1 / 37

COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES

COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES. SEQUENCE OF PRESENTATION. COMPUTER VIRUS. * WHAT IS COMPUTER VIRUS ?. ?. SEQUENCE OF PRESENTATION. COMPUTER VIRUS. * VIRUS (ROGUE SOFTWARE). I. SEQUENCE OF PRESENTATION. COMPUTER VIRUS. * WHO ARE ROGUE PROGRAMMERS ?.

fritzi
Download Presentation

COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES

  2. SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT IS COMPUTER VIRUS ? ?

  3. SEQUENCE OF PRESENTATION COMPUTER VIRUS * VIRUS (ROGUE SOFTWARE) I

  4. SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ?

  5. SEQUENCE OF PRESENTATION COMPUTER VIRUS * TYPES OF COMPUTER VIRUS

  6. SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT ALL CAN THEY DO ?

  7. SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW DO THEY INFECT ?

  8. SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW NOTICE ? V I S R U

  9. SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT TO DO ? NO ! VIRUS

  10. SEQUENCE OF PRESENTATION COMPUTER VIRUS * LAST WORD

  11. SEQUENCE OF PRESENTATION COMPUTER VIRUS * CONCLUSION

  12. WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ”

  13. WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS * BE A SET OF COMPUTER INSTRUCTIONS * BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS

  14. COMPUTER COMPONENTS COMPUTER VIRUS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE

  15. ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION * THE TROJAN HORSE - APPEARS TO BE USEFUL * WORMS - TRAVEL IN NETWORK * REPLICATORS - COPY ITSELF TO EXHAUST DISK * CHAMELEONS - M ISCHIEF

  16. ROGUE ROGUE SOFTWARE SOFTWARE * TIME BOMBS - EXPLODE ON TIME / DATE * LOGIC BOMBS - EXPLODE ON LOGIC * SOFTWARE BOMBS - EXPLODE ON LAUNCH

  17. WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PSYCHO CASES - FOR FUN - RELEASE ANGER - TAKE REVENGE

  18. WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET

  19. WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK

  20. TYPES OF COMPUTER VIRUS COMPUTER VIRUS * BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT

  21. WHAT CAN THEY DO ? COMPUTER VIRUS • FORMAT DISK • COPY, RENAME AND DELETE FILES • COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION • MODIFY FILE DATES AND EXTENSIONS • CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES

  22. HOW DO THEY DO ? COMPUTER VIRUS • APPENDING • INSERTION • INTERCEPTION • REDIRECTION • REPLACEMENT

  23. HOW DO YOU NOTICE ? COMPUTER VIRUS

  24. HOW DO YOU NOTICE ? COMPUTER VIRUS • COMPUTER OPERATION BECOMES SLUGGISH • PROGRAMS TAKE LONGER TO LOAD • PROGRAMS ACCESS MULTIPLE DISK DRIVES • UNUSUAL AND FREQUENT ACCESS TO DISK • DISK SPACE DECREASES RAPIDLY • BAD DISK SECTORS STEADILY INCREASE • RAM DECREASES SUDDENLY OR STEADILY • COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES

  25. HOW DO YOU NOTICE ? COMPUTER VIRUS • PROGRAMS ENCOUNTER ERRORS • PROGRAMS GENERATE UNDOCUMENTED ERRORS • FILES REPLACED WITH GARBAGE • FILES MYSTERIOUSLY DISAPPEAR • FILE ATTRIBUTES AND DATA CHANGE • DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR

  26. WHAT TO DO ? • ANTI VIRUS TECHNIQUES

  27. WHAT TO DO ? COMPUTER ANTI VIRUS • SAFE COMPUTING METHODS • ANTIVIRUS SOFTWARE SYSTEMS • PREVENTION SYSTEM • DETECTION SYSTEM • SURGICAL APPROACH

  28. - BOOT FROM FLOPPY DISK - DISCOURAGE PIRATED SOFTWARE - TAKE BACKUP WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS * YOU MUST

  29. WHAT TO DO ? COMPUTER ANTI VIRUS SAFE COMPUTING METHODS • YOU MAY • USE PRE RUN CHECKUPS • CHANGE FILE ATTRIBUTES • REINITIALIZE SYSTEM • REINSTALL APPLICATIONS • REFORMAT HARD DISK • OBSERVE OPERATION TIMINGS • LOG DISK SPACE • LOG BAD SECTORS

  30. WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS COMPUTER ANTI VIRUS • PREVENTION SYSTEMS • TO STOP VIRUS ATTACKS IN REAL TIME • BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING • PASSWORD PROTECTION • SLOW SPEED • UNNECESSARY INTERRUPTS • CAN BE INFECTED BY VIRUS • HEAVY ON RAM

  31. WHAT TO DO ? COMPUTER ANTI VIRUS ANTIVIRUS SOFTWARE SYSTEMS • DETECTION SYSTEMS • LOAD, RUN AND EXIT • CHECK PROGRAM BEFORE EXECUTION • COMPLEMENT PREVENTION SYSTEM • PROGRAM SPECIFIC AND GENERIC

  32. WHAT TO DO ? SOME ANTIVIRUS SOFTWARE COMPUTER ANTI VIRUS • VACCINES • ANTIDOTES • FILE COMPARISON UTILITIES • VIRUS SCANNERS • DISK MAPPERS • MEMORY RESIDENT ANTIVIRUS PROGRAMS

  33. WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS

  34. SURGICAL APPROACH • Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS • DISINFECT THE EMPTY HOUSE • CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE • START NORMAL LIFE

  35. THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY

  36. CONCLUSION“LEARN TO LIVE WITH IT” • SAFE COMPUTING TECHNIQUES • MANAGE SOFTWARE PIRACY • EDUCATE USERS • KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS • REVIEW SITUATION

More Related