SlideShare una empresa de Scribd logo
1 de 25
iruses        orms

          rojans



& and Other Info-Tech Diseas
               by: Rafeth Ahmed
                    Nitish Baghla
table of content
1. Computer abuse                      4. Trojan horses, worms
    a) What is computer abuse…             a) Worms
                                           b) Trojan Horses
2. Spam
    a) What is spam?                   5. Summary and conclusions
    b) How does spam work?
    c) How’d they get my email?        6. References
    d) Spam prevention

3. Viruses
    a) Computer Viruses
    b) History of viruses
    c) History of virus continued…
    d) Types of viruses
    e) Virus effects…
    f) Virus process and cycle
    g) Top 10 virus attacks and cost
    h) Virus prevention
    i) Why do we have viruses?
Is This Computer
abuse?



                                 1
 or is it more like this?




                             2
abuse…
"The unauthorized use of, or access to, a computer for
purposes contrary to the wishes of the owner of the computer
or the data held thereon.” 3

Such as:
   Hacking
   Pornography
   Viruses
spam ?
         no…

           …not…

               … this kind




    4
?
 Spam is all those unwanted advertisement of a company
 or their products distributed online.
 Most spams are delivered via emails.

 To avoid being spammed companies do have filters, but
 the best we can do is just ignore the emails and delete
 them.
                                                     5
how does
spam work ?

              Filter                                          Bypass



Paid E-mail
                       Junk Mail                     Humans            Spam


                         Spam


               Phishing            Commercial Advertising
how’d they get
my e-mail ?

   6          7




                  8




          9
spam prevention
 Don’t give out email addresses to unreliable sources
Spam protection in your computer (most email services
provide spam filtering)
Read carefully when filling out online forms requesting your
e-mail address, and exercise your choice.
Use multiple e-mail addresses.
Short e-mail addresses are easy to guess, and may receive
more spam.
Spam protection from your ISP
12




     11




10
computer virus
  To be defined as a virus, a     Virus Components:
  program must:                   The Replication mechanism
 Replicate itself in order to     allows virus to copy itself
  carry out a mission.
 Create damage to the
                                  The Protection mechanism
  computer system "infected".      Hides virus from detection

                                  The Trigger
  Or A virus is a program which    Mechanism which will set off
  reproduces itself, hides in       the payload
  other computer code without
  permission and does nasty or    The Payload
  undesirable things, not          Effect of the virus
  intended by its victim.                                    13
viruses…
 Technically, the concept of a     The first virus “in the wild,”
  computer virus was first           as they say, infected Apple
  imagined in 1949, well             II floppy disk in 1981. Its
  before computers became            name was” Elk Cloner”. all it
  commonplace.                       did was display a short
 Von Neumann used his               rhyme onscreen:
  theories in the 1950s, at Bell
  Labs.                              “It will get on all your disks
                                     It will infiltrate your chips
                                     Yes it’s Cloner!
                                     It will stick to you like glue
                                     It will modify ram too
                                     Send in the Cloner!”       14
viruses
  continued…
 in 1983 when Fred Cohen, demonstrates a computer virus
  during a security seminar at Lehigh University in
  Pennsylvania.
 In 1986, the Brain virus became the first documented file
  infector virus for MS-DOS computers
                                                      15
types of viruses
Boot Viruses
 Infect the boot block on a floppy or hard disk


File Viruses
 Infect .EXE or .COM files


Multi-partite Viruses
 Infect both boot blocks and executable files.


Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or disk.


Meta Viruses
 First viruses to infect data files and to work on multiple
  platforms.                                                        13
virus effects…
 Trivial, simply reproduces or displays messages.
 Minor, alters or deletes infected files.
 Moderate, wipes out entire disk drive.
 Major, slowly corrupts data with pattern, making restoration
  difficult.
 Severe, slowly corrupts data without pattern, making
  restoration impossible.
 Unlimited, virus which discovers system administrator's
  password and mails it to one or more users, tempting them to
  use it for illegal purposes


                                                                 13
and cycle
                   Virus Process




              16




Virus Cycle
                                   16
top 10 virus
attacks and cost…
Rate Name          Year          Cost ($ Million)
1    Morris               1998                 10 – 100
2    Melissa              1999                 60 – 100
3    Love Letter          2000                      5.5
4    Code Red             2001                      2.6
5    Nimda                2001                      635
6    SQL Slammer          2003               750 – 1000
7    MS Blaster           2003                100 – 150
8    MyDoom               2004                      250
9    Sasser               2004                      120
10   Witty                2004                  10 – 30
                                                    17
prevention
 …
There are plenty of companies
dedicated in preventing viruses
from infecting our computers.
They are known as antiviruses or
computer security systems
                                        19
    Such as…




