SlideShare une entreprise Scribd logo
1  sur  25
iruses        orms

          rojans



& and Other Info-Tech Diseas
               by: Rafeth Ahmed
                    Nitish Baghla
table of content
1. Computer abuse                      4. Trojan horses, worms
    a) What is computer abuse…             a) Worms
                                           b) Trojan Horses
2. Spam
    a) What is spam?                   5. Summary and conclusions
    b) How does spam work?
    c) How’d they get my email?        6. References
    d) Spam prevention

3. Viruses
    a) Computer Viruses
    b) History of viruses
    c) History of virus continued…
    d) Types of viruses
    e) Virus effects…
    f) Virus process and cycle
    g) Top 10 virus attacks and cost
    h) Virus prevention
    i) Why do we have viruses?
Is This Computer
abuse?



                                 1
 or is it more like this?




                             2
abuse…
"The unauthorized use of, or access to, a computer for
purposes contrary to the wishes of the owner of the computer
or the data held thereon.” 3

Such as:
   Hacking
   Pornography
   Viruses
spam ?
         no…

           …not…

               … this kind




    4
?
 Spam is all those unwanted advertisement of a company
 or their products distributed online.
 Most spams are delivered via emails.

 To avoid being spammed companies do have filters, but
 the best we can do is just ignore the emails and delete
 them.
                                                     5
how does
spam work ?

              Filter                                          Bypass



Paid E-mail
                       Junk Mail                     Humans            Spam


                         Spam


               Phishing            Commercial Advertising
how’d they get
my e-mail ?

   6          7




                  8




          9
spam prevention
 Don’t give out email addresses to unreliable sources
Spam protection in your computer (most email services
provide spam filtering)
Read carefully when filling out online forms requesting your
e-mail address, and exercise your choice.
Use multiple e-mail addresses.
Short e-mail addresses are easy to guess, and may receive
more spam.
Spam protection from your ISP
12




     11




10
computer virus
  To be defined as a virus, a     Virus Components:
  program must:                   The Replication mechanism
 Replicate itself in order to     allows virus to copy itself
  carry out a mission.
 Create damage to the
                                  The Protection mechanism
  computer system "infected".      Hides virus from detection

                                  The Trigger
  Or A virus is a program which    Mechanism which will set off
  reproduces itself, hides in       the payload
  other computer code without
  permission and does nasty or    The Payload
  undesirable things, not          Effect of the virus
  intended by its victim.                                    13
viruses…
 Technically, the concept of a     The first virus “in the wild,”
  computer virus was first           as they say, infected Apple
  imagined in 1949, well             II floppy disk in 1981. Its
  before computers became            name was” Elk Cloner”. all it
  commonplace.                       did was display a short
 Von Neumann used his               rhyme onscreen:
  theories in the 1950s, at Bell
  Labs.                              “It will get on all your disks
                                     It will infiltrate your chips
                                     Yes it’s Cloner!
                                     It will stick to you like glue
                                     It will modify ram too
                                     Send in the Cloner!”       14
viruses
  continued…
 in 1983 when Fred Cohen, demonstrates a computer virus
  during a security seminar at Lehigh University in
  Pennsylvania.
 In 1986, the Brain virus became the first documented file
  infector virus for MS-DOS computers
                                                      15
types of viruses
Boot Viruses
 Infect the boot block on a floppy or hard disk


File Viruses
 Infect .EXE or .COM files


Multi-partite Viruses
 Infect both boot blocks and executable files.


Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or disk.


