SlideShare una empresa de Scribd logo
1 de 25
iruses        orms

          rojans



& and Other Info-Tech Diseas
               by: Rafeth Ahmed
                    Nitish Baghla
table of content
1. Computer abuse                      4. Trojan horses, worms
    a) What is computer abuse…             a) Worms
                                           b) Trojan Horses
2. Spam
    a) What is spam?                   5. Summary and conclusions
    b) How does spam work?
    c) How’d they get my email?        6. References
    d) Spam prevention

3. Viruses
    a) Computer Viruses
    b) History of viruses
    c) History of virus continued…
    d) Types of viruses
    e) Virus effects…
    f) Virus process and cycle
    g) Top 10 virus attacks and cost
    h) Virus prevention
    i) Why do we have viruses?
Is This Computer
abuse?



                                 1
 or is it more like this?




                             2
abuse…
"The unauthorized use of, or access to, a computer for
purposes contrary to the wishes of the owner of the computer
or the data held thereon.” 3

Such as:
   Hacking
   Pornography
   Viruses
spam ?
         no…

           …not…

               … this kind




    4
?
 Spam is all those unwanted advertisement of a company
 or their products distributed online.
 Most spams are delivered via emails.

 To avoid being spammed companies do have filters, but
 the best we can do is just ignore the emails and delete
 them.
                                                     5
how does
spam work ?

              Filter                                          Bypass



Paid E-mail
                       Junk Mail                     Humans            Spam


                         Spam


               Phishing            Commercial Advertising
how’d they get
my e-mail ?

   6          7




                  8




          9
spam prevention
 Don’t give out email addresses to unreliable sources
Spam protection in your computer (most email services
provide spam filtering)
Read carefully when filling out online forms requesting your
e-mail address, and exercise your choice.
Use multiple e-mail addresses.
Short e-mail addresses are easy to guess, and may receive
more spam.
Spam protection from your ISP
12




     11




10
computer virus
  To be defined as a virus, a     Virus Components:
  program must:                   The Replication mechanism
 Replicate itself in order to     allows virus to copy itself
  carry out a mission.
 Create damage to the
                                  The Protection mechanism
  computer system "infected".      Hides virus from detection

                                  The Trigger
  Or A virus is a program which    Mechanism which will set off
  reproduces itself, hides in       the payload
  other computer code without
  permission and does nasty or    The Payload
  undesirable things, not          Effect of the virus
  intended by its victim.                                    13
viruses…
 Technically, the concept of a     The first virus “in the wild,”
  computer virus was first           as they say, infected Apple
  imagined in 1949, well             II floppy disk in 1981. Its
  before computers became            name was” Elk Cloner”. all it
  commonplace.                       did was display a short
 Von Neumann used his               rhyme onscreen:
  theories in the 1950s, at Bell
  Labs.                              “It will get on all your disks
                                     It will infiltrate your chips
                                     Yes it’s Cloner!
                                     It will stick to you like glue
                                     It will modify ram too
                                     Send in the Cloner!”       14
viruses
  continued…
 in 1983 when Fred Cohen, demonstrates a computer virus
  during a security seminar at Lehigh University in
  Pennsylvania.
 In 1986, the Brain virus became the first documented file
  infector virus for MS-DOS computers
                                                      15
types of viruses
Boot Viruses
 Infect the boot block on a floppy or hard disk


File Viruses
 Infect .EXE or .COM files


Multi-partite Viruses
 Infect both boot blocks and executable files.


Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or disk.


Meta Viruses
 First viruses to infect data files and to work on multiple
  platforms.                                                        13
virus effects…
 Trivial, simply reproduces or displays messages.
 Minor, alters or deletes infected files.
 Moderate, wipes out entire disk drive.
 Major, slowly corrupts data with pattern, making restoration
  difficult.
 Severe, slowly corrupts data without pattern, making
  restoration impossible.
 Unlimited, virus which discovers system administrator's
  password and mails it to one or more users, tempting them to
  use it for illegal purposes


                                                                 13
and cycle
                   Virus Process




              16




Virus Cycle
                                   16
top 10 virus
attacks and cost…
Rate Name          Year          Cost ($ Million)
1    Morris               1998                 10 – 100
2    Melissa              1999                 60 – 100
3    Love Letter          2000                      5.5
4    Code Red             2001                      2.6
5    Nimda                2001                      635
6    SQL Slammer          2003               750 – 1000
7    MS Blaster           2003                100 – 150
8    MyDoom               2004                      250
9    Sasser               2004                      120
10   Witty                2004                  10 – 30
                                                    17
prevention
 …
There are plenty of companies
dedicated in preventing viruses
from infecting our computers.
They are known as antiviruses or
computer security systems
                                        19
    Such as…




