SlideShare une entreprise Scribd logo
1  sur  49
MGC COLLEGE OF ARTS AND
SCIENCE
BCA-1st year
VIRUS
What is a VIRUS ?
 A Computer virus is a malware program that,
when executed, replicates by inserting copies
of itself (possibly modified) into other
computer programs, data files, or the boot
sector of the hard drive; when this replication
succeeds, that affected the areas are then
said to be "infected".
 It is a self-replicating program that can cause
damage to data and files stored on your
computer.
History of virus
The term “Computer virus” was formally defined by Fred Cohen
in 1983, while he performed academic experiments on a Digital
Equipment Corporation VAX system.
Viruses are classified as being one of two types: research or “in the wild”.
The first computer viruses were developed in the early 1980s. The first
viruses found in the wild were Apple II viruses, such as Elk Cloner, which was
reported in 1981.
Viruses have now been found on the following platforms:
 Apple II
 IBM PC
 Macintosh
 Atari
 Amiga
Function of virus
1) Viruses function have “evolved” over the
Infect the efforts to make the code more
difficult to detect, disassemble, and
eradicate.
2) 6 new viruses are found each day. 57000
known virus programs are in existence.
3) These are programs written by programmers
with great programming skills who are
motivated by the need for a challenge or to
cause destruction.
Virus Expandable using EXE & COM Files
The first IBM-PC virus appeared in 1986; this was the Brain virus. Brain
was a boot sector virus and remained resident. These viruses expanded
the target executables to include COM and EXE files.
Cascade was encrypted to deter disassembly and detection. Variable
encryption appeared in 1989 with the 1260 virus. Stealth viruses, which
employ various techniques to avoid detection, also first appeared in 1989,
such as Zero Bug, Dark Avenger and Frodo (4096 or 4K). In 1990, self-
modifying viruses, such as Whale were introduced.
The year 1991 brought the GP1 virus, which is “network-sensitive” and
attempts to steal Novell NetWare passwords. Since their inception,
viruses have become increasingly complex
Three Reason of virus spreading are,
Software bugs
Because software is often designed with security features to prevent
unauthorized use of system resources, many viruses must exploit
and manipulate security bugs (security defects) in system or
application software to spread and infect. Software development
strategies that produce large numbers of bugs will generally also
produce potential exploits.
Social engineering and poor security practices
In order to replicate itself, a virus must be permitted to execute
code and write to memory. For this reason, many viruses attach
themselves to executable files that may be part of legitimate
programs (see code injection). If a user attempts to launch an
infected program, the virus' code may be executed simultaneously.
Infection targets and replication techniques
Computer viruses infect a variety of different subsystems on their hosts.[27] One manner
of classifying viruses is to analyze whether they reside in binary executables (such as
.EXE or .COM files), data files (such as Microsoft Word documents or PDF files), or in the
boot sector of the host's hard drive
Resident vs. non-resident viruses:
Resident viruses overwrite interrupt handling code or other functions, and when the
operating system attempts to access the target file or disk sector, the virus code intercepts
the request and redirects the control flow to the replication module, infecting the target.
Macro viruses:
Many common applications, such as Microsoft Outlook and Microsoft Word, allow macro
programs to be embedded in documents or emails, so that the programs may be run
automatically when the document is opened. This is one of the reasons that it is dangerous
to open unexpected attachments in e-mails
Boot sector viruses:
Boot sector viruses specifically target the boot sector/Master Boot Record (MBR) of the
host's hard drive or removable storage media (flash drives, floppy disks, etc.).
The following is a history of
