computer infections and protections(final)
Post on 24-Jan-2018
179 Views
Preview:
TRANSCRIPT
Denny Dizka Allister MacNeil December 3 2010
TABLE OF CONTENTIntro
Table of contentOverviewHistory
Categories – Viruses and Protections1) Viruses 2) Worms 3) Trojans
1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages
Summary / ConclusionReferencesQuestions
Powerpoint TemplatesPage 3
● We will present you with detailed information about computer infections and protections users can take to not get infected.
● We will talk about 3 different kinds of infections like Computer Viruses, Worms, Back Door Trojan horses
● Also we will be talking about Virus Detection, Protections and Advantages and Disadvantages against the above stated infections.
OVERVIEW
Powerpoint TemplatesPage 4
Background : One of the first ever computer infections was called The Creeper Virus. Created in 1971 by Bob Thomas at BBN technologies.
● The creeper was used to infect (ARPANET) Advanced Research Projects Agency Network. A message, "I'm the creeper, catch me if you can!" was displayed.
● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially.
HISTORY
Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three.
1) Viruses 2) Worms 3) Trojans
Each of them is very different in theway it attacks computers.
CATEGORIES
Powerpoint TemplatesPage 6
● Is a program written in computer languages, that can copy it self and continue to infect others.
● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data.
● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use.
VIRUSES
Powerpoint TemplatesPage 7
● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure.
● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems.
● Many worms come in the form of email file attachments.
● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book.
WORMS
Powerpoint TemplatesPage 8
● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys.
● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet.
● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer.
TROJANS
Powerpoint TemplatesPage 9
● Remote Access Trojans● Password Sending Trojans● Key Loggers● Destructive Trojans● Denial of Service Attack Trojans● Proxy/Wingate Trojans● FTP Trojans
TYPES OF TROJANS
Malware Infections
Malware InfectionsThis chart shows the number of computers
cleaned by Microsoft, listed by country.
Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics.
Other Protections: Firewalls, Specialized Removal Tools
CATEGORIES
Powerpoint TemplatesPage 13
Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification.
Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers.
Methods of Detection
Powerpoint TemplatesPage 14
Heuristics: Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection.
Methods of Detection (cont’d)
Powerpoint TemplatesPage 15
Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not.
Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks.
Other Protections
Powerpoint TemplatesPage 17
• Prevents file corruption/loss
• Protects information
Advantages
Powerpoint TemplatesPage 18
• Paid updates
• False positives/negatives
• Could slow down your computer
• Fake anti-virus’ known as “scareware”
• Never fully protected
Disadvantages
Powerpoint TemplatesPage 19
• Do not install programs that you have not downloaded
• Have a scheduled scanning time during the week
• If you are not sure about False-Positives/Negatives, or any other technical information, use Forums
• User Education
Recommendations
● Computer infections and protections are ever changing, for one can not exist without the other.
● Avid users of the internet should have general knowledge about the threats that exist on the internet
CONCLUSION
● How to browse the internet in relative safety by employing some simple practices to prevent infections.
● More can be at risk than just your computer.
CONCLUSION Cont.
Powerpoint TemplatesPage 23
CONTENT● Web 12/1/2010http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009
● Web 12/1/2010http://en.wikipedia.org/wiki/Computer_virus
● Web 12/1/2010http://www.ucmp.berkeley.edu/alllife/virus.html
● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise
● Web 12/1/2010http://www.microsoft.com/security/worms/whatis.aspx
● Web 12/1/2010http://www.tech-faq.com/computer-worm.html
● Web 12/1/2010http://www.tech-faq.com/trojan-virus.html
REFFERENCES
Powerpoint TemplatesPage 24
CONTENT● Web 12/1/2010http://www.webopedia.com/TERM/M/malware.html
● Web 12/1/2010http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html
● Web 11/30/2010http://en.wikipedia.org/wiki/Antivirus_software
● Web 12/1/2010http://www.antivirusworld.com/articles/antivirus.php
● Web 12/1/2010http://antivirus.about.com/od/whatisavirus/a/virussignature.htm
● Web 11/30/2010http://www.faqs.org/faqs/firewalls-faq/
● Web 11/30/2010http://www.wifinotes.com/security/understanding-antivirus.html
REFFERENCES
Powerpoint TemplatesPage 25
IMAGES● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise
● Web 12/1/2010http://www.justmywebsite.co.uk/virus.html
● Web 12/1/2010http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif
● Web 12/1/2010http://www.3its.com/resources/antivirus-logo.jpg
VIDEO● Web 12/1/2010http://www.youtube.com/watch?v=wHqs5UKLk2s
REFFERENCES
Any Questions?Thank you,
top related