SlideShare una empresa de Scribd logo
1 de 42
Computer Viruses & Management Strategies

Dasun Hegoda
Software Engineer
What we are going to talk
●

What's Malware

●

Spyware, Adware, Backdoor

●

What's A Computer Virus

●

Why Computer Malware(Virus)

●

How Viruses Are Created

●

How Viruses Are Spread

●

Types Of Malware

●

Types Of Viruses
What we are going to talk
●

How To Detect A Malware(Virus)

●

How To Protect Yourself

●

Top Anti-Virus Programs

●

BuzzWords

●

Bottom Line
Malware Definitions
Malware Definitions
●

●

●

Malware, short for malicious software, is software used to
disrupt computer operation, gather sensitive information,
or gain access to private computer systems.
It can appear in the form of code, scripts, active content,
and other software.
Malware includes computer viruses, ransomware, worms,
trojan horses, rootkits, keyloggers, dialers, spyware,
adware, malicious BHOs, rogue security software and
other malicious programs.
Spyware, Adware, Backdoor
Spyware
●

●

●

●

Spyware is malicious computer program that does exactly what
its name implies Eg:, spies on you.
After downloading itself onto your computer either through an
email you opened, website you visited or a program you
downloaded, spyware scans your hard drive for personal
information and your internet browsing habits.
Some spyware programs contain keyloggers that will record
personal data you enter in to websites, such as your login
usernames and passwords, email addresses, browsing history as
well as sensitive banking and credit information.
Some spyware can interfere with your computer's system
settings, which can result in a slower internet connection.
Adware
●

●

●

Adware is any software that, once installed on your
computer, tracks your internet browsing habits and
sends you popups containing advertisements related to
the sites and topics you've visited.
While this type of software may sound innocent, and
even helpful, it consumes and slows down your
computer's processor and internet connection speed.
Additionally, some adware has keyloggers and spyware
built into the program, leading to greater damage to
your computer and possible invasion of your private
data.
Backdoor
●

●

●

●

A backdoor is a method of bypassing normal
authentication procedures.
Once a system has been compromised one or more
backdoors maybe installed in order to allow easier access
in the future.
Backdoors may also be installed prior to malicious
software, to allow attackers entry.
Crackers typically use backdoors to secure remote access
to a computer, while attempting to remain hidden from
casual inspection.
Computer Virus Definitions
What's A Computer Virus
●

●

A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs, data
files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to
be "infected".
Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space or CPU
time, accessing private information, corrupting data,
displaying political or humorous messages on the user's
screen, spamming their contacts, or logging their
keystrokes.
What's A Computer Virus
●

●

●

The defining characteristic of viruses is that they are
self-replicating computer programs which install
themselves without the user's consent.
Virus writers use social engineering and exploit detailed
knowledge of security vulnerabilities to gain access to
their hosts' computing resources.
The vast majority of viruses (over 99%) target systems
running Microsoft Windows, employing a variety of
mechanisms to infect new hosts, and often using
complex anti-detection/stealth strategies to evade
antivirus software.
World 1st Computer Virus
●

●

The first ever computer virus was developed in 1986 by
two Pakistani brothers in Lahore Pakistan.
It was named “Brain” and was designed by Amjad
Farooq Alvi and Basit Farooq Alvi with the intention of
discouraging the piracy of a software written by them.
Why Computer Malware(Virus)
Why Computer Malware(Virus)
●

Seeking profit

●

Desire to send a political message

●

Personal amusement

●

To demonstrate that a vulnerability exists in software

●

For sabotage and denial of service

●

To explore evolutionary algorithms

●

Cause systems failures.

●

Steal information.

●

To prove a point, to prove it can be done, to prove ones
skill or for revenge purposes.
How Viruses Are Created
How Viruses Are Created
●

●

●

●

The first step is that someone will create the virus.
The 2nd step is to pick out the program that the person
wants to attach to.
The 3rd step is attaching the virus to the program.
The 4th step is to try to lure or advertise the program,
so someone will download it in to your computer.

●

The 5th step is to have the virus get in to the computer.

●

The 6th step is to infect the computer.

