SlideShare une entreprise Scribd logo
1  sur  31
MOST RECENT ATTACKS BY
VIRUS,
WORMS & TROJANS
INDEX
   VIRUS
•    What Is Computer Virus?
•    History Of Computer Virus.
•    Background
•    Virus Through The Internet.
•    Symptoms Of Virus Attack.
•    Typical Things That Computer
•    Viruses Do.
•    Prevention of Virus.
   WORMS
•   What Is Worms?
•   History Of Worms.
•   Anatomy of Worms.
•   Types Of Worms.
•   Harmful Effects Of Worms.
•   Prevention of Worms
   TROJANS
•    What Are Trojans?
•    Types Of Trojans.
•    What Trojans Can Do.
•    Detection Of Trojans.
•    Prevention of Trojans
   COUNTER-MEASURE OF TROJAN,VIRUS,WORMS
   DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
VIRUS
 A computer virus is a computer program that can copy
  itself and infect a computer.
 The term "virus" is also commonly used to refer to other
  types of malware, adware and spyware.
 Viruses can increase their chances of spreading to other
  computers by infecting files on a network file system or
  a file system that is accessed by another computer.
 Once it’s running, it spreads by inserting copies of itself
  into other executable code or documents
THE HISTORY OF COMPUTER VIRUSES

•   1981 Apple Viruses 1, 2, & 3
•   1980’s Fred Cohen
•   1987 Lehigh Virus
•   1988 The first anti virus software
•   1990 The first polymorphic viruses
•   1991 Symantec releases Norton Anti Virus
•   1992 The Michelangelo Virus
•   1994 Kaos4 virus spreads via adult websites.
•   1996 The Concept virus
•   1999 The Melissa Virus
•   2000 The I Love You Virus
•   2001 The Code Red Worm
•   2003 The Slammer Worm.
•   2004 MyDoom
BACKGROUND
 There are estimated 30,000 computer viruses in existence
 Over 300 new ones are created each month

 First virus was created to show loopholes in software



Virus through the Internet
  Today almost 87% of all viruses are spread through
   the internet (source: ZDNet)
  Transmission time to a new host is relatively
   low, on the order of hours to days
  “Latent virus”
SYMPTOMS OF VIRUS ATTACK
 Computer runs slower then usual
 Computer no longer boots up

 Screen sometimes flicker

 PC speaker beeps periodically

 System crashes for no reason

 Files/directories sometimes disappear

 Denial of Service (DOS)
TYPICAL THINGS THAT SOME CURRENT
PERSONAL COMPUTER (PC) VIRUSES DO
 Display a message.
 Erase files