some of the most famous viruses
and malware ever:
1949 – 1966 – Self-
Reproducing Automata:
Self-replicating programs were established in 1949, to produce a large
number of viruses, John von Neumann, whose known to be the “Father
of Cybernetics”, wrote an article on the “Theory of Self-Reproducing
Automata” that was published in 1966
1959 – Core Wars:
A computer game was programmed in Bell Laboratory by Victor Vygotsky,
H. Douglas McIlroy and Robert P Morris. They named it Core Wars. In this
game, infectious programs named organisms competed with the
processing time of PC.
1971 – The Creeper:
Bob Thomas developed an experimental self-replicating program. It accessed through
ARPANET (The Advanced Research Projects Agency Network) and copied to a remote
host systems with TENEX operating system. A message displayed that “I’m the creeper,
catch me if you can!”. Another program named Reaper was created to delete the
existing harmful program the Creeper.
1974 – Wabbit (Rabbit):
This infectious program was developed to make multiple copies of itself
on a computer clogging the system reducing the performance of the
computer.
1974 – 1975 – ANIMAL:
John Walker developed a program called ANIMAL for the UNIVAC 1108.
This was said to be a non-malicious Trojan that is known to spread
through shared tapes.
1981- Elk Cloner:
A program called the “Elk Cloner” was developed by Richard Skrenta for
the Apple II Systems. This was created to infect Apple DOS 3.3. These
programs started to spread through files and folders that are transferred
to other computers by floppy disk
1983
This was the year when the term “Virus” was coined by Frederick Cohen
for the computer programs that are infectious as it has the tendency to
replicate.
1986 – Brain:
This is a virus also known as the “Brain boot sector”, that is compatible
with IBM PC was programmed and developed by two Pakistani
programmers Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.
1987- Lehigh:
This virus was programmed to infect command.com files from Yale
University.
Cascade:
This virus is a self-encrypted file virus which was the outcome of IBM’s
own antivirus product.
Jerusalem Virus:
This type of virus was first detected in the city of Jerusalem. This was
developed to destroy all files in an infected computers on the thirteenth
day that falls on a Friday.
1988 – The Morris Worm:
This type of worm was created by Robert Tappan Morris to infect DEC VAX
and Sun machines running BSD UNIX through the Internet. This is best
known for exploiting the computers that are prone to buffer overflow
vulnerabilities.
1990
Symantec launched one of the first antivirus programs called the Norton
Antivirus, to fight against the infectious viruses. The first family of
polymorphic virus called the Chameleon was developed by Ralf Burger.
1995 – Concept:
This virus name Concept was created to spread and attack Microsoft
Word documents
1996
A macro virus known as Laroux was developed to infect Microsoft Excel
Documents, A virus named Baza was developed to infect Windows 95 and
Virus named Staog was created to infect Linux
1998 CIH Virus:
The release of the first version of CIH viruses developed by Chen Ing Hau
from Taiwan.
IT CORRUPTS THE DATA
1999 Happy99:
This type of worm was developed to attach itself to emails with a
message Happy New Year. Outlook Express and Internet Explorer on
Windows 95 and 98 were affected
2000 – ILOVEYOU:
The virus is capable of deleting files in JPEGs, MP2, or MP3 formats
2001 – Anna Kournikova:
This virus was spread by emails to the contacts in the compromised
address book of Microsoft Outlook. The emails purported to contain
pictures of the very attractive female tennis player, but in fact hid a
malicious virus.
2002 – LFM-926:
This virus was developed to infect Shockware Flash files.
Beast or RAT:
This is backdoor Trojan horse and is capable of infecting all versions of
Windows OS.
2004 – My Doom:
This infectious worm also called the Novang. This was developed to share
files and permits hackers to access to infected computers. It is known as
the fastest mailer worm.
