SlideShare una empresa de Scribd logo
1 de 14
INTRODUCTION
• A Computer Virus is actually a computer program
  that can increase its own number by replicating
  itself and keeps on infecting the other files by
  changing their properties continuously.
• It can be sent by various means such as over the
  internet, by email, or can be carried on various
  storage mediums such as Floppy, Portable Hard
  Disks, Pen Drives, Bluetooth, CD's & DVD's etc.
ETYMOLOGY
• In 1984 Fred Cohen from the University of
  Southern California wrote his paper "Computer
  Viruses - Theory and Experiments“. It was the first
  paper to explicitly call a self-reproducing program
  a "virus", a term introduced by Cohen's mentor
  Leonard Adleman.
• The actual term "virus" was first used to denote a
  self-reproducing program in a short story by
  David Gerrold in Galaxy magazine in 1969 - and
  later in his 1972 novel, When HARLIE Was One.
HISTORY
• In 1971, The Creeper was the first detected
  Virus on ARPANET, the forerunner of internet.
• In 1981, A program called “Elk Cloner” was the
  first computer Virus that appeared outside the
  single computer or lab written by Richard
  Skrenta.
• In 1986, The first PC Virus was a boot sector
  virus dubbed ©Brain created by Farooq Alvi
  Brothers in Lahore, Pakistan.
TYPES OF VIRUS
WHAT THEY INFECT      HOW THEY INFECT
System Sector Virus   Polymorphic Virus
File Virus            Stealth Virus
Macro Virus           Fast and Slow Infectors
Companion Virus       Sparse Infectors
Cluster Virus         Armored Viruses
Batch File Virus      Multipartite Virus
Source Code Virus     Cavity Virus
Visual Basic Worms    NTFS ADS Virus
LOGIC OF VIRUS
• It is easy to mess-up the right program. For
  example, if you remove even a single byte from
  an EXE file, that EXE file won’t be usable!
• It’s a common practice to include ‘signatures’ by
  virus creators.
• The main idea is to force the innocent user to run
  the programs.
• Certain viruses come along with so called
  ‘programmer utilities’ or ‘free tools’.
EXAMPLE
ORKUT VIRUS / Muhaha Virus

ifwinactive ahk_classIEFrame
{
   ControlGetText,ed,edit1,ahk_classIEFrame
   soundplay,C:heap41a2.mp3
   msgbox,262160,ORKUT IS BANNED you fool
   return
}

How this works is left to the readers to analyze.........
VIRUS-LIKE COMPUTER PROGRAM

• Trojan Horse
  A Virus-Like Program pretends to do something else is Trojan.

• Logic Bombs
  A logic bomb infects a computers memory but does not
  replicate.

• Malicious software
  Virus-like programs that run within a web browser are called
  malicious software.
SIGNATURE OF VIRUS
Many virus programmers add signature to their program. So
by checking the signature, we can find the name of the virus.
Most of the anti-virus packages use this logic!


   Virus         Signature
   Einstein      0042CD217231B96E0333D2B440CD2172193BC17515B80042

   Pheonix 927   E800005E81C6????BF0001B90400F3A4E8
   Spanz         E800005E81EE????8D94????B41ACD21C784
   Necropolis    50FCAD33C2AB8BD0E2F8
   Trivial-25    B44EFEC6CD21B8??3DBA??00CD2193B440CD
   Trivial-46    B44EB120BA????CD21BA????B80?3DCD21%2BA0001
                 %4B440CD
   SK            CD20B80300CD1051E800005E83EE09
PREVENTIVE MEASURES

•   Anti-Virus
•   Virus Removal Using System Restore
•   Operating System Re-Installation
•   System Software Update
ANTIVIRUS
• Many users install anti-virus software that can
  detect and eliminate known viruses after the
  computer downloads or runs the executable.
• The first, and by far the most common
  method of virus detection is using a list of
  virus signature definitions.
• The second method is to use a heuristic
  algorithm to find viruses based on common
  behaviors.
EXAMPLES OF ANTIVIRUS
•   Avast
•   Kaspersky
•   Panda
•   Quick Heal
•   Mc Afee
•   AVG
•   Norten Antivirus
CONCLUSION
• Computer Viruses are not just a threat to the
  modern technologies but also to the security
  of privacy.
• Always use Anti-Virus Software to stay
  protected, and keep updating for signature
  updates.
• It’s necessary to stay aware about it since we
  have a computerized digital future.
Isas

Más contenido relacionado

La actualidad más candente

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Wittyvirusabic
WittyvirusabicWittyvirusabic
Wittyvirusabicabisai09
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...eLiberatica
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineeringintertelinvestigations
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...ESET
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentationquestar
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar henelpj
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitRaghav Bisht
 
Metasploit framework in Network Security
Metasploit framework in Network SecurityMetasploit framework in Network Security
Metasploit framework in Network SecurityAshok Reddy Medikonda
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Byres Security Inc.
 