 Scramble data on a hard disk

 Cause erratic screen behavior

 Halt the PC

 Many viruses do nothing obvious at all except spread!
PREVENTION OF VIRUS
• Most antivirus are capable of detecting and removal of
  major virus.
• Get the latest Anti-Virus Software.
• As prevention is concern use of any detection tool is
  preferred e.g. adware, spyware.
• Not to open any unknown source downloads. To prevent
  attacks.
• Even after using these precautions, if the virus creeps
  into your system, it can be detected in various ways
  apart from using a virus scanner for it.
• Always keep backup of your data/programs
• Keep floppies Write-protected (especially if they are
  bootable.)
WORMS
 The actual term "worm"' was first used in John Brunner’s
  1975 novel, The Shockwave Rider.
 A computer worm is a self-replicating malware
  computer program, which uses a computer network to
  send copies of itself to other nodes and it may do so
  without any user intervention.
 Unlike a computer virus, it does not need to attach itself
  to an existing program. Worms almost always cause at
  least some harm to the network, even if only by
  consuming bandwidth, whereas viruses almost always
  corrupt or modify files on a targeted computer.
HISTORY OF WORMS
 The  first worm to attract wide attention, the
  Morris worm, was written by Robert Tappan
  Morris, who at the time was a graduate student at
  Cornell University.
 It was released on November 2, 1988
 Morris himself was convicted under the US
  Computer Crime and Abuse Act and received
  three years probation, community service and a
  fine in excess of $10,000.
ANATOMY OF WORMS
   Attack Mechanism
   Payload
   New target selection
TYPES OF WORMS
   Conficker Worm
   Email and Instant Message Worms
   Internet Worms (Morris Worm)
   IRC Worms
   File-Sharing Network Worms
   Slapper Worm
HARMFUL EFFECTS OF WORMS
 A worm uses a compromised system to spread through
  email, file sharing networks, instant messenger, online
  chats and unprotected network shares.
 Infects files, corrupts installed applications and damages
  the entire system.
 Steals or discloses sensitive personal
  information, Valuable documents, passwords, etc.
 The worm installs a backdoor or drops other dangerous
  parasite.
 Connection speed & System performance.
TROJANS
 A Trojan horse or Trojan, is a destructive program that
  masquerades as an application.
 The Trojan Horse, at first glance will appear to be useful
  software but will actually do damage once installed or
  run on your computer.
 Trojans are also known to create a backdoor on your
  computer that gives malicious users access to your
  system.
 Unlike viruses and worms, Trojans do not reproduce by
  infecting other files nor do they self-replicate.
 Some well known Trojans:Net-bus,Girl friend, Back
  orrifice ,Flooder, Vundo Trojan etc.
PREVENTION OF WORMS
• A personal firewall should be run on any system that
is not behind a corporate firewall. This should be done
on any computer that connects to the internet.

•Patching your system with updates to fix the
vulnerabilities.

•Patching is the act of downloading updates to the
vulnerable operating system or application and
applying the update to the program.

•sometimes the worm can infect the system before the
anti-virus software can detect it.
TYPES OF TROJANS
1)   Remote access Trojans
2)   Password sending Trojans
3)   Keyloggers
4)   Destructive
5)   Denial of service(DOS) Attack Trojans
6)   Mail-Bomb Trojans
7)   Proxy-Wingate Trojans
8)   FTP Trojans
9)   Software Detection Trojans
WHAT TROJANS CAN DO?
 Use  of the machine as part of a Botnet (e.g. to
  perform automated spamming or to distribute
  Denial-of-service.)
 Uninstallation of software, including third-party
  router drivers.
 Downloading or uploading of files on the
  network hdd.
 Watching the user’s screen.
 Spreading other malware? Such as viruses. In
  this case? The Trojan horse is called a dropper or
  vector.
WHAT TROJANS CAN DO?
 Modification  or deletion of files.
 Data theft(e.g. retrieving username or postal
  code information)
 Erasing or overwriting data on a computer.

 Encrypting files in a crypto viral extortion
  attack.
 Crashing the computer.

 Corrupting files in a subtle way.

 Setting up networks of zombie computers in
  order to launch Dodos attacks or send spam.
WHAT TROJANS CAN DO?
 Spying   on the user of a computer and covertly
  reporting data like browsing habits to other
  people.
 Logging keystrokes to stealing formation such as
  passwords and credit card numbers (also known
  as a key logger)
 Phish for bank or other account details? Which
  can be used for criminal activities.
 Installing a backdoor on a computer system
DETECTION OF TROJANS
a)   Suspicious open ports:
b)   Monitoring outgoing traffic:
c)   Detection tools:
d)   Start up files:
PREVENTION OF TROJAN

• One of most important difference between
  Trojan and his friends is that it does not
  replicate.

• Thus limit the destruction.