service attack of “Mail Transaction Failed”
2005 – Samy XXA:
This type of virus was developed to spread faster and it is known to
infect the Windows family.
2006 – OSX/Leap-A:
This was the first ever known malware discovered against Mac OS X.
Nyxem:
This type of worm was created to spread by mass-mailing, destroying
Microsoft Office files.
2007 – Storm Worm:
This was a fast spreading email spamming threat against Microsoft
systems that compromised millions of systems.
Storm worm as the number of this dangerous malware
infected PCs was close to 10 million.
Zeus:
This is a type of Trojan that infects used capture login credentials from
banking web sites and commit financial fraud.
2008 – Koobface:
This virus was developed and created to target Facebook and My Space
users.
2010 – Kenzero:
The is a virus that spreads online between sites through browsing history.
2013 – Cryptolocker:
This is trojan horse encrypts the files infected machine and demands a
ransom to unlock the files.
2014 – Backoff:
Malware designed to compromise Point-of-Sale (POS) systems to steal
credit card data.
Sad to say, the history will continue.
That makes keeping up with the latest
antivirus and firewall technology ever so
important.
Today the computer hacker introduced
the virus in three different ways
The Virus, Trojan, Spyware are used
crack a particular or specific file hack
and use the Application (i.e. Cost
Antivirus, Programs, Social sites) in
“legal” actions within the context of
the operating system and to share the
file with each other and etc. . While
more stringent controls are in place on
multi-tasking, multi-user operating
systems, configuration errors, and
security holes (security bugs) make
viruses on these systems more than
theoretically possible.
For example Watch this video
Causes
If one of the infected programs is given to another
person on a pen drive, or if it is uploaded so other
people can download it, then other programs get
infected. This is how the virus spreads -- similar to the
infection phase of a biological virus. But viruses
wouldn't be so violently despised if all they did was
replicate themselves. Most viruses also have a
destructive attack phase where they do real damage.
Some sort of trigger will activate the attack phase,
and the virus will then do something -- anything from
displaying a silly message on the screen to erasing all
of your data. The trigger might be a specific date, a
number of times the virus has been replicated or
something similar.
Damaged
Computer viruses currently cause billions of dollars'
worth of economic damage each year, due to causing
systems failure, wasting computer resources, corrupting
data, increasing maintenance costs, etc. In response,
free, open-source antivirus tools have been developed,
and an industry of antivirus software has cropped up,
selling or freely distributing virus protection to users of
various operating systems. Even though no currently
existing antivirus software is able to uncover all
computer viruses (especially new ones), computer
security researchers are actively searching for new ways
to enable antivirus solutions to more effectively detect
emerging viruses, before they have already become
widely distributed.
Recovery strategies and methods
 Back up
 If a backup session on optical media like CD and DVD is closed, it
becomes read-only and can no longer be affected by a virus
 Virus removal
 Many websites run by antivirus software companies provide free
virus scanning by limited cleaning facilities (the purpose of the sites
is to sell antivirus products).
 Operating system reinstallation:
 Microsoft's System File Checker (improved in Windows 7 and later)
can be used to check for, and repair, corrupted system files
Conclusion:
1)Viruses exploit weaknesses in operating system
controls and human patterns of system
use/misuse.
2)Destructive viruses are more likely to be
eradicated.
3)An innovative virus may have a larger initial
window to propagate before it is discovered and
the “average” anti-viral product is modified to
detect or eradicate it.
Thank you
Art
by
Ammy Vijay. B

