computer infections and protections(final)

Post on 24-Jan-2018

179 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Denny Dizka Allister MacNeil December 3 2010

TABLE OF CONTENTIntro

Table of contentOverviewHistory

Categories – Viruses and Protections1) Viruses 2) Worms 3) Trojans

1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages

Summary / ConclusionReferencesQuestions

Powerpoint TemplatesPage 3

● We will present you with detailed information about computer infections and protections users can take to not get infected.

● We will talk about 3 different kinds of infections like Computer Viruses, Worms, Back Door Trojan horses

● Also we will be talking about Virus Detection, Protections and Advantages and Disadvantages against the above stated infections.

OVERVIEW

Powerpoint TemplatesPage 4

Background : One of the first ever computer infections was called The Creeper Virus. Created in 1971 by Bob Thomas at BBN technologies.

● The creeper was used to infect (ARPANET) Advanced Research Projects Agency Network. A message, "I'm the creeper, catch me if you can!" was displayed.

● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially.

HISTORY

Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three.

1) Viruses 2) Worms 3) Trojans

Each of them is very different in theway it attacks computers.

CATEGORIES

Powerpoint TemplatesPage 6

● Is a program written in computer languages, that can copy it self and continue to infect others.

● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data.

● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use.

VIRUSES

Powerpoint TemplatesPage 7

● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure.

● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems.

● Many worms come in the form of email file attachments.

● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book.

WORMS

Powerpoint TemplatesPage 8

● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys.

● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet.

● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer.

TROJANS

Powerpoint TemplatesPage 9

● Remote Access Trojans● Password Sending Trojans● Key Loggers● Destructive Trojans● Denial of Service Attack Trojans● Proxy/Wingate Trojans● FTP Trojans

TYPES OF TROJANS

Malware Infections

Malware InfectionsThis chart shows the number of computers

cleaned by Microsoft, listed by country.

Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics.

Other Protections: Firewalls, Specialized Removal Tools

CATEGORIES

Powerpoint TemplatesPage 13

Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification.

Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers.

Methods of Detection

Powerpoint TemplatesPage 14

Heuristics: Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection.

Methods of Detection (cont’d)

Powerpoint TemplatesPage 15

Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not.

Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks.

Other Protections

Powerpoint TemplatesPage 16

Firewall Example

Powerpoint TemplatesPage 17

• Prevents file corruption/loss

• Protects information

Advantages

Powerpoint TemplatesPage 18

• Paid updates

• False positives/negatives

• Could slow down your computer

• Fake anti-virus’ known as “scareware”

• Never fully protected

Disadvantages

Powerpoint TemplatesPage 19

• Do not install programs that you have not downloaded

• Have a scheduled scanning time during the week

• If you are not sure about False-Positives/Negatives, or any other technical information, use Forums

• User Education

Recommendations

Powerpoint TemplatesPage 20

Popular Anti-Virus Programs

● Computer infections and protections are ever changing, for one can not exist without the other.

● Avid users of the internet should have general knowledge about the threats that exist on the internet

CONCLUSION

● How to browse the internet in relative safety by employing some simple practices to prevent infections.

● More can be at risk than just your computer.

CONCLUSION Cont.

Powerpoint TemplatesPage 23

CONTENT● Web 12/1/2010http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009

● Web 12/1/2010http://en.wikipedia.org/wiki/Computer_virus

● Web 12/1/2010http://www.ucmp.berkeley.edu/alllife/virus.html

● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise

● Web 12/1/2010http://www.microsoft.com/security/worms/whatis.aspx

● Web 12/1/2010http://www.tech-faq.com/computer-worm.html

● Web 12/1/2010http://www.tech-faq.com/trojan-virus.html

REFFERENCES

Powerpoint TemplatesPage 24

CONTENT● Web 12/1/2010http://www.webopedia.com/TERM/M/malware.html

● Web 12/1/2010http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html

● Web 11/30/2010http://en.wikipedia.org/wiki/Antivirus_software

● Web 12/1/2010http://www.antivirusworld.com/articles/antivirus.php

● Web 12/1/2010http://antivirus.about.com/od/whatisavirus/a/virussignature.htm

● Web 11/30/2010http://www.faqs.org/faqs/firewalls-faq/

● Web 11/30/2010http://www.wifinotes.com/security/understanding-antivirus.html

REFFERENCES

Powerpoint TemplatesPage 25

IMAGES● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise

● Web 12/1/2010http://www.justmywebsite.co.uk/virus.html

● Web 12/1/2010http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif

● Web 12/1/2010http://www.3its.com/resources/antivirus-logo.jpg

VIDEO● Web 12/1/2010http://www.youtube.com/watch?v=wHqs5UKLk2s

REFFERENCES

Any Questions?Thank you,

top related