300 likes | 698 Views
BULD BRIGHT UNIVERSITY. Faculty of Science and Technology. សាកលវិទ្យាល័យបៀលប្រាយ. Understanding Virus and Attack Techniques. ប្រធាន បទ :. សាស្ត្រាចារ្យ អ៊ូផា ន់ណារឹទ្ធ. ដឹកនាំដោយ ៖. រៀបរៀងដោយ ៖. និស្សិត ឌុច ហុងម៉េង. និស្សិត ជា ពិសិដ្ឋ . និស្សិត យឺ សុវណ្ណ .
E N D
BULD BRIGHT UNIVERSITY Faculty of Science and Technology សាកលវិទ្យាល័យបៀលប្រាយ Understanding Virus and Attack Techniques ប្រធានបទ : សាស្ត្រាចារ្យ អ៊ូផាន់ណារឹទ្ធ ដឹកនាំដោយ ៖ រៀបរៀងដោយ ៖ និស្សិត ឌុច ហុងម៉េង និស្សិត ជាពិសិដ្ឋ និស្សិត យឺសុវណ្ណ និស្សិត សរឺទ្ធិស័ក្ក និស្សិត ឆាន់ សុភ័ក្រ និស្សិតជំនាន់ទី ១១ ឆ្នាំទី ៤ ឆមាសទី១ ក្រុម D1 ឆ្នាំសិក្សារ ២០១៣~២០១៤
What is a computer virus? • Exist over the past few years • There are over 10,000 known computer viruses • Over 200 new viruses are being discovered every month • hidden program, which invades your computer • Has the potential to cause damage and/or perform unwanted/unauthorized functions.
How does a virus work? • A computer virus performs two basic functions • It copies itself from machine to machine (self reproducing) • It executes the instructions the perpetrator has planned.
A computer virus exhibits three characteristics: • a replication mechanism • an activation mechanism • an objective
What damage can a virus do? • computer virus can cause unwanted alteration • computer virus can loss of data • annoy the user • destroy all your data files • yourmachine can even be rendered unusable
How do they spread? Viruses are usually spread by media/programs swapped.
Kind of viruses • Encrypted Viruses : most difficult kind of bug to detect and the most difficult to stop • Secret Viruses : make changes to files on your computer, or completely replace files • Time Delay Viruses • The Anti-Virus Virus • The Multi-Headed Virus
Kind of viruses (continue) • The Misdirection Virus • A Cloning Virus • The Author Virus • The Bad Penny Virus • Rewriting Virus • The Melissa Virus End Type of Viruses
Show file hid from USB Flash To unhide file in USB Flash • Run=> cmd.exe • F: or G: (Drive USB Flash) : => hit Enter • F:> attrib -s -h /s /d *.* => hit Enter
What is attack ? In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset
Unauthorized Access Attack • Spoofing • Hopping • DoS • DDoS • Spam Mail • Malicious Code • Cross Site Scripting Attack
Spoofing Typical example • Use of other people’s user IDs/passwords without permission
Resource : • http://en.wikipedia.org • http://www.secudemy.com • http://www.google.com • Chapter03-Unauthorized.Access.Method
Thank You For Listening And Join This Event !.. Good Luck !