La actualidad más candente (20)

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Wittyvirusabic
WittyvirusabicWittyvirusabic
Wittyvirusabic
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineering
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Sandbox
SandboxSandbox
Sandbox
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Skywiper
SkywiperSkywiper
Skywiper
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentation
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
 
Metasploit framework in Network Security
Metasploit framework in Network SecurityMetasploit framework in Network Security
Metasploit framework in Network Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer-viruses
computer-virusescomputer-viruses
computer-viruses
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 

Destacado

Teaching through Multimedia Storytelling (or getting the dog to whistle!)
Teaching through Multimedia Storytelling (or getting the dog to whistle!)Teaching through Multimedia Storytelling (or getting the dog to whistle!)
Teaching through Multimedia Storytelling (or getting the dog to whistle!)Susan Lieberman
 
Aplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionAplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionasenetcbb
 
Scrutiny by Select Committees of the Estimates
Scrutiny by Select Committees of the EstimatesScrutiny by Select Committees of the Estimates
Scrutiny by Select Committees of the EstimatesHamish Coghill
 
Organics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganOrganics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganMassRecycle
 
Initial ideas music vid a2
Initial ideas   music vid a2Initial ideas   music vid a2
Initial ideas music vid a2shaheenataraf
 
Evaluation Question 1 - Newspaper Advert
Evaluation Question 1 - Newspaper AdvertEvaluation Question 1 - Newspaper Advert
Evaluation Question 1 - Newspaper AdvertLaurenArrowsmith
 
LinkedIn Master Class 4 August 2015
LinkedIn Master Class 4 August 2015LinkedIn Master Class 4 August 2015
LinkedIn Master Class 4 August 2015CPA Australia
 
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...ClarkDurant
 
Mastering LinkedIn for Business Townsville 16 May 2016
Mastering LinkedIn for Business Townsville 16 May 2016Mastering LinkedIn for Business Townsville 16 May 2016
Mastering LinkedIn for Business Townsville 16 May 2016CPA Australia
 
Declutter Your Classroom
Declutter Your ClassroomDeclutter Your Classroom
Declutter Your ClassroomMarlena Hebern
 
Is one enough? Data warehousing for biomedical research
Is one enough? Data warehousing for biomedical researchIs one enough? Data warehousing for biomedical research
Is one enough? Data warehousing for biomedical researchGreg Landrum
 
Presentación yo mi región, mi cultura
Presentación yo mi región, mi culturaPresentación yo mi región, mi cultura
Presentación yo mi región, mi culturaOlisney De Luque
 
Forensic science chem project
Forensic science chem projectForensic science chem project
Forensic science chem projectambickford
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 

Destacado (20)

Teaching through Multimedia Storytelling (or getting the dog to whistle!)
Teaching through Multimedia Storytelling (or getting the dog to whistle!)Teaching through Multimedia Storytelling (or getting the dog to whistle!)
Teaching through Multimedia Storytelling (or getting the dog to whistle!)
 
Aplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionAplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacion
 
Scrutiny by Select Committees of the Estimates
Scrutiny by Select Committees of the EstimatesScrutiny by Select Committees of the Estimates
Scrutiny by Select Committees of the Estimates
 
Organics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganOrganics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 gogan
 
Estudo de violão
Estudo de violãoEstudo de violão
Estudo de violão
 
Initial ideas music vid a2
Initial ideas   music vid a2Initial ideas   music vid a2
Initial ideas music vid a2
 
Evaluation Question 1 - Newspaper Advert
Evaluation Question 1 - Newspaper AdvertEvaluation Question 1 - Newspaper Advert
Evaluation Question 1 - Newspaper Advert
 
Write Tight(er)—STC Spectrum14
Write Tight(er)—STC Spectrum14Write Tight(er)—STC Spectrum14
Write Tight(er)—STC Spectrum14
 
The “Buy Side” View on CEO Pay
The “Buy Side” View on CEO PayThe “Buy Side” View on CEO Pay
The “Buy Side” View on CEO Pay
 
LinkedIn Master Class 4 August 2015
LinkedIn Master Class 4 August 2015LinkedIn Master Class 4 August 2015
LinkedIn Master Class 4 August 2015
 
Slide innovaciones dhs 2011 2012
Slide innovaciones dhs 2011 2012Slide innovaciones dhs 2011 2012
Slide innovaciones dhs 2011 2012
 
Ch14 pr0
Ch14 pr0Ch14 pr0
Ch14 pr0
 
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...
Betsy DeVos, Spence Abraham, and Saul Anuzis endorse Clark Durant for U.S. Se...
 
