-learning vs Classroom learning
E-learning vs Classroom learning
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Computer viruses

  • 1. Computer Viruses and Worms BY: HARENDRA
  • 2. Overview • Introduction • Definitions • Virus through the Internet • Virus Languages • Background • Worms • Trojan Horses
  • 3. Overview Cont… • Melissa virus • I LOVE YOU VIRUS • CODE RED (WORM) • SYMPTOMS OF AN INFECTION • Protection measures • Conclusion
  • 4. Introduction • Computer virus have become today’s headline news • With the increasing use of the Internet, it has become easier for virus to spread • Virus show us loopholes in software • Most virus are targeted at the MS Windows OS
  • 5. Virus Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host
  • 6. Virus through the Internet • Today almost 87% of all viruses are spread through the internet • Transmission time to a new host is relatively low, on the order of hours to days • “Latent virus”
  • 7. Virus Languages ANSI COBOL C/C++ Pascal VBA Unix Shell Scripts JavaScript Basically any language that works on the system that is the target
  • 8. Which was the First Computer Virus
  • 9. 1. The Creeper Virus occurred in 1971 on ARPANET was written by Bob Thomas at the BBN Technologies lab. 2. Elk Cloner was the first personal computer virus to appear in 1982 written by Richard Skrenta. 3. Brain The first IBM PC virus created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan
  • 10. Background • There are estimated 30,000 computer viruses in existence • Over 300 new ones are created each month • First virus was created to show loopholes in software
  • 11. E-mail Viruses • Moves around in e-mail messages • Usually replicate itself by automatically mailing itself to dozens of people in the victim’s email address book. • Example “MELISSA VIRUS” • Example “I LOVE YOU VIRUS”
  • 12. WORMS • Small piece of software that uses computer networks and security holes to replicate itself. • Copy itself to the new machine using the security hole and start replicating. • First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988. • Example “CODE RED”
  • 13. Trojan Horses • A simple computer program • It claim to be a game • Erase your hard disk • No way to replicate itself. • Leaks information • Usually does not reproduce
  • 14. Hoaxes . . . Too Good to be True You receive an e-mail telling you that: • There is a problem with your PayPal account. Your personal information is needed to correct it. • The government has discovered a problem with your tax records. Your personal information is needed to correct it. • You just won a lottery that you didn't even know that you had entered. Send a handling fee to receive your winnings.
  • 15. Melissa Virus (March 1999) Melissa virus spread in Microsoft Word documents sent via e-mail. How it works ? • Created the virus as word document • Uploaded to an internet newsgroup • Anyone who download the document and opened it would trigger the virus. • Send friendly email messages to first 50 people in person’s address book.
  • 16. Melissa Virus • Melissa Virus was the fastest spreading virus ever seen. • Forced a number of large companies to shut down their e-mail systems.
  • 17. I Love You Virus (May,2000) • Contained a piece of code as an attachment. • Double Click on the attachment triggered the code. • Sent copies of itself to everyone in the victim’s address book • Started corrupting files on the victim’s machine.
  • 18. Code Red (Worm) • Code Red made huge headlines in 2001 • It slowed down internet traffic when it began to replicate itself. • Each copy of the worm scanned the internet for Windows NT or Windows 2000 that don’t have security patch installed. • Each time it found an unsecured server, the worm copied itself to that server.
  • 19. Code Red Worm Designed to do three things  Replicate itself for the first 20 days of each month.  Replace web pages on infected servers with a page that declares “Hacked by Chinese”  Launch a concreted attack on the White House Web server
  • 20. Symptoms of Infection • Programs take longer to load than normal. • Computer’s hard drive constantly runs out of free space. • The floppy disk drive or hard drive runs when you are not using it. • New files keep appearing on the system and you don’t know where it come frm.
  • 21. Symptoms of Infection Cont.. • Strange sounds or beeping noises come from the computer. • Strange graphics are displayed on your computer monitor. • Unable to access the hard drive when booting from the floppy drive. • Program sizes keep changing.
  • 22. Protection/Prevention • Knowledge • Proper configurations • Run only necessary programs • Anti-virus software
  • 23. Conclusion • Have seen how viruses show us a loophole in popular software • Most viruses show that they can cause great damage due to loopholes in programming • Always backup your data. • Keep up-to-date on new Anti virus software. • Simply avoid programs from unknown sources.

Hinweis der Redaktion

  1. ARPANET, the scientific/military network that preceded the modern internet.