• Anti-virus can detect and safely deleted
  the Trojan.
COUNTER-MEASURE OF
TROJAN,VIRUS,WORMS
  •Virus
    -Virus detection/disinfection software

  •Trojan
    -Sandboxing
    - Code reviews

  •Worms
    -Sandboxing
    -Quick patching: fix holes, stop worm
DIFFERENCE BETWEEN VIRUS,WORMS &
             TROJANS
               VIRUS           WORMS               TROJAN
             A computer       A computer
Definition                    WORM is a self-
                                                     S
             virus attaches                       A Trojan, is
             itself it        contained
                              program (or set     software that
             travels to a
                              of programs),       appears to
             program or       that is able to     perform a
             file             spread              desirable
             enabling it to   functional copies   function for
             spread from      of itself or its    the user prior
             one computer     segments to
                                                  to run or
             to another,      other computer
                              systems (usually
                                                  install, but
             leaving                              steals
             infections       via network
                              connections).       information or
                                                  harms the
                                                  system
VIRUS         WORMS      TROJANS
TYPES   1.Trojan Horse             1.Remote
        2.Worm         1. “host    Access
        3.Macro        computer    Trojans
                       worms” &    2.Data
                                   Sending
                      2.”network
                                   Trojans
                      worms”.
                                   3.Destructive
                                   Trojans
                                   4.Proxy
                                   Trojans
                                   5.FTP
                                   Trojans
                                   6.security
                                   software
                                   disabler
                                   Trojans
                                   7.DoS
                                   Trojans
VIRUS            WORMS            TROJANS
What they   virus may exist   the worm          cause serious
            on your           consumes too      damage by
do?         computer but it   much system       deleting files and
            actually cannot   memory (or        destroying
            infect your       network           information on
            computer unless   bandwidth),       your system.
            you run or open   causing Web
            the malicious     servers,
            program           network servers
                              and individual
                              computers to
                              stop responding




EXISTENCE       NOT     NOT                     INDEPENDENT
            INDEPENDENT INDEPENDENT
VIRUS            WORMS             TROJANS
SELF-       . A virus attaches a worm is self-        Unlike virus and
REPLICATION itself to, and     contained and          worms
                becomes part of,   does not need to   Trojans do not
                another            be part of         reproduce by
                executable         another program    infecting other
                program            to propagate       files nor do they
                                   itself.            self-replicate.
VIRUS              WORMS           TROJANS
Propagation
              virus does not     Worms           . Trojans are
              have a             propagate and   also known to
              propagation        infect other    create a
              vector. i.e., it   computers.      backdoor on
              will only effect                   your computer
              one host and                       that gives
              does not                           malicious users
              propagate to                       access to your
              other hosts.                       system,
                                                 possibly
                                                 allowing
                                                 confidential or
                                                 personal
                                                 information to
                                                 be
                                                 compromised
VIRUS    WORMS      TROJAN
EXAMPLE   Melissa   Nimda,       S
S                   Code Red   I Love You
BIBLIOGRAPHY

•Virus-
http:// en.wikipedia.org/wiki/Computer_virus
•Trojan
http:// en.wikipedia.org/wiki/Trojan_horse
•Worm-
http://en.wikipedia.org/wiki/Computer_worm
Trojan Horses -
http://www.mpsmits.com/highlights/trojan_horses.sh
tml
Internet Security

Contenu connexe

Tendances

Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)Sri Prasanna
 
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...Gyanmanjari Institute Of Technology
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithmUmesh Gupta
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating SystemsRitu Ranjan Shrivastwa
 
Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1NANDINI SHARMA
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacksJoe McCarthy
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system pptAchyut Sinha
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 

Tendances (20)

Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
 
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating Systems
 
Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Network Security
Network SecurityNetwork Security
Network Security
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Exam system
Exam systemExam system
Exam system
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Amazon search test case document
Amazon search test case documentAmazon search test case document
Amazon search test case document
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 

En vedette

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the emailGianni Fiore
 

En vedette (18)

virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 

Similaire à Internet Security

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 

Similaire à Internet Security (20)

Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Information security
Information securityInformation security
Information security
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Mitppt
MitpptMitppt
Mitppt
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 

Dernier

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Dernier (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 