                         18
                                   20
why do we have
viruses?
 Why are there so many
  new viruses? Is it because
  some troll is making it for
  fun? Or is it…


 Because antivirus
  companies are creating
  new ones so we are bound      21


  to buy their products?
worms

    22
         no…
                                 23
           …not…

               … these kinds ?
worms
 A worm is a program that scans a company’s network, or the
  Internet, for another computer that has a specific security hole. It
  copies itself to the new machine (through the security hole),
  Understanding Computer Viruses then starts replicating itself there.


 Worms replicate themselves very quickly; a network infected with a
  worm can be brought to its knees within a matter of hours. Worms
  don’t even have to be delivered via conventional programs; so-called
  “fileless” worms are recent additions to the virus scene. While in
  operation, these programs exist only in system memory, making
  them harder to identify than conventional file-hosted worms.

                                                                 16
trojan horse
 A Trojan horse is a program that claims to do one thing but then
  does something totally different. A typical Trojan horse has a
  filename that makes you think it’s a harmless type of file; it looks
  innocuous enough to be safe to open. But when you run the file, it’s
  actually a virus program that proceeds to inflict its damage on your
  system.


 It delivers its payload through deception, just like the fabled Trojan
  horse of yore. Trojan horses are becoming more common, primarily
  through the spread of Internet-based e-mail. These e-mail Trojans
  spread as innocent-looking attachments to e-mail messages; when
  you click to open the attachment, you launch the virus.
                                                                   16
conclusion
 Well most people believe that all computer threats are due to a
  virus, but now we know that there are a lot of different threats
  beside viruses
 Such as there are spams, trojans, worms,
 From spams we know there are different sorts, such as phishing
 Back to viruses we learnt a little bit of what it does such as how it
  infects our computer system and destroys it slowly.
1.
2.
3.
      references
      http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg
      http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related
      http://www.cyberagentsinc.com/computer_abuse.htm
4.    http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg
5.    http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html
6.    http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname--
      amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg
7.    http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg
8.    http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg
9.    http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg
10.   http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg
11.   http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG
12.   http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_
      3199745-computer-virus.jpg
13.   http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html
14.   http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf
15.   http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/
16.   http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html
17.   http://www.itsecurity.com/features/10-worst-virus-attacks-111207/
18.   http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg
19.   http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg-
      D4/s1600/norton-360.gif
20.   http://custompc.ca/files/2009/06/press_logo_avg.jpg
21.   http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg
22.   http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg
23.   http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg
24.   http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
thank you
    are there
    any
    question ?
   24

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

What is malware
What is malwareWhat is malware
What is malware
 
1 security goals
1   security goals1   security goals
1 security goals
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Malware
MalwareMalware
Malware
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
MALWARE
MALWAREMALWARE
MALWARE
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Web security
Web securityWeb security
Web security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Network security
Network securityNetwork security
Network security
 

Destacado

Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sectorsikander kushwaha
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sectorArpan Mahato
 

Destacado (20)

Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer worm
Computer wormComputer worm
Computer worm
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus
VirusVirus
Virus
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sector
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sector
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar a Virus worm trojan

Similar a Virus worm trojan (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
virus
virusvirus
virus
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Virus worm trojan

