1 / 16

Computer Viruses

Computer Viruses. History. Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus. Historical Viruses. Brain VirDem Lehigh Chameleon – Polymorphic DAME VCL. More History. CDs make removal difficult Macro viruses

onslow
Download Presentation

Computer Viruses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Viruses

  2. History • Malicious software – 1970’s • Programs distributed over exchange servers speeds spread of viruses • Brain sparks term: Virus

  3. Historical Viruses • Brain • VirDem • Lehigh • Chameleon – Polymorphic • DAME • VCL

  4. More History • CDs make removal difficult • Macro viruses • Remote control becomes prevalent • Spread via email • Downloading and file sharing

  5. Virus Types and Descriptors • Resident • Direct Action • Overwrite • Boot Sector • Macro • Directory • Encrypted

  6. More Viruses • Polymorphic • Multipartite • File Infector • Companion • FAT • XSSV • Sentinel

  7. Even More Viruses • Stealth • Armored • Sparse Infector • Fast and Slow Infector • Worms • Trojan Horses • Logic Bombs • Hoaxes

  8. Anti-Virus • Searches for known viruses • Requirements • Bit-level work • Good error handling • Fast, dynamic life cycle • Also identifies suspicious behavior • Scans incoming and outgoing behavior

  9. Prevention and Aid • Techniques • Deletion • Quarantine • Repair • Polymorphic viruses make detection via dictionary difficult • Suspicious behavior’s advantages • Sandboxes and Blueprints

  10. Other Methods • Education • Email filtering • User knowledge

  11. Spyware • Definition • Symptoms • Methods of infection • Results • Phone home • Remote access • Zombie attacks

  12. Spyware • Rootkit • Sony • Prevention • Anti-spyware programs • Not always the most effective • Safe internet practices

  13. Survey • We surveyed 40 people on the Pace University Campus • We asked questions related to demographic information and regarding virus preparedness

  14. Male vs. Female

  15. Preparedness

  16. Conclusion • Viruses and Spyware pose an increasing threat • Prevention methods do not include software alone • Many methods which are common knowledge to those familiar with computers are not common practice

More Related