400 likes | 657 Views
Viruses, Hacking, and AntiVirus. What is a Virus?. A type of Malware Malware is short for malicious software A virus – a computer program Can replicate itself Spread from one computer to another. First Viruses. Creeper Virus detected on ARPANET
E N D
What is a Virus? • A type of Malware • Malware is short for malicious software • A virus – a computer program • Can replicate itself • Spread from one computer to another
First Viruses Creeper Virus detected on ARPANET Would display “I'm the creeper, catch me if you can!“ “Elk Cloner” – attach to Apple DOS 3.3 OS and spread via floppy disk
Types of Viruses Viruses that infects popularly traded software Macro Viruses: written in scripting languages for Microsoft programs such as Word and Excel Viruses in Executables
How Your Computer Gets Infected Binary Executable files (DLL’s, EXE’s) An external, physical device General Purpose Script files System Specific Autorun Script files Documents that contain Macros Exploitable bugs in a program Links to malicious code in PDFs, HTML, other documents
An Example A file could be named “picture.png.exe” When opened, the program runs and infects computer Spoofing an email address to make it sound legitimate so you’ll download and open an attachment
Malware Includes viruses, worms, trojan horses, spyware, adware
Purpose of Malware Used to steal personal, financial, or business information Destroy data Hijacking computers for various purposes
Cookies • Cookies are small files deposited on a system during a web site visit • Can be useful: • Allows web servers to maintain state (position and information) of a session with a user • Can keep track of your login information, shopping cart, etc. • May be harmful • Allows web sites to track information unbeknownst to user • Source of data for Pop-ups
Worms Worms are similar to viruses in the way they are spread Doesn’t need user action to spread Actively transmits itself over networks to infect other computers
Trojan Horses A program that looks like a harmless program but contains malicious code Used to install other malware such as backdoors or spyware
Rootkits Rootkits: modify OS so malware is hidden “Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.”
Backdoors A way to bypass normal authentication procedures Example: a hard coded user and password that gives access to a system or computer Easter Eggs Many viruses and worms attempt to create backdoors for more viruses
Spyware Software that monitors and gathers information about your system or computing Can collect personal information, Internet surfing habits, user logins, bank or credit account information Can change computer settings Keyloggers – collects information about what you type Port Sniffers – intercept and log data sent over a network
Port Scanners and Sniffers Port Sniffers – intercept and log data sent over a network Port Scanner – software that probes a server or computer network for open ports. Use portsto access network.
Bots and Botting • Programs that take control of a computers normal operation, or operate in stealth mode on a computer • Can be used to disrupt normal operations • Can turn a user’s computer into a source of malware attacks on others(Email Spamming)
Adware Advertising-supported software: automatically renders unwanted advertisements Object is to generate revenue for its author
Non-Malware, Active Threats Phishing – Posing as a trustworthy entity to acquire information Fake websites Email Spoofing
Non-Malware, Active Threats • (Distributed) Denial of Service, AKA DDOS attack • Flooding a web server with spurious traffic generated to overwhelm the server’s capabilities thus denying legitimate users or exposing system flaws • Related to Botting
Scareware Holds your PC hostage
Hacking USES ALL OF THE ABOVE Not this: http://www.youtube.com/watch?v=u8qgehH3kEQ
Additional Hacking Password Cracking Software bugs: buffer-overrun, SQL Injections http://hackertyper.com/ http://en.wikipedia.org/wiki/Stuxnet
Signs Your Computer May Be Hacked Your computer is running slow Processes you don’t recognize are running You are asked for personal information via email, or by phone You see data or programs disappear or change A Pop-up says your machine is infected and you need to scan it right now – and it is not the security software you installed
Anti-Spyware When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the OS. Scans incoming network data for spyware Detects and removes spyware
Firewalls Similar to Anti-Spyware but controls all incoming and outgoing traffic and what should and shouldn’t be allowed in and out
Anti-Virus Pros: Prevents, detects and removes malware Cons: False Positives, False Negatives Slows down your computer
Be Smart! Don’t open emails that you don’t recognize Don’t download attachments you don’t recognize Don’t run programs or install applications you don’t know or trust
Some Anti-Virus Software http://anti-virus-software-review.toptenreviews.com/ http://www.techsupportalert.com/best-free-anti-virus-software.htm
Some Anti-Virus Software Avast!: http://www.avast.com/en-us/index Avira: http://www.avira.com/en/index AVG: http://www.avg.com/us-en/homepage Microsoft Security Essentials:http://windows.microsoft.com/en-US/windows/security-essentials-download MalwareBytes: http://www.malwarebytes.org/