Meta Viruses
 First viruses to infect data files and to work on multiple
  platforms.                                                        13
virus effects…
 Trivial, simply reproduces or displays messages.
 Minor, alters or deletes infected files.
 Moderate, wipes out entire disk drive.
 Major, slowly corrupts data with pattern, making restoration
  difficult.
 Severe, slowly corrupts data without pattern, making
  restoration impossible.
 Unlimited, virus which discovers system administrator's
  password and mails it to one or more users, tempting them to
  use it for illegal purposes


                                                                 13
and cycle
                   Virus Process




              16




Virus Cycle
                                   16
top 10 virus
attacks and cost…
Rate Name          Year          Cost ($ Million)
1    Morris               1998                 10 – 100
2    Melissa              1999                 60 – 100
3    Love Letter          2000                      5.5
4    Code Red             2001                      2.6
5    Nimda                2001                      635
6    SQL Slammer          2003               750 – 1000
7    MS Blaster           2003                100 – 150
8    MyDoom               2004                      250
9    Sasser               2004                      120
10   Witty                2004                  10 – 30
                                                    17
prevention
 …
There are plenty of companies
dedicated in preventing viruses
from infecting our computers.
They are known as antiviruses or
computer security systems
                                        19
    Such as…




                         18
                                   20
why do we have
viruses?
 Why are there so many
  new viruses? Is it because
  some troll is making it for
  fun? Or is it…


 Because antivirus
  companies are creating
  new ones so we are bound      21


  to buy their products?
worms

    22
         no…
                                 23
           …not…

               … these kinds ?
worms
 A worm is a program that scans a company’s network, or the
  Internet, for another computer that has a specific security hole. It
  copies itself to the new machine (through the security hole),
  Understanding Computer Viruses then starts replicating itself there.


 Worms replicate themselves very quickly; a network infected with a
  worm can be brought to its knees within a matter of hours. Worms
  don’t even have to be delivered via conventional programs; so-called
  “fileless” worms are recent additions to the virus scene. While in
  operation, these programs exist only in system memory, making
  them harder to identify than conventional file-hosted worms.

                                                                 16
trojan horse
 A Trojan horse is a program that claims to do one thing but then
  does something totally different. A typical Trojan horse has a
  filename that makes you think it’s a harmless type of file; it looks
  innocuous enough to be safe to open. But when you run the file, it’s
  actually a virus program that proceeds to inflict its damage on your
  system.


 It delivers its payload through deception, just like the fabled Trojan
  horse of yore. Trojan horses are becoming more common, primarily
  through the spread of Internet-based e-mail. These e-mail Trojans
  spread as innocent-looking attachments to e-mail messages; when
  you click to open the attachment, you launch the virus.
                                                                   16
conclusion
 Well most people believe that all computer threats are due to a
  virus, but now we know that there are a lot of different threats
  beside viruses
 Such as there are spams, trojans, worms,
 From spams we know there are different sorts, such as phishing
 Back to viruses we learnt a little bit of what it does such as how it
  infects our computer system and destroys it slowly.
1.
2.
3.
      references
      http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg
      http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related
      http://www.cyberagentsinc.com/computer_abuse.htm
4.    http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg
5.    http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html
6.    http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname--
      amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg
7.    http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg
8.    http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg
9.    http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg
10.   http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg
11.   http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG
12.   http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_
      3199745-computer-virus.jpg
13.   http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html
14.   http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf
15.   http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/
16.   http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html
17.   http://www.itsecurity.com/features/10-worst-virus-attacks-111207/
18.   http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg
19.   http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg-
      D4/s1600/norton-360.gif
20.   http://custompc.ca/files/2009/06/press_logo_avg.jpg
21.   http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg
22.   http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg
23.   http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg
24.   http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
thank you
    are there
    any
    question ?
   24

Contenu connexe

Tendances

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 

Tendances (20)

Man in the middle
Man in the middleMan in the middle
Man in the middle
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 

En vedette

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus
Computer virusComputer virus
Computer virusviji_tgce
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sectorsikander kushwaha
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sectorArpan Mahato
 

En vedette (20)

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus
VirusVirus
Virus
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Application Of Mis In Service Sector
Application Of Mis In Service SectorApplication Of Mis In Service Sector
Application Of Mis In Service Sector
 
