1 / 15

Intro to Malware Attacks

Intro to Malware Attacks . Symptoms of Virus Attack . Computer runs slower then usual Computer no longer boots up Screen occasionally flickers PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear Denial of Service (DoS).

Download Presentation

Intro to Malware Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intro to Malware Attacks

  2. Symptoms of Virus Attack • Computer runs slower then usual • Computer no longer boots up • Screen occasionally flickers • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Denial of Service (DoS)

  3. http://cagle.com/teacher/ http://www.cagle.com/news/hackers/hacker1.asp

  4. U.S. Businesses lost $5 billion to $6 billion due to computer viruses The following computers have been hacked: The Naval Ocean Systems Command NASA A British Nuclear Power Plant IBM The 2nd Circuit Court of AppealsCapitol Hill The Defense Data Network The White House At least 2 viruses infiltrated Allied computers in 1991 during the Gulf War

  5. There are an estimated 30,000 computer viruses in existence Over 300 new ones are created each month The first virus was created to show loopholes in software

  6. A biological virus injects itself into a cell and uses the cell's existing chemistry to reproduce itself. A computer virus “piggybacks” on top of a program or document and “reproduces” (executes). Once a virus is running, it’s able to infect other programs or documents.

  7. Worms and Trojan horses are actually more common today than viruses. Antivirus programs should offer protection against all viruses, worms, and Trojans. All of these types of programs are called malware.

  8. A virus first runs when another program is executed. The virus loads itself into memory and looks to see if it can find any other programs on the disk. If it finds one, it modifies the program, adding the virus code to the new program. Then the virus launches the "real program."

  9. The user does not know that the virus even ran. The virus has now reproduced itself, so now two programs are infected. The next time either of them is executed, they infect other programs, and the cycle continues.

  10. When the infected program is distributed by flash drive, uploaded to a website, or FTP’d as an executable, other computers and programs get infected. This is how a virus is spread.

  11. Viruses are programmed to damage the computer by destroying programs, deleting files, or reformatting the hard drive. There are many viruses operating on the Internet today, and new ones are introduced every day.

  12. Unlike biological viruses, computer viruses simply do not evolve by themselves. Computer viruses do not spontaneously generate, nor are they likely to be created by bugs in regular programming. They are deliberately created by programmers, or by people who use virus creation software. 􀀀

  13. Computer viruses can only do what the programmers have programmed them to do. Virus writers can have various reasons for creating and spreading malware.

  14. Viruses have been written as research projects, as pranks, or as malicious vandalism. Viruses have been written to attack the products of specific companies such as Microsoft.

  15. Viruses have been written to distribute political messages, or to gain financially from identity theft, through spyware, or via cryptoviral extortion. In this this type of attack a virus, worm, or trojan encrypts the victim's files and the user must pay the malware author to receive the key to get the files unencrypted.

More Related