Internet Security

  • 1. MOST RECENT ATTACKS BY VIRUS, WORMS & TROJANS
  • 2. INDEX  VIRUS • What Is Computer Virus? • History Of Computer Virus. • Background • Virus Through The Internet. • Symptoms Of Virus Attack. • Typical Things That Computer • Viruses Do. • Prevention of Virus.  WORMS • What Is Worms? • History Of Worms. • Anatomy of Worms. • Types Of Worms. • Harmful Effects Of Worms. • Prevention of Worms  TROJANS • What Are Trojans? • Types Of Trojans. • What Trojans Can Do. • Detection Of Trojans. • Prevention of Trojans  COUNTER-MEASURE OF TROJAN,VIRUS,WORMS  DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS
  • 3. VIRUS  A computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly used to refer to other types of malware, adware and spyware.  Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.  Once it’s running, it spreads by inserting copies of itself into other executable code or documents
  • 4. THE HISTORY OF COMPUTER VIRUSES • 1981 Apple Viruses 1, 2, & 3 • 1980’s Fred Cohen • 1987 Lehigh Virus • 1988 The first anti virus software • 1990 The first polymorphic viruses • 1991 Symantec releases Norton Anti Virus • 1992 The Michelangelo Virus • 1994 Kaos4 virus spreads via adult websites. • 1996 The Concept virus
  • 5. 1999 The Melissa Virus • 2000 The I Love You Virus • 2001 The Code Red Worm • 2003 The Slammer Worm. • 2004 MyDoom
  • 6. BACKGROUND  There are estimated 30,000 computer viruses in existence  Over 300 new ones are created each month  First virus was created to show loopholes in software Virus through the Internet  Today almost 87% of all viruses are spread through the internet (source: ZDNet)  Transmission time to a new host is relatively low, on the order of hours to days  “Latent virus”
  • 7. SYMPTOMS OF VIRUS ATTACK  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DOS)
  • 8. TYPICAL THINGS THAT SOME CURRENT PERSONAL COMPUTER (PC) VIRUSES DO  Display a message.  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread!
  • 9. PREVENTION OF VIRUS • Most antivirus are capable of detecting and removal of major virus. • Get the latest Anti-Virus Software. • As prevention is concern use of any detection tool is preferred e.g. adware, spyware. • Not to open any unknown source downloads. To prevent attacks. • Even after using these precautions, if the virus creeps into your system, it can be detected in various ways apart from using a virus scanner for it. • Always keep backup of your data/programs • Keep floppies Write-protected (especially if they are bootable.)
  • 10. WORMS  The actual term "worm"' was first used in John Brunner’s 1975 novel, The Shockwave Rider.  A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention.  Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 11. HISTORY OF WORMS  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
  • 12. ANATOMY OF WORMS  Attack Mechanism  Payload  New target selection
  • 13. TYPES OF WORMS  Conficker Worm  Email and Instant Message Worms  Internet Worms (Morris Worm)  IRC Worms  File-Sharing Network Worms  Slapper Worm
  • 14. HARMFUL EFFECTS OF WORMS  A worm uses a compromised system to spread through email, file sharing networks, instant messenger, online chats and unprotected network shares.  Infects files, corrupts installed applications and damages the entire system.  Steals or discloses sensitive personal information, Valuable documents, passwords, etc.  The worm installs a backdoor or drops other dangerous parasite.  Connection speed & System performance.
  • 15. TROJANS  A Trojan horse or Trojan, is a destructive program that masquerades as an application.  The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Trojans are also known to create a backdoor on your computer that gives malicious users access to your system.  Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.  Some well known Trojans:Net-bus,Girl friend, Back orrifice ,Flooder, Vundo Trojan etc.
