Computer Viruses

Information about Computer Viruses

Published on September 6, 2008

Author: saturn

Source: authorstream.com

Content

Slide 1: COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES Slide 2: SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT IS COMPUTER VIRUS ? ? Slide 3: SEQUENCE OF PRESENTATION * VIRUS (ROGUE SOFTWARE) I COMPUTER VIRUS Slide 4: SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ? Slide 5: SEQUENCE OF PRESENTATION COMPUTER VIRUS * TYPES OF COMPUTER VIRUS Slide 6: SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT ALL CAN THEY DO ? Slide 7: SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW DO THEY INFECT ? Slide 8: SEQUENCE OF PRESENTATION COMPUTER VIRUS V I R U S * HOW NOTICE ? Slide 9: SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT TO DO ? VIRUS NO ! Slide 10: SEQUENCE OF PRESENTATION COMPUTER VIRUS * LAST WORD Slide 11: SEQUENCE OF PRESENTATION COMPUTER VIRUS * CONCLUSION Slide 13: WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ” Slide 14: WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS * BE A SET OF COMPUTER INSTRUCTIONS * BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS Slide 15: COMPUTER VIRUS COMPUTER COMPONENTS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE Slide 16: ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION * THE TROJAN HORSE - APPEARS TO BE USEFUL * CHAMELEONS - M ISCHIEF * REPLICATORS - COPY ITSELF TO EXHAUST DISK * WORMS - TRAVEL IN NETWORK Slide 17: * SOFTWARE BOMBS - EXPLODE ON LAUNCH * LOGIC BOMBS - EXPLODE ON LOGIC * TIME BOMBS - EXPLODE ON TIME / DATE Slide 18: WHO ARE ROUGE PROGRAMERS ? * PSYCHO CASES COMPUTER VIRUS - FOR FUN - RELEASE ANGER - TAKE REVENGE Slide 19: WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET Slide 20: WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK Slide 21: TYPES OF COMPUTER VIRUS COMPUTER VIRUS * BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT Slide 22: WHAT CAN THEY DO ? FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES COMPUTER VIRUS Slide 23: COMPUTER VIRUS HOW DO THEY DO ? APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT Slide 24: HOW DO YOU NOTICE ? COMPUTER VIRUS Slide 25: HOW DO YOU NOTICE ? COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES COMPUTER VIRUS Slide 26: HOW DO YOU NOTICE ? PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR COMPUTER VIRUS Slide 27: WHAT TO DO ? ANTI VIRUS TECHNIQUES WHAT TO DO ? : WHAT TO DO ? SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH COMPUTER ANTI VIRUS Slide 29: WHAT TO DO ? SAFE COMPUTING METHODS * YOU MUST COMPUTER ANTI VIRUS Slide 30: WHAT TO DO ? SAFE COMPUTING METHODS COMPUTER ANTI VIRUS YOU MAY USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS Slide 31: WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION SLOW SPEED UNNECESSARY INTERRUPTS CAN BE INFECTED BY VIRUS HEAVY ON RAM COMPUTER ANTI VIRUS Slide 32: WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS DETECTION SYSTEMS LOAD, RUN AND EXIT CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC COMPUTER ANTI VIRUS Slide 33: WHAT TO DO ? SOME ANTIVIRUS SOFTWARE VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS COMPUTER ANTI VIRUS Slide 34: WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS Slide 35: SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE Slide 36: THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY CONCLUSION“LEARN TO LIVE WITH IT” : CONCLUSION“LEARN TO LIVE WITH IT” SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION

Related presentations


Other presentations created by saturn

chalechalo
06. 09. 2008
0 views

chalechalo

Islamic Leadership
06. 09. 2008
0 views

Islamic Leadership