                         18
                                   20
why do we have
viruses?
 Why are there so many
  new viruses? Is it because
  some troll is making it for
  fun? Or is it…


 Because antivirus
  companies are creating
  new ones so we are bound      21


  to buy their products?
worms

    22
         no…
                                 23
           …not…

               … these kinds ?
worms
 A worm is a program that scans a company’s network, or the
  Internet, for another computer that has a specific security hole. It
  copies itself to the new machine (through the security hole),
  Understanding Computer Viruses then starts replicating itself there.


 Worms replicate themselves very quickly; a network infected with a
  worm can be brought to its knees within a matter of hours. Worms
  don’t even have to be delivered via conventional programs; so-called
  “fileless” worms are recent additions to the virus scene. While in
  operation, these programs exist only in system memory, making
  them harder to identify than conventional file-hosted worms.

                                                                 16
trojan horse
 A Trojan horse is a program that claims to do one thing but then
  does something totally different. A typical Trojan horse has a
  filename that makes you think it’s a harmless type of file; it looks
  innocuous enough to be safe to open. But when you run the file, it’s
  actually a virus program that proceeds to inflict its damage on your
  system.


 It delivers its payload through deception, just like the fabled Trojan
  horse of yore. Trojan horses are becoming more common, primarily
  through the spread of Internet-based e-mail. These e-mail Trojans
  spread as innocent-looking attachments to e-mail messages; when
  you click to open the attachment, you launch the virus.
                                                                   16
conclusion
 Well most people believe that all computer threats are due to a
  virus, but now we know that there are a lot of different threats
  beside viruses
 Such as there are spams, trojans, worms,
 From spams we know there are different sorts, such as phishing
 Back to viruses we learnt a little bit of what it does such as how it
  infects our computer system and destroys it slowly.
1.
2.
3.
      references
      http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg
      http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related
      http://www.cyberagentsinc.com/computer_abuse.htm
4.    http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg
5.    http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html
6.    http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname--
      amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg
7.    http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg
8.    http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg
9.    http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg
10.   http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg
11.   http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG
12.   http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_
      3199745-computer-virus.jpg
13.   http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html
14.   http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf
15.   http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/
16.   http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html
17.   http://www.itsecurity.com/features/10-worst-virus-attacks-111207/
18.   http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg
19.   http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg-
      D4/s1600/norton-360.gif
20.   http://custompc.ca/files/2009/06/press_logo_avg.jpg
21.   http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg
22.   http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg
23.   http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg
24.   http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
thank you
    are there
    any
    question ?
   24

Más contenido relacionado

La actualidad más candente

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Metasploit
MetasploitMetasploit
Metasploithenelpj
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 

La actualidad más candente (20)

Ransomware
RansomwareRansomware
Ransomware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
Malware
MalwareMalware
Malware
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Spyware
SpywareSpyware
Spyware
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Metasploit
MetasploitMetasploit
Metasploit
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Destacado

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sectorsikander kushwaha
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sectorArpan Mahato
 

Destacado (20)

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus
VirusVirus
Virus
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sector
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sector
 

Similar a Virus worm trojan (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
virus
virusvirus
virus
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Malware
MalwareMalware
Malware
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Virus worm trojan