Contenu connexe

Tendances

Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 

Tendances (20)

Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 

En vedette

Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

En vedette (20)

Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Antivirus
AntivirusAntivirus
Antivirus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Similaire à History of Computer Virus

Similaire à History of Computer Virus (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Viruses
VirusesViruses
Viruses
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Computer virus
Computer virusComputer virus
Computer virus
 
εργασια
εργασιαεργασια
εργασια
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 

Dernier

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 

Dernier (20)

What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 

History of Computer Virus

  • 1. MGC COLLEGE OF ARTS AND SCIENCE BCA-1st year
  • 3. What is a VIRUS ?  A Computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, that affected the areas are then said to be "infected".  It is a self-replicating program that can cause damage to data and files stored on your computer.
  • 4. History of virus The term “Computer virus” was formally defined by Fred Cohen in 1983, while he performed academic experiments on a Digital Equipment Corporation VAX system. Viruses are classified as being one of two types: research or “in the wild”. The first computer viruses were developed in the early 1980s. The first viruses found in the wild were Apple II viruses, such as Elk Cloner, which was reported in 1981. Viruses have now been found on the following platforms:  Apple II  IBM PC  Macintosh  Atari  Amiga
  • 5. Function of virus 1) Viruses function have “evolved” over the Infect the efforts to make the code more difficult to detect, disassemble, and eradicate. 2) 6 new viruses are found each day. 57000 known virus programs are in existence. 3) These are programs written by programmers with great programming skills who are motivated by the need for a challenge or to cause destruction.
  • 6. Virus Expandable using EXE & COM Files The first IBM-PC virus appeared in 1986; this was the Brain virus. Brain was a boot sector virus and remained resident. These viruses expanded the target executables to include COM and EXE files. Cascade was encrypted to deter disassembly and detection. Variable encryption appeared in 1989 with the 1260 virus. Stealth viruses, which employ various techniques to avoid detection, also first appeared in 1989, such as Zero Bug, Dark Avenger and Frodo (4096 or 4K). In 1990, self- modifying viruses, such as Whale were introduced. The year 1991 brought the GP1 virus, which is “network-sensitive” and attempts to steal Novell NetWare passwords. Since their inception, viruses have become increasingly complex
  • 7. Three Reason of virus spreading are, Software bugs Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit and manipulate security bugs (security defects) in system or application software to spread and infect. Software development strategies that produce large numbers of bugs will generally also produce potential exploits. Social engineering and poor security practices In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to launch an infected program, the virus' code may be executed simultaneously.
  • 8. Infection targets and replication techniques Computer viruses infect a variety of different subsystems on their hosts.[27] One manner of classifying viruses is to analyze whether they reside in binary executables (such as .EXE or .COM files), data files (such as Microsoft Word documents or PDF files), or in the boot sector of the host's hard drive Resident vs. non-resident viruses: Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target. Macro viruses: Many common applications, such as Microsoft Outlook and Microsoft Word, allow macro programs to be embedded in documents or emails, so that the programs may be run automatically when the document is opened. This is one of the reasons that it is dangerous to open unexpected attachments in e-mails Boot sector viruses: Boot sector viruses specifically target the boot sector/Master Boot Record (MBR) of the host's hard drive or removable storage media (flash drives, floppy disks, etc.).
  • 9. The following is a history of some of the most famous viruses and malware ever:
  • 10. 1949 – 1966 – Self- Reproducing Automata: Self-replicating programs were established in 1949, to produce a large number of viruses, John von Neumann, whose known to be the “Father of Cybernetics”, wrote an article on the “Theory of Self-Reproducing Automata” that was published in 1966
  • 11. 1959 – Core Wars: A computer game was programmed in Bell Laboratory by Victor Vygotsky, H. Douglas McIlroy and Robert P Morris. They named it Core Wars. In this game, infectious programs named organisms competed with the processing time of PC.
  • 12. 1971 – The Creeper: Bob Thomas developed an experimental self-replicating program. It accessed through ARPANET (The Advanced Research Projects Agency Network) and copied to a remote host systems with TENEX operating system. A message displayed that “I’m the creeper, catch me if you can!”. Another program named Reaper was created to delete the existing harmful program the Creeper.
  • 13. 1974 – Wabbit (Rabbit): This infectious program was developed to make multiple copies of itself on a computer clogging the system reducing the performance of the computer.
  • 14. 1974 – 1975 – ANIMAL: John Walker developed a program called ANIMAL for the UNIVAC 1108. This was said to be a non-malicious Trojan that is known to spread through shared tapes.
  • 15. 1981- Elk Cloner: A program called the “Elk Cloner” was developed by Richard Skrenta for the Apple II Systems. This was created to infect Apple DOS 3.3. These programs started to spread through files and folders that are transferred to other computers by floppy disk
  • 16. 1983 This was the year when the term “Virus” was coined by Frederick Cohen for the computer programs that are infectious as it has the tendency to replicate.