●

The 7th step is to destroy all of the files on the
computer & more.
How Viruses Are Spread
How Viruses Are Spread
●

Email attachments

●

●

Rogue Websites

●

●

Networks

Instant Messaging
Fake Anti Virus
Software

Infected Boot Disks

●

From Mobile Devices

●

Phishing Schemes

●

Friends and Relatives

●

Infected Software

●

Hackers

●
Types Of Malware
Types Of Malware
●

●

Trojan horses : A Trojan horse is simply a computer
program. The program claims to do one thing (it may
claim to be a game) but instead does damage when
you run it (it may erase your hard disk). Trojan horses
have no way to replicate automatically.
Worms : A worm is a small piece of software that uses
computer networks and security holes to replicate itself.
A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself
to the new machine using the security hole, and then
starts replicating from there, as well.
Types Of Malware

●

Viruses : A virus is a small piece of software that
piggybacks on real programs. For example, a virus
might attach itself to a program such as a spreadsheet
program. Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to reproduce (by
attaching to other programs).
Types Of Malware

●

E-mail viruses : An e-mail virus travels as an
attachment to e- mail messages, and usually replicates
itself by automatically mailing itself to dozens of people
in the victim's e-mail address book. Some e-mail
viruses don't even require a double-click -- they launch
when you view the infected message in the preview
pane of your e-mail software
Types Of Viruses
Types Of Viruses
●

Boot Sector Virus

●

Browser Hijacker

●

Direct Action Virus

●

File Infector Virus

●

Macro Virus

●

Multipartite Virus

●

Polymorphic Virus

●

Resident Virus

●

Web Scripting Virus
How To Detect A Virus
How To Detect A Malware(Virus)?
●

Programs takes longer to load.

●

The programs sizes keep changing.

●

The drive light keeps flashing when you are not doing
anything(Loading).

●

User created files have strange names.

●

The computer doesn't remember CMOS settings.

●

System crashes for no reason.

●

Screen sometimes flicker.

●

Files/directories sometimes disappear.
How To Detect A Malware(Virus)?
●

It might change the power ratings of your computer and
could blast the system.

●

You cannot print items correctly.

●

Disks or disk drives are inaccessible.

●

Applications on the computer do not work correctly.

●

Strange sounds or music plays from the speakers
unexpectedly.

●

Computer restarts every few minutes automatically.

●

…........
How To Protect Yourself
How To Protect Yourself
●

Use Antivirus Programs

●

Use Firewalls

●

Make Passwords Encrypted

●

Scan your PC Daily

●

Switch off net when not using

●

Don’t download software from unknown source

●

Disable Auto run

●

Read reviews before installing software
How To Protect Yourself
●

Download anti-spyware program

●

Don’t open e-mail that you are not sure

●

Keep backups

●

Keep OS up to date

●

Scan removable storages
Top Anti-Virus Programs
Top Anti-Virus Programs
●

Bitdefender Antivirus

●

Kaspersky Anti-Virus

●

Norton AntiVirus

●

F-Secure Anti-Virus

●

AVG Anti-Virus

●

Avast! Pro Antivirus

●

McAfee AntiVirus

●

Panda Antivirus Pro
Buzzwords
FireWalls
●

●

A firewall is a software or hardware-based network
security system that controls the incoming and
outgoing network traffic by analyzing the data packets
and determining whether they should be allowed
through or not, based on applied rule set.
Firewalls can be defined in many ways according to
your level of understanding. A firewall establishes a
barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is not assumed
to be secure and trusted.
FireWalls
Antivirus software
●

●

●

Antivirus, anti-virus, or AV software is computer software used
to prevent, detect and remove malicious computer viruses.
Most software described as antivirus also works against other
types of malware, such as malicious Browser Helper Objects
(BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs,
dialers, fraudtools, adware and spyware.
Computer security, including protection from social
engineering techniques, is commonly offered in products and
services of antivirus software companies.
Boot sector
●

●

A boot sector or boot block is a region of a hard disk,
floppy disk, optical disc, or other data storage device
that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in
firmware.
The purpose of a boot sector is to allow the boot
process of a computer to load a program (usually, but
not necessarily, an operating system) stored on the
same storage device.
Encryption
●

●

●

Encryption is the process of encoding messages (or
information) in such a way that third parties cannot read
it, but only authorized parties can.
Encryption doesn't prevent hacking but it prevents the
hacker from reading the data that is encrypted.
The message or information (referred to as plaintext) is
encrypted using an encryption algorithm, turning it into
an unreadable ciphertext.
That's It!!!
Bottom Line
●

●

Computer viruses currently cause billions of dollars
worth of economic damage each year, due to causing
systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc.
In response, free, open-source anti-virus tools have
been developed, and a multi-billion dollar industry of
anti-virus software vendors has cropped up, selling
virus protection to Windows users. Unfortunately, no
currently existing anti-virus software is able to catch all
computer viruses.
References
●

www.makeuseof.com/tag/types-computer-viruses-watch/

Más contenido relacionado

La actualidad más candente

Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]Akhilajs2
 
Technology in the Teaching Learning Process
Technology in the Teaching Learning ProcessTechnology in the Teaching Learning Process
Technology in the Teaching Learning Processirshad narejo
 
Ethics and Educational Technology
Ethics and Educational TechnologyEthics and Educational Technology
Ethics and Educational TechnologyRobert Farrow
 
ict and constructivism
 ict and constructivism ict and constructivism
ict and constructivismvudeevudee
 