Application of MIS in manufacturing sector
Application of MIS in manufacturing sectorApplication of MIS in manufacturing sector
Application of MIS in manufacturing sector
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similaire à Virus worm trojan (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Anti virus
Anti virusAnti virus
Anti virus
 
virus
virusvirus
virus
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Malware
MalwareMalware
Malware
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Virus worm trojan

  • 1. iruses orms rojans & and Other Info-Tech Diseas by: Rafeth Ahmed Nitish Baghla
  • 2. table of content 1. Computer abuse 4. Trojan horses, worms a) What is computer abuse… a) Worms b) Trojan Horses 2. Spam a) What is spam? 5. Summary and conclusions b) How does spam work? c) How’d they get my email? 6. References d) Spam prevention 3. Viruses a) Computer Viruses b) History of viruses c) History of virus continued… d) Types of viruses e) Virus effects… f) Virus process and cycle g) Top 10 virus attacks and cost h) Virus prevention i) Why do we have viruses?
  • 3. Is This Computer abuse? 1  or is it more like this? 2
  • 4. abuse… "The unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer or the data held thereon.” 3 Such as:  Hacking  Pornography  Viruses
  • 5. spam ? no… …not… … this kind 4
  • 6. ?  Spam is all those unwanted advertisement of a company or their products distributed online.  Most spams are delivered via emails.  To avoid being spammed companies do have filters, but the best we can do is just ignore the emails and delete them. 5
  • 7. how does spam work ? Filter Bypass Paid E-mail Junk Mail Humans Spam Spam Phishing Commercial Advertising
  • 8. how’d they get my e-mail ? 6 7 8 9
  • 9. spam prevention  Don’t give out email addresses to unreliable sources Spam protection in your computer (most email services provide spam filtering) Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. Use multiple e-mail addresses. Short e-mail addresses are easy to guess, and may receive more spam. Spam protection from your ISP
  • 10. 12 11 10
  • 11. computer virus To be defined as a virus, a Virus Components: program must: The Replication mechanism  Replicate itself in order to  allows virus to copy itself carry out a mission.  Create damage to the The Protection mechanism computer system "infected".  Hides virus from detection The Trigger Or A virus is a program which  Mechanism which will set off reproduces itself, hides in the payload other computer code without permission and does nasty or The Payload undesirable things, not  Effect of the virus intended by its victim. 13
  • 12. viruses…  Technically, the concept of a  The first virus “in the wild,” computer virus was first as they say, infected Apple imagined in 1949, well II floppy disk in 1981. Its before computers became name was” Elk Cloner”. all it commonplace. did was display a short  Von Neumann used his rhyme onscreen: theories in the 1950s, at Bell Labs. “It will get on all your disks It will infiltrate your chips Yes it’s Cloner! It will stick to you like glue It will modify ram too Send in the Cloner!” 14
  • 13. viruses continued…  in 1983 when Fred Cohen, demonstrates a computer virus during a security seminar at Lehigh University in Pennsylvania.  In 1986, the Brain virus became the first documented file infector virus for MS-DOS computers 15
  • 14. types of viruses Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk. Meta Viruses  First viruses to infect data files and to work on multiple platforms. 13
  • 15. virus effects…  Trivial, simply reproduces or displays messages.  Minor, alters or deletes infected files.  Moderate, wipes out entire disk drive.  Major, slowly corrupts data with pattern, making restoration difficult.  Severe, slowly corrupts data without pattern, making restoration impossible.  Unlimited, virus which discovers system administrator's password and mails it to one or more users, tempting them to use it for illegal purposes 13
  • 16. and cycle Virus Process 16 Virus Cycle 16
  • 17. top 10 virus attacks and cost… Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30 17