  • 16. PREVENTION OF WORMS • A personal firewall should be run on any system that is not behind a corporate firewall. This should be done on any computer that connects to the internet. •Patching your system with updates to fix the vulnerabilities. •Patching is the act of downloading updates to the vulnerable operating system or application and applying the update to the program. •sometimes the worm can infect the system before the anti-virus software can detect it.
  • 17. TYPES OF TROJANS 1) Remote access Trojans 2) Password sending Trojans 3) Keyloggers 4) Destructive 5) Denial of service(DOS) Attack Trojans 6) Mail-Bomb Trojans 7) Proxy-Wingate Trojans 8) FTP Trojans 9) Software Detection Trojans
  • 18. WHAT TROJANS CAN DO?  Use of the machine as part of a Botnet (e.g. to perform automated spamming or to distribute Denial-of-service.)  Uninstallation of software, including third-party router drivers.  Downloading or uploading of files on the network hdd.  Watching the user’s screen.  Spreading other malware? Such as viruses. In this case? The Trojan horse is called a dropper or vector.
  • 19. WHAT TROJANS CAN DO?  Modification or deletion of files.  Data theft(e.g. retrieving username or postal code information)  Erasing or overwriting data on a computer.  Encrypting files in a crypto viral extortion attack.  Crashing the computer.  Corrupting files in a subtle way.  Setting up networks of zombie computers in order to launch Dodos attacks or send spam.
  • 20. WHAT TROJANS CAN DO?  Spying on the user of a computer and covertly reporting data like browsing habits to other people.  Logging keystrokes to stealing formation such as passwords and credit card numbers (also known as a key logger)  Phish for bank or other account details? Which can be used for criminal activities.  Installing a backdoor on a computer system
  • 21. DETECTION OF TROJANS a) Suspicious open ports: b) Monitoring outgoing traffic: c) Detection tools: d) Start up files:
  • 22. PREVENTION OF TROJAN • One of most important difference between Trojan and his friends is that it does not replicate. • Thus limit the destruction. • Anti-virus can detect and safely deleted the Trojan.
  • 23. COUNTER-MEASURE OF TROJAN,VIRUS,WORMS •Virus -Virus detection/disinfection software •Trojan -Sandboxing - Code reviews •Worms -Sandboxing -Quick patching: fix holes, stop worm
  • 24. DIFFERENCE BETWEEN VIRUS,WORMS & TROJANS VIRUS WORMS TROJAN A computer A computer Definition WORM is a self- S virus attaches A Trojan, is itself it contained program (or set software that travels to a of programs), appears to program or that is able to perform a file spread desirable enabling it to functional copies function for spread from of itself or its the user prior one computer segments to to run or to another, other computer systems (usually install, but leaving steals infections via network connections). information or harms the system
  • 25. VIRUS WORMS TROJANS TYPES 1.Trojan Horse 1.Remote 2.Worm 1. “host Access 3.Macro computer Trojans worms” & 2.Data Sending 2.”network Trojans worms”. 3.Destructive Trojans 4.Proxy Trojans 5.FTP Trojans 6.security software disabler Trojans 7.DoS Trojans
  • 26. VIRUS WORMS TROJANS What they virus may exist the worm cause serious on your consumes too damage by do? computer but it much system deleting files and actually cannot memory (or destroying infect your network information on computer unless bandwidth), your system. you run or open causing Web the malicious servers, program network servers and individual computers to stop responding EXISTENCE NOT NOT INDEPENDENT INDEPENDENT INDEPENDENT
  • 27. VIRUS WORMS TROJANS SELF- . A virus attaches a worm is self- Unlike virus and REPLICATION itself to, and contained and worms becomes part of, does not need to Trojans do not another be part of reproduce by executable another program infecting other program to propagate files nor do they itself. self-replicate.
  • 28. VIRUS WORMS TROJANS Propagation virus does not Worms . Trojans are have a propagate and also known to propagation infect other create a vector. i.e., it computers. backdoor on will only effect your computer one host and that gives does not malicious users propagate to access to your other hosts. system, possibly allowing confidential or personal information to be compromised
  • 29. VIRUS WORMS TROJAN EXAMPLE Melissa Nimda, S S Code Red I Love You