Using ICT tools in teaching and Learning
Using ICT tools in teaching and LearningUsing ICT tools in teaching and Learning
Using ICT tools in teaching and LearningMisheck Mutuzana
 
State institute of educational technology(siet)
State institute of educational technology(siet)State institute of educational technology(siet)
State institute of educational technology(siet)chandni bhagat
 
BED:105: Advanced Pedagogy & Application of ICT - Orientation
BED:105: Advanced Pedagogy & Application of ICT - OrientationBED:105: Advanced Pedagogy & Application of ICT - Orientation
BED:105: Advanced Pedagogy & Application of ICT - OrientationDrVikasSTupsundar
 
science laboratory and planning
science laboratory and planningscience laboratory and planning
science laboratory and planninggoggigupta
 
Unit i aims and objectives of teaching biological science
Unit i         aims and objectives of teaching biological scienceUnit i         aims and objectives of teaching biological science
Unit i aims and objectives of teaching biological scienceDrCShanmugaPriya
 
Approaches of Educational Technology-Hardware, Software and Systems approaches
Approaches of Educational Technology-Hardware, Software and Systems approachesApproaches of Educational Technology-Hardware, Software and Systems approaches
Approaches of Educational Technology-Hardware, Software and Systems approachesSuresh Babu
 
Importance of general science curriculum
Importance of general science curriculumImportance of general science curriculum
Importance of general science curriculumAnkitBhiari
 
Script writing for e-content
Script writing for e-contentScript writing for e-content
Script writing for e-contentVanarajVasanthiRK
 
Open Educational Resources.pptx
Open Educational Resources.pptxOpen Educational Resources.pptx
Open Educational Resources.pptxRamesh K Kuri
 

La actualidad más candente (20)

Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]
 
Technology in the Teaching Learning Process
Technology in the Teaching Learning ProcessTechnology in the Teaching Learning Process
Technology in the Teaching Learning Process
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Mooc ppt
Mooc pptMooc ppt
Mooc ppt
 
Ethics and Educational Technology
Ethics and Educational TechnologyEthics and Educational Technology
Ethics and Educational Technology
 
College Autonomy
College AutonomyCollege Autonomy
College Autonomy
 
ict and constructivism
 ict and constructivism ict and constructivism
ict and constructivism
 
Mobile learning
Mobile learning  Mobile learning
Mobile learning
 
Edusat
EdusatEdusat
Edusat
 
Using ICT tools in teaching and Learning
Using ICT tools in teaching and LearningUsing ICT tools in teaching and Learning
Using ICT tools in teaching and Learning
 
State institute of educational technology(siet)
State institute of educational technology(siet)State institute of educational technology(siet)
State institute of educational technology(siet)
 
BED:105: Advanced Pedagogy & Application of ICT - Orientation
BED:105: Advanced Pedagogy & Application of ICT - OrientationBED:105: Advanced Pedagogy & Application of ICT - Orientation
BED:105: Advanced Pedagogy & Application of ICT - Orientation
 
science laboratory and planning
science laboratory and planningscience laboratory and planning
science laboratory and planning
 
Unit i aims and objectives of teaching biological science
Unit i         aims and objectives of teaching biological scienceUnit i         aims and objectives of teaching biological science
Unit i aims and objectives of teaching biological science
 
Approaches of Educational Technology-Hardware, Software and Systems approaches
Approaches of Educational Technology-Hardware, Software and Systems approachesApproaches of Educational Technology-Hardware, Software and Systems approaches
Approaches of Educational Technology-Hardware, Software and Systems approaches
 
Web based learning
Web based learningWeb based learning
Web based learning
 
Importance of general science curriculum
Importance of general science curriculumImportance of general science curriculum
Importance of general science curriculum
 
Script writing for e-content
Script writing for e-contentScript writing for e-content
Script writing for e-content
 
E content
E contentE content
E content
 
Open Educational Resources.pptx
Open Educational Resources.pptxOpen Educational Resources.pptx
Open Educational Resources.pptx
 

Destacado

風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。Kenichirou Igari
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R LibraryDavid Faris
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahiImran Ismail
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)Vikas Pandey
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy dramatimeclarke94
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...Avalon Media System
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityAvalon Media System
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module Jm Olaybar
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]yatie1977
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement StatisticMark Blessington
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)plamen79
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-CVikas Pandey
 

Destacado (20)

Avalon 2016 Overview
Avalon 2016 OverviewAvalon 2016 Overview
Avalon 2016 Overview
 
風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。
 
Presentasi kk 2
Presentasi kk 2Presentasi kk 2
Presentasi kk 2
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategy
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R Library
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahi
 
Archivo pdf
Archivo pdfArchivo pdf
Archivo pdf
 
Avalon 5.0 and Beyond
Avalon 5.0 and BeyondAvalon 5.0 and Beyond
Avalon 5.0 and Beyond
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module
 