  • 18. prevention … There are plenty of companies dedicated in preventing viruses from infecting our computers. They are known as antiviruses or computer security systems 19 Such as… 18 20
  • 19. why do we have viruses?  Why are there so many new viruses? Is it because some troll is making it for fun? Or is it…  Because antivirus companies are creating new ones so we are bound 21 to buy their products?
  • 20. worms 22 no… 23 …not… … these kinds ?
  • 21. worms  A worm is a program that scans a company’s network, or the Internet, for another computer that has a specific security hole. It copies itself to the new machine (through the security hole), Understanding Computer Viruses then starts replicating itself there.  Worms replicate themselves very quickly; a network infected with a worm can be brought to its knees within a matter of hours. Worms don’t even have to be delivered via conventional programs; so-called “fileless” worms are recent additions to the virus scene. While in operation, these programs exist only in system memory, making them harder to identify than conventional file-hosted worms. 16
  • 22. trojan horse  A Trojan horse is a program that claims to do one thing but then does something totally different. A typical Trojan horse has a filename that makes you think it’s a harmless type of file; it looks innocuous enough to be safe to open. But when you run the file, it’s actually a virus program that proceeds to inflict its damage on your system.  It delivers its payload through deception, just like the fabled Trojan horse of yore. Trojan horses are becoming more common, primarily through the spread of Internet-based e-mail. These e-mail Trojans spread as innocent-looking attachments to e-mail messages; when you click to open the attachment, you launch the virus. 16
  • 23. conclusion  Well most people believe that all computer threats are due to a virus, but now we know that there are a lot of different threats beside viruses  Such as there are spams, trojans, worms,  From spams we know there are different sorts, such as phishing  Back to viruses we learnt a little bit of what it does such as how it infects our computer system and destroys it slowly.
  • 24. 1. 2. 3. references http://thecampbells2000.com/tech/computer-rage-1-jpg640x480.jpg http://www.youtube.com/watch?v=QEXGPhEVGXo&feature=related http://www.cyberagentsinc.com/computer_abuse.htm 4. http://f00.inventorspot.com/images/1559606_340_1116081430036-spam.jpg 5. http://www.nolo.com/legal-encyclopedia/how-does-spam-work-30013.html 6. http://d2eosjbgw49cu5.cloudfront.net/mobile-weblog.com/imgname-- amazoncom_launche_wireless_superstore---50226711--images--amazon.com_logo.jpg 7. http://www.grattecenne.com/wp-content/uploads/2009/06/12803_f260.jpg 8. http://globalthoughtz.com/wp-content/uploads/2011/01/Monster_Jobs_Logo1.jpg 9. http://www.gomonews.com/wp-content/uploads/2009/10/wal-mart-logo.jpg 10. http://healyitworks.com/wp-content/uploads/2009/06/virus5.jpg 11. http://www.standrews.k12.nf.ca/Computerwebquest/Computer.JPG 12. http://3.bp.blogspot.com/_98d57p8JHP8/Shgw4c_LsuI/AAAAAAAAAlA/usVdPWwQ87I/s320/ist2_ 3199745-computer-virus.jpg 13. http://ksi.cpsc.ucalgary.ca/courses/547-96/cochrane/present/index.html 14. http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf 15. http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/ 16. http://www.pdfking.net/Understanding-Computer-Viruses--PDF.html 17. http://www.itsecurity.com/features/10-worst-virus-attacks-111207/ 18. http://community.spiceworks.com/images/products/0001/4741/mcafee_logo.jpg 19. http://3.bp.blogspot.com/-FiNWkEhzD9s/TZMwudIEEVI/AAAAAAAAAp4/ar3IktAg- D4/s1600/norton-360.gif 20. http://custompc.ca/files/2009/06/press_logo_avg.jpg 21. http://farm3.static.flickr.com/2285/1594411528_724051d57c_o.jpg 22. http://cultofmac.cultofmaccom.netdna-cdn.com/wordpress/wp-content/uploads/trojan_horses.jpg 23. http://gallery.hd.org/_exhibits/natural-science/earth-worm-AJHD.jpg 24. http://www.bloggingfor.info/wp-content/uploads/2010/10/hmmm.jpg
  • 25. thank you are there any question ? 24