Mastering LinkedIn for Business Townsville 16 May 2016
Mastering LinkedIn for Business Townsville 16 May 2016Mastering LinkedIn for Business Townsville 16 May 2016
Mastering LinkedIn for Business Townsville 16 May 2016
 
Declutter Your Classroom
Declutter Your ClassroomDeclutter Your Classroom
Declutter Your Classroom
 
Salmo23
Salmo23Salmo23
Salmo23
 
Is one enough? Data warehousing for biomedical research
Is one enough? Data warehousing for biomedical researchIs one enough? Data warehousing for biomedical research
Is one enough? Data warehousing for biomedical research
 
Presentación yo mi región, mi cultura
Presentación yo mi región, mi culturaPresentación yo mi región, mi cultura
Presentación yo mi región, mi cultura
 
Forensic science chem project
Forensic science chem projectForensic science chem project
Forensic science chem project
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 

Similar a Isas

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 

Similar a Isas (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Pc viruses
Pc virusesPc viruses
Pc viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
information about virus
information about virusinformation about virus
information about virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 

Isas

  • 1.
  • 2. INTRODUCTION • A Computer Virus is actually a computer program that can increase its own number by replicating itself and keeps on infecting the other files by changing their properties continuously. • It can be sent by various means such as over the internet, by email, or can be carried on various storage mediums such as Floppy, Portable Hard Disks, Pen Drives, Bluetooth, CD's & DVD's etc.
  • 3. ETYMOLOGY • In 1984 Fred Cohen from the University of Southern California wrote his paper "Computer Viruses - Theory and Experiments“. It was the first paper to explicitly call a self-reproducing program a "virus", a term introduced by Cohen's mentor Leonard Adleman. • The actual term "virus" was first used to denote a self-reproducing program in a short story by David Gerrold in Galaxy magazine in 1969 - and later in his 1972 novel, When HARLIE Was One.
  • 4. HISTORY • In 1971, The Creeper was the first detected Virus on ARPANET, the forerunner of internet. • In 1981, A program called “Elk Cloner” was the first computer Virus that appeared outside the single computer or lab written by Richard Skrenta. • In 1986, The first PC Virus was a boot sector virus dubbed ©Brain created by Farooq Alvi Brothers in Lahore, Pakistan.
  • 5. TYPES OF VIRUS WHAT THEY INFECT HOW THEY INFECT System Sector Virus Polymorphic Virus File Virus Stealth Virus Macro Virus Fast and Slow Infectors Companion Virus Sparse Infectors Cluster Virus Armored Viruses Batch File Virus Multipartite Virus Source Code Virus Cavity Virus Visual Basic Worms NTFS ADS Virus
  • 6. LOGIC OF VIRUS • It is easy to mess-up the right program. For example, if you remove even a single byte from an EXE file, that EXE file won’t be usable! • It’s a common practice to include ‘signatures’ by virus creators. • The main idea is to force the innocent user to run the programs. • Certain viruses come along with so called ‘programmer utilities’ or ‘free tools’.
  • 7. EXAMPLE ORKUT VIRUS / Muhaha Virus ifwinactive ahk_classIEFrame { ControlGetText,ed,edit1,ahk_classIEFrame soundplay,C:heap41a2.mp3 msgbox,262160,ORKUT IS BANNED you fool return } How this works is left to the readers to analyze.........
  • 8. VIRUS-LIKE COMPUTER PROGRAM • Trojan Horse A Virus-Like Program pretends to do something else is Trojan. • Logic Bombs A logic bomb infects a computers memory but does not replicate. • Malicious software Virus-like programs that run within a web browser are called malicious software.
  • 9. SIGNATURE OF VIRUS Many virus programmers add signature to their program. So by checking the signature, we can find the name of the virus. Most of the anti-virus packages use this logic! Virus Signature Einstein 0042CD217231B96E0333D2B440CD2172193BC17515B80042 Pheonix 927 E800005E81C6????BF0001B90400F3A4E8 Spanz E800005E81EE????8D94????B41ACD21C784 Necropolis 50FCAD33C2AB8BD0E2F8 Trivial-25 B44EFEC6CD21B8??3DBA??00CD2193B440CD Trivial-46 B44EB120BA????CD21BA????B80?3DCD21%2BA0001 %4B440CD SK CD20B80300CD1051E800005E83EE09
  • 10. PREVENTIVE MEASURES • Anti-Virus • Virus Removal Using System Restore • Operating System Re-Installation • System Software Update
  • 11. ANTIVIRUS • Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. • The first, and by far the most common method of virus detection is using a list of virus signature definitions. • The second method is to use a heuristic algorithm to find viruses based on common behaviors.
  • 12. EXAMPLES OF ANTIVIRUS • Avast • Kaspersky • Panda • Quick Heal • Mc Afee • AVG • Norten Antivirus
  • 13. CONCLUSION • Computer Viruses are not just a threat to the modern technologies but also to the security of privacy. • Always use Anti-Virus Software to stay protected, and keep updating for signature updates. • It’s necessary to stay aware about it since we have a computerized digital future.