EL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBEREL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBER
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement Statistic
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-C
 
презентация для франчайзи
презентация для франчайзипрезентация для франчайзи
презентация для франчайзи
 

Similar a Computer Viruses & Management Strategies

Similar a Computer Viruses & Management Strategies (20)

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malwares
MalwaresMalwares
Malwares
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Computer Viruses & Management Strategies

  • 1. Computer Viruses & Management Strategies Dasun Hegoda Software Engineer
  • 2. What we are going to talk ● What's Malware ● Spyware, Adware, Backdoor ● What's A Computer Virus ● Why Computer Malware(Virus) ● How Viruses Are Created ● How Viruses Are Spread ● Types Of Malware ● Types Of Viruses
  • 3. What we are going to talk ● How To Detect A Malware(Virus) ● How To Protect Yourself ● Top Anti-Virus Programs ● BuzzWords ● Bottom Line
  • 5. Malware Definitions ● ● ● Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  • 7. Spyware ● ● ● ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information. Some spyware can interfere with your computer's system settings, which can result in a slower internet connection.
  • 8. Adware ● ● ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  • 9. Backdoor ● ● ● ● A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 11. What's A Computer Virus ● ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 12. What's A Computer Virus ● ● ● The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  • 13. World 1st Computer Virus ● ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  • 15. Why Computer Malware(Virus) ● Seeking profit ● Desire to send a political message ● Personal amusement ● To demonstrate that a vulnerability exists in software ● For sabotage and denial of service ● To explore evolutionary algorithms ● Cause systems failures. ● Steal information. ● To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
  • 16. How Viruses Are Created
  • 17. How Viruses Are Created ● ● ● ● The first step is that someone will create the virus. The 2nd step is to pick out the program that the person wants to attach to. The 3rd step is attaching the virus to the program. The 4th step is to try to lure or advertise the program, so someone will download it in to your computer. ● The 5th step is to have the virus get in to the computer. ● The 6th step is to infect the computer. ● The 7th step is to destroy all of the files on the computer & more.
  • 18. How Viruses Are Spread
  • 19. How Viruses Are Spread ● Email attachments ● ● Rogue Websites ● ● Networks Instant Messaging Fake Anti Virus Software Infected Boot Disks ● From Mobile Devices ● Phishing Schemes ● Friends and Relatives ● Infected Software ● Hackers ●
  • 21. Types Of Malware ● ● Trojan horses : A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms : A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 22. Types Of Malware ● Viruses : A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
  • 23. Types Of Malware ● E-mail viruses : An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  • 25. Types Of Viruses ● Boot Sector Virus ● Browser Hijacker ● Direct Action Virus ● File Infector Virus ● Macro Virus ● Multipartite Virus ● Polymorphic Virus ● Resident Virus ● Web Scripting Virus
  • 26. How To Detect A Virus
  • 27. How To Detect A Malware(Virus)? ● Programs takes longer to load. ● The programs sizes keep changing. ● The drive light keeps flashing when you are not doing anything(Loading). ● User created files have strange names. ● The computer doesn't remember CMOS settings. ● System crashes for no reason. ● Screen sometimes flicker. ● Files/directories sometimes disappear.
  • 28. How To Detect A Malware(Virus)? ● It might change the power ratings of your computer and could blast the system. ● You cannot print items correctly. ● Disks or disk drives are inaccessible. ● Applications on the computer do not work correctly. ● Strange sounds or music plays from the speakers unexpectedly. ● Computer restarts every few minutes automatically. ● …........
  • 29. How To Protect Yourself
  • 30. How To Protect Yourself ● Use Antivirus Programs ● Use Firewalls ● Make Passwords Encrypted ● Scan your PC Daily ● Switch off net when not using ● Don’t download software from unknown source ● Disable Auto run ● Read reviews before installing software
  • 31. How To Protect Yourself ● Download anti-spyware program ● Don’t open e-mail that you are not sure ● Keep backups ● Keep OS up to date ● Scan removable storages
  • 33. Top Anti-Virus Programs ● Bitdefender Antivirus ● Kaspersky Anti-Virus ● Norton AntiVirus ● F-Secure Anti-Virus ● AVG Anti-Virus ● Avast! Pro Antivirus ● McAfee AntiVirus ● Panda Antivirus Pro
  • 35. FireWalls ● ● A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
  • 37. Antivirus software ● ● ● Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
  • 38. Boot sector ● ● A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program (usually, but not necessarily, an operating system) stored on the same storage device.
  • 39. Encryption ● ● ● Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. The message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
  • 41. Bottom Line ● ● Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source anti-virus tools have been developed, and a multi-billion dollar industry of anti-virus software vendors has cropped up, selling virus protection to Windows users. Unfortunately, no currently existing anti-virus software is able to catch all computer viruses.