1 / 12

Done By:Salha Mohammed Obaid AL- kaabi ID:201211567

Done By:Salha Mohammed Obaid AL- kaabi ID:201211567. Content. What is virus? Type of virus Trojan Horses Popular Trojan horses Worm Example of Worm(Code Red ) To keep your computer and data secure Type of antivirus software References. What is Virus?.

wood
Download Presentation

Done By:Salha Mohammed Obaid AL- kaabi ID:201211567

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Done By:Salha Mohammed Obaid AL-kaabi ID:201211567

  2. Content • What is virus? • Type of virus • Trojan Horses • Popular Trojan horses • Worm • Example of Worm(Code Red) • To keep your computer and data secure • Type of antivirus software • References

  3. What is Virus? • A virus is a small piece of software that piggybacks on real programs. • All viruses are attached to an executablefile, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.

  4. Type of Virus • File infector virus • Infect program files • Boot sector virus • Infect the system area of a disk • Master boot record virus • infect disks in the same manner as boot sector viruses. • Multi-partite virus • infect both boot records and program files • Macro virus • infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access files

  5. Trojan Horses • It is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer.

  6. Popular Trojan horses • Netbus(by Carl-Fredrik Neikter) • Subseven or Sub7(by Mobman) • Y3K Remote Administration Tool (by Konstantinos & EvangelosTselentis) • Back Orifice (Sir Dystic) • Beast • Zeus • The Blackhole exploit kit • Flashback Trojan (Trojan.BackDoor.Flashback)

  7. Worm • Small piece of software that uses computer networks and security holes to replicate itself. • Copy itself to the new machine using the security hole and start replicating. • The worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

  8. Example of Worm(Code Red) • Code Red made huge headlines in 2001. Code Red designed to do three things: • Replicate itself for the first 20 days of each month. • Replace web pages on infected servers with a page that declares “Hacked by Chinese” • Launch a concreted attack on the White House Web server

  9. To keep your computer and data secure • Four steps to keep your computer and your data secure:1. Get the latest Anti-Virus Software.2. Make sure you have the latest security patches and hot fixes using Windows Update.3. Use a Host-Based Firewall.4. Back up your Important Files.

  10. Type of antivirus software

  11. Video about Virus, Worm and Trojan

  12. References • http://www.ust.hk/itsc/antivirus/general/whatis.html • http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp • http://computer.howstuffworks.com/virus.htm

More Related