1 / 13

Viruses

Viruses Juan Arriola CS-100 HISTORY

Olivia
Download Presentation

Viruses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Viruses Juan Arriola CS-100

  2. HISTORY • Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of mathematical automata in the 1940’s. Then the idea of viruses infecting computers and their programs emerged in the 1970’s leading to the first recorded case of the Brain virus at the University of Delaware in late 1987.

  3. What is a Virus? • A computer virus is a piece of software designed and written to make additional copies of itself and spread, typically without user knowledge or permission. • Some viruses display symptoms, and some cause damage to files in the system that have been infected. • Since a virus is code that was not intentionally installed by the user, there are no "good" viruses. • When a virus finds itself in a different environment than that for which it was written, a non-destructive virus can become destructive.

  4. There are 4 main classes of viruses: • Boot-sector viruses • Program file viruses • Multi-partite viruses • Macro viruses

  5. How Do Computers Become Infected? • Viruses can be hidden in programs available on floppy disks or CDs, hidden in email attachments or in material downloaded from the web. • Once the virus is active on the computer, it can copy itself to (infect) other files or disks as they are accessed by the user.

  6. How do they work? Viruses work in a multitude of different ways: • They can damage important operating system files • After infecting your computer, they spread themselves to other computers by using your Internet connection when you’re online. • They can collect important information about the users of the computers the viruses infect and send it back to the author

  7. How do they work? • They can send emails (without you even opening your email program) to everyone in your address book from you that contain the virus. • They can also spread through other connections that your computer maintains to the Internet. • They can produce annoying pop-up advertisements (even when you’re not on the Internet), they can crash websites, and pretty much anything else you can imagine.

  8. How do I get infected? • Most viruses infect computers through application files of some kind (attachment files with a .EXE or .SCR extension are the most typical). The user of the computer (you) has to physically open the application file. • Most viruses come through as an attachment to an email message. However, since 2003, viruses have become more advanced and can actually infect your computer through open connections to the Internet.

  9. Why do people write them? • People can write viruses to collect important information (like credit card numbers) for malicious intent, to see how many computers they can infect and, in some cases, people write viruses to crash websites (like the Blaster worm of August 2003 which was written to crash Microsoft’s website).

  10. Netsky Blaster Sobig Melissa Lovletter Chernobyl Klez Nimda Lirva What are some common computer viruses?

  11. NetskyWin32.Netsky.ABWin32.Netsky.ACWin32.Netsky.BWin32.Netsky.CWin32.Netsky.DWin32.Netsky.PWin32.Netsky.QWin32.Netsky.SWin32.Netsky.TWin32.Netsky.WWin32.Netsky.YNetskyWin32.Netsky.ABWin32.Netsky.ACWin32.Netsky.BWin32.Netsky.CWin32.Netsky.DWin32.Netsky.PWin32.Netsky.QWin32.Netsky.SWin32.Netsky.TWin32.Netsky.WWin32.Netsky.Y Msblast:Win32.Msblast.A BugBear:Win32.BugBear.A@mmWin32.BugBear.B@mmKlez:Win32.Klez.E@mmWin32.Klez.H@mmWin32.Klez.D@mmWin32.Klez.A@mm CodeRed:Win32.IISWorm.CodeRed.F Viruses Names

  12. Anti-Virus software Scan your computer on a regular basis Update your Anti-Virus Software on a regular basis Backup your files on a regular basis Scan & Protect Floppy Disks Scan E-mail Attachments Beware of E-mailAttachments from unknown sources Be Alert Safe Computing practices!

  13. Resources Cited: • www.bullguard.com • www.sophos.com • www.mcafee.com • http://www.trendmicro.com

More Related