  • 17. 1986 – Brain: This is a virus also known as the “Brain boot sector”, that is compatible with IBM PC was programmed and developed by two Pakistani programmers Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.
  • 18. 1987- Lehigh: This virus was programmed to infect command.com files from Yale University.
  • 19. Cascade: This virus is a self-encrypted file virus which was the outcome of IBM’s own antivirus product.
  • 20. Jerusalem Virus: This type of virus was first detected in the city of Jerusalem. This was developed to destroy all files in an infected computers on the thirteenth day that falls on a Friday.
  • 21. 1988 – The Morris Worm: This type of worm was created by Robert Tappan Morris to infect DEC VAX and Sun machines running BSD UNIX through the Internet. This is best known for exploiting the computers that are prone to buffer overflow vulnerabilities.
  • 22. 1990 Symantec launched one of the first antivirus programs called the Norton Antivirus, to fight against the infectious viruses. The first family of polymorphic virus called the Chameleon was developed by Ralf Burger.
  • 23. 1995 – Concept: This virus name Concept was created to spread and attack Microsoft Word documents
  • 24. 1996 A macro virus known as Laroux was developed to infect Microsoft Excel Documents, A virus named Baza was developed to infect Windows 95 and Virus named Staog was created to infect Linux
  • 25. 1998 CIH Virus: The release of the first version of CIH viruses developed by Chen Ing Hau from Taiwan. IT CORRUPTS THE DATA
  • 26. 1999 Happy99: This type of worm was developed to attach itself to emails with a message Happy New Year. Outlook Express and Internet Explorer on Windows 95 and 98 were affected
  • 27. 2000 – ILOVEYOU: The virus is capable of deleting files in JPEGs, MP2, or MP3 formats
  • 28. 2001 – Anna Kournikova: This virus was spread by emails to the contacts in the compromised address book of Microsoft Outlook. The emails purported to contain pictures of the very attractive female tennis player, but in fact hid a malicious virus.
  • 29. 2002 – LFM-926: This virus was developed to infect Shockware Flash files.
  • 30. Beast or RAT: This is backdoor Trojan horse and is capable of infecting all versions of Windows OS.
  • 31. 2004 – My Doom: This infectious worm also called the Novang. This was developed to share files and permits hackers to access to infected computers. It is known as the fastest mailer worm. service attack of “Mail Transaction Failed”
  • 32. 2005 – Samy XXA: This type of virus was developed to spread faster and it is known to infect the Windows family.
  • 33. 2006 – OSX/Leap-A: This was the first ever known malware discovered against Mac OS X.
  • 34. Nyxem: This type of worm was created to spread by mass-mailing, destroying Microsoft Office files.
  • 35. 2007 – Storm Worm: This was a fast spreading email spamming threat against Microsoft systems that compromised millions of systems. Storm worm as the number of this dangerous malware infected PCs was close to 10 million.
  • 36. Zeus: This is a type of Trojan that infects used capture login credentials from banking web sites and commit financial fraud.
  • 37. 2008 – Koobface: This virus was developed and created to target Facebook and My Space users.
  • 38. 2010 – Kenzero: The is a virus that spreads online between sites through browsing history.
  • 39. 2013 – Cryptolocker: This is trojan horse encrypts the files infected machine and demands a ransom to unlock the files.
  • 40. 2014 – Backoff: Malware designed to compromise Point-of-Sale (POS) systems to steal credit card data.
  • 41. Sad to say, the history will continue. That makes keeping up with the latest antivirus and firewall technology ever so important.
  • 42. Today the computer hacker introduced the virus in three different ways The Virus, Trojan, Spyware are used crack a particular or specific file hack and use the Application (i.e. Cost Antivirus, Programs, Social sites) in “legal” actions within the context of the operating system and to share the file with each other and etc. . While more stringent controls are in place on multi-tasking, multi-user operating systems, configuration errors, and security holes (security bugs) make viruses on these systems more than theoretically possible.
  • 43. For example Watch this video
  • 44. Causes If one of the infected programs is given to another person on a pen drive, or if it is uploaded so other people can download it, then other programs get infected. This is how the virus spreads -- similar to the infection phase of a biological virus. But viruses wouldn't be so violently despised if all they did was replicate themselves. Most viruses also have a destructive attack phase where they do real damage. Some sort of trigger will activate the attack phase, and the virus will then do something -- anything from displaying a silly message on the screen to erasing all of your data. The trigger might be a specific date, a number of times the virus has been replicated or something similar.
  • 45. Damaged Computer viruses currently cause billions of dollars' worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems. Even though no currently existing antivirus software is able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.
  • 46. Recovery strategies and methods  Back up  If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus  Virus removal  Many websites run by antivirus software companies provide free virus scanning by limited cleaning facilities (the purpose of the sites is to sell antivirus products).  Operating system reinstallation:  Microsoft's System File Checker (improved in Windows 7 and later) can be used to check for, and repair, corrupted system files
  • 47. Conclusion: 1)Viruses exploit weaknesses in operating system controls and human patterns of system use/misuse. 2)Destructive viruses are more likely to be eradicated. 3)An innovative virus may have a larger initial window to propagate before it is discovered and the “average” anti-viral product is modified to detect or eradicate it.