  • 1. iruses orms rojans & and Other Info-Tech Diseas by: Rafeth Ahmed Nitish Baghla
  • 2. table of content 1. Computer abuse 4. Trojan horses, worms a) What is computer abuse… a) Worms b) Trojan Horses 2. Spam a) What is spam? 5. Summary and conclusions b) How does spam work? c) How’d they get my email? 6. References d) Spam prevention 3. Viruses a) Computer Viruses b) History of viruses c) History of virus continued… d) Types of viruses e) Virus effects… f) Virus process and cycle g) Top 10 virus attacks and cost h) Virus prevention i) Why do we have viruses?
  • 3. Is This Computer abuse? 1  or is it more like this? 2
  • 4. abuse… "The unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer or the data held thereon.” 3 Such as:  Hacking  Pornography  Viruses
  • 5. spam ? no… …not… … this kind 4
  • 6. ?  Spam is all those unwanted advertisement of a company or their products distributed online.  Most spams are delivered via emails.  To avoid being spammed companies do have filters, but the best we can do is just ignore the emails and delete them. 5
  • 7. how does spam work ? Filter Bypass Paid E-mail Junk Mail Humans Spam Spam Phishing Commercial Advertising
  • 8. how’d they get my e-mail ? 6 7 8 9
  • 9. spam prevention  Don’t give out email addresses to unreliable sources Spam protection in your computer (most email services provide spam filtering) Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. Use multiple e-mail addresses. Short e-mail addresses are easy to guess, and may receive more spam. Spam protection from your ISP
  • 10. 12 11 10
  • 11. computer virus To be defined as a virus, a Virus Components: program must: The Replication mechanism  Replicate itself in order to  allows virus to copy itself carry out a mission.  Create damage to the The Protection mechanism computer system "infected".  Hides virus from detection The Trigger Or A virus is a program which  Mechanism which will set off reproduces itself, hides in the payload other computer code without permission and does nasty or The Payload undesirable things, not  Effect of the virus intended by its victim. 13
  • 12. viruses…  Technically, the concept of a  The first virus “in the wild,” computer virus was first as they say, infected Apple imagined in 1949, well II floppy disk in 1981. Its before computers became name was” Elk Cloner”. all it commonplace. did was display a short  Von Neumann used his rhyme onscreen: theories in the 1950s, at Bell Labs. “It will get on all your disks It will infiltrate your chips Yes it’s Cloner! It will stick to you like glue It will modify ram too Send in the Cloner!” 14
  • 13. viruses continued…  in 1983 when Fred Cohen, demonstrates a computer virus during a security seminar at Lehigh University in Pennsylvania.  In 1986, the Brain virus became the first documented file infector virus for MS-DOS computers 15
  • 14. types of viruses Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk. Meta Viruses  First viruses to infect data files and to work on multiple platforms. 13
  • 15. virus effects…  Trivial, simply reproduces or displays messages.  Minor, alters or deletes infected files.  Moderate, wipes out entire disk drive.  Major, slowly corrupts data with pattern, making restoration difficult.  Severe, slowly corrupts data without pattern, making restoration impossible.  Unlimited, virus which discovers system administrator's password and mails it to one or more users, tempting them to use it for illegal purposes 13
  • 16. and cycle Virus Process 16 Virus Cycle 16
  • 17. top 10 virus attacks and cost… Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30 17
  • 18. prevention … There are plenty of companies dedicated in preventing viruses from infecting our computers. They are known as antiviruses or computer security systems 19 Such as… 18 20
  • 19. why do we have viruses?  Why are there so many new viruses? Is it because some troll is making it for fun? Or is it…  Because antivirus companies are creating new ones so we are bound 21 to buy their products?
  • 20. worms 22 no… 23 …not… … these kinds ?
  • 21. worms  A worm is a program that scans a company’s network, or the Internet, for another computer that has a specific security hole. It copies itself to the new machine (through the security hole), Understanding Computer Viruses then starts replicating itself there.  Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours. Worms don’t even have to be delivered via conventional programs; so-called “fileless” worms are recent additions to the virus scene. While in operation, these programs exist only in system memory, making them harder to identify than conventional file-hosted worms. 16
  • 22. trojan horse  A Trojan horse is a program that claims to do one thing but then does something totally different. A typical Trojan horse has a filename that makes you think it’s a harmless type of file; it looks innocuous enough to be safe to open. But when you run the file, it’s actually a virus program that proceeds to inflict its damage on your system.  It delivers its payload through deception, just like the fabled Trojan horse of yore. Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. 16
  • 23. conclusion  Well most people believe that all computer threats are due to a virus, but now we know that there are a lot of different threats beside viruses  Such as there are spams, trojans, worms,  From spams we know there are different sorts, such as phishing  Back to viruses we learnt a little bit of what it does such as how it infects our computer system and destroys it slowly.
  • 24. 1. 2. 3. references http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related http://www.cyberagentsinc.com/computer_abuse.htm 4. http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg 5. http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html 6. http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname-- amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg 7. http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg 8. http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg 9. http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg 10. http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg 11. http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG 12. http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_ 3199745-computer-virus.jpg 13. http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html 14. http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf 15. http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/ 16. http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html 17. http://www.itsecurity.com/features/10-worst-virus-attacks-111207/ 18. http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg 19. http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg- D4/s1600/norton-360.gif 20. http://custompc.ca/files/2009/06/press_logo_avg.jpg 21. http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg 22. http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg 23. http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg 24. http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
  • 25. thank you are there any question ? 24