  • 1. iruses orms rojans & and Other Info-Tech Diseas by: Rafeth Ahmed Nitish Baghla
  • 2. table of content 1. Computer abuse 4. Trojan horses, worms a) What is computer abuse… a) Worms b) Trojan Horses 2. Spam a) What is spam? 5. Summary and conclusions b) How does spam work? c) How’d they get my email? 6. References d) Spam prevention 3. Viruses a) Computer Viruses b) History of viruses c) History of virus continued… d) Types of viruses e) Virus effects… f) Virus process and cycle g) Top 10 virus attacks and cost h) Virus prevention i) Why do we have viruses?
  • 3. Is This Computer abuse? 1  or is it more like this? 2
  • 4. abuse… "The unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer or the data held thereon.” 3 Such as:  Hacking  Pornography  Viruses
  • 5. spam ? no… …not… … this kind 4
  • 6. ?  Spam is all those unwanted advertisement of a company or their products distributed online.  Most spams are delivered via emails.  To avoid being spammed companies do have filters, but the best we can do is just ignore the emails and delete them. 5
  • 7. how does spam work ? Filter Bypass Paid E-mail Junk Mail Humans Spam Spam Phishing Commercial Advertising
  • 8. how’d they get my e-mail ? 6 7 8 9
  • 9. spam prevention  Don’t give out email addresses to unreliable sources Spam protection in your computer (most email services provide spam filtering) Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. Use multiple e-mail addresses. Short e-mail addresses are easy to guess, and may receive more spam. Spam protection from your ISP
  • 10. 12 11 10
  • 11. computer virus To be defined as a virus, a Virus Components: program must: The Replication mechanism  Replicate itself in order to  allows virus to copy itself carry out a mission.  Create damage to the The Protection mechanism computer system "infected".  Hides virus from detection The Trigger Or A virus is a program which  Mechanism which will set off reproduces itself, hides in the payload other computer code without permission and does nasty or The Payload undesirable things, not  Effect of the virus intended by its victim. 13
  • 12. viruses…  Technically, the concept of a  The first virus “in the wild,” computer virus was first as they say, infected Apple imagined in 1949, well II floppy disk in 1981. Its before computers became name was” Elk Cloner”. all it commonplace. did was display a short  Von Neumann used his rhyme onscreen: theories in the 1950s, at Bell Labs. “It will get on all your disks It will infiltrate your chips Yes it’s Cloner! It will stick to you like glue It will modify ram too Send in the Cloner!” 14
  • 13. viruses continued…  in 1983 when Fred Cohen, demonstrates a computer virus during a security seminar at Lehigh University in Pennsylvania.  In 1986, the Brain virus became the first documented file infector virus for MS-DOS computers 15
  • 14. types of viruses Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk. Meta Viruses  First viruses to infect data files and to work on multiple platforms. 13
  • 15. virus effects…  Trivial, simply reproduces or displays messages.  Minor, alters or deletes infected files.  Moderate, wipes out entire disk drive.  Major, slowly corrupts data with pattern, making restoration difficult.  Severe, slowly corrupts data without pattern, making restoration impossible.  Unlimited, virus which discovers system administrator's password and mails it to one or more users, tempting them to use it for illegal purposes 13
  • 16. and cycle Virus Process 16 Virus Cycle 16
  • 17. top 10 virus attacks and cost… Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30 17
  • 18. prevention … There are plenty of companies dedicated in preventing viruses from infecting our computers. They are known as antiviruses or computer security systems 19 Such as… 18 20
  • 19. why do we have viruses?  Why are there so many new viruses? Is it because some troll is making it for fun? Or is it…  Because antivirus companies are creating new ones so we are bound 21 to buy their products?
  • 20. worms 22 no… 23 …not… … these kinds ?
  • 21. worms  A worm is a program that scans a company’s network, or the Internet, for another computer that has a specific security hole. It copies itself to the new machine (through the security hole), Understanding Computer Viruses then starts replicating itself there.  Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours. Worms don’t even have to be delivered via conventional programs; so-called “fileless” worms are recent additions to the virus scene. While in operation, these programs exist only in system memory, making them harder to identify than conventional file-hosted worms. 16
  • 22. trojan horse  A Trojan horse is a program that claims to do one thing but then does something totally different. A typical Trojan horse has a filename that makes you think it’s a harmless type of file; it looks innocuous enough to be safe to open. But when you run the file, it’s actually a virus program that proceeds to inflict its damage on your system.  It delivers its payload through deception, just like the fabled Trojan horse of yore. Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. 16
  • 23. conclusion  Well most people believe that all computer threats are due to a virus, but now we know that there are a lot of different threats beside viruses  Such as there are spams, trojans, worms,  From spams we know there are different sorts, such as phishing  Back to viruses we learnt a little bit of what it does such as how it infects our computer system and destroys it slowly.
  • 24. 1. 2. 3. references http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related http://www.cyberagentsinc.com/computer_abuse.htm 4. http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg 5. http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html 6. http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname-- amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg 7. http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg 8. http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg 9. http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg 10. http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg 11. http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG 12. http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_ 3199745-computer-virus.jpg 13. http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html 14. http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf 15. http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/ 16. http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html 17. http://www.itsecurity.com/features/10-worst-virus-attacks-111207/ 18. http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg 19. http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg- D4/s1600/norton-360.gif 20. http://custompc.ca/files/2009/06/press_logo_avg.jpg 21. http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg 22. http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg 23. http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg 24. http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
  • 25. thank you are there any question ? 24