computer infections and protections(final)

26
Denny Dizka Allister MacNeil December 3 2010

Upload: allisterm

Post on 24-Jan-2018

179 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Computer infections and protections(final)

Denny Dizka Allister MacNeil December 3 2010

Page 2: Computer infections and protections(final)

TABLE OF CONTENTIntro

Table of contentOverviewHistory

Categories – Viruses and Protections1) Viruses 2) Worms 3) Trojans

1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages

Summary / ConclusionReferencesQuestions

Page 3: Computer infections and protections(final)

Powerpoint TemplatesPage 3

● We will present you with detailed information about computer infections and protections users can take to not get infected.

● We will talk about 3 different kinds of infections like Computer Viruses, Worms, Back Door Trojan horses

● Also we will be talking about Virus Detection, Protections and Advantages and Disadvantages against the above stated infections.

OVERVIEW

Page 4: Computer infections and protections(final)

Powerpoint TemplatesPage 4

Background : One of the first ever computer infections was called The Creeper Virus. Created in 1971 by Bob Thomas at BBN technologies.

● The creeper was used to infect (ARPANET) Advanced Research Projects Agency Network. A message, "I'm the creeper, catch me if you can!" was displayed.

● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially.

HISTORY

Page 5: Computer infections and protections(final)

Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three.

1) Viruses 2) Worms 3) Trojans

Each of them is very different in theway it attacks computers.

CATEGORIES

Page 6: Computer infections and protections(final)

Powerpoint TemplatesPage 6

● Is a program written in computer languages, that can copy it self and continue to infect others.

● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data.

● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use.

VIRUSES

Page 7: Computer infections and protections(final)

Powerpoint TemplatesPage 7

● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure.

● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems.

● Many worms come in the form of email file attachments.

● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book.

WORMS

Page 8: Computer infections and protections(final)

Powerpoint TemplatesPage 8

● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys.

● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet.

● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer.

TROJANS

Page 9: Computer infections and protections(final)

Powerpoint TemplatesPage 9

● Remote Access Trojans● Password Sending Trojans● Key Loggers● Destructive Trojans● Denial of Service Attack Trojans● Proxy/Wingate Trojans● FTP Trojans

TYPES OF TROJANS

Page 10: Computer infections and protections(final)

Malware Infections

Page 11: Computer infections and protections(final)

Malware InfectionsThis chart shows the number of computers

cleaned by Microsoft, listed by country.

Page 12: Computer infections and protections(final)

Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics.

Other Protections: Firewalls, Specialized Removal Tools

CATEGORIES

Page 13: Computer infections and protections(final)

Powerpoint TemplatesPage 13

Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification.

Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers.

Methods of Detection

Page 14: Computer infections and protections(final)

Powerpoint TemplatesPage 14

Heuristics: Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection.

Methods of Detection (cont’d)

Page 15: Computer infections and protections(final)

Powerpoint TemplatesPage 15

Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not.

Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks.

Other Protections

Page 16: Computer infections and protections(final)

Powerpoint TemplatesPage 16

Firewall Example

Page 17: Computer infections and protections(final)

Powerpoint TemplatesPage 17

• Prevents file corruption/loss

• Protects information

Advantages

Page 18: Computer infections and protections(final)

Powerpoint TemplatesPage 18

• Paid updates

• False positives/negatives

• Could slow down your computer

• Fake anti-virus’ known as “scareware”

• Never fully protected

Disadvantages

Page 19: Computer infections and protections(final)

Powerpoint TemplatesPage 19

• Do not install programs that you have not downloaded

• Have a scheduled scanning time during the week

• If you are not sure about False-Positives/Negatives, or any other technical information, use Forums

• User Education

Recommendations

Page 20: Computer infections and protections(final)

Powerpoint TemplatesPage 20

Popular Anti-Virus Programs

Page 21: Computer infections and protections(final)

● Computer infections and protections are ever changing, for one can not exist without the other.

● Avid users of the internet should have general knowledge about the threats that exist on the internet

CONCLUSION

Page 22: Computer infections and protections(final)

● How to browse the internet in relative safety by employing some simple practices to prevent infections.

● More can be at risk than just your computer.

CONCLUSION Cont.

Page 23: Computer infections and protections(final)

Powerpoint TemplatesPage 23

CONTENT● Web 12/1/2010http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009

● Web 12/1/2010http://en.wikipedia.org/wiki/Computer_virus

● Web 12/1/2010http://www.ucmp.berkeley.edu/alllife/virus.html

● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise

● Web 12/1/2010http://www.microsoft.com/security/worms/whatis.aspx

● Web 12/1/2010http://www.tech-faq.com/computer-worm.html

● Web 12/1/2010http://www.tech-faq.com/trojan-virus.html

REFFERENCES

Page 24: Computer infections and protections(final)

Powerpoint TemplatesPage 24

CONTENT● Web 12/1/2010http://www.webopedia.com/TERM/M/malware.html

● Web 12/1/2010http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html

● Web 11/30/2010http://en.wikipedia.org/wiki/Antivirus_software

● Web 12/1/2010http://www.antivirusworld.com/articles/antivirus.php

● Web 12/1/2010http://antivirus.about.com/od/whatisavirus/a/virussignature.htm

● Web 11/30/2010http://www.faqs.org/faqs/firewalls-faq/

● Web 11/30/2010http://www.wifinotes.com/security/understanding-antivirus.html

REFFERENCES

Page 25: Computer infections and protections(final)

Powerpoint TemplatesPage 25

IMAGES● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise

● Web 12/1/2010http://www.justmywebsite.co.uk/virus.html

● Web 12/1/2010http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif

● Web 12/1/2010http://www.3its.com/resources/antivirus-logo.jpg

VIDEO● Web 12/1/2010http://www.youtube.com/watch?v=wHqs5UKLk2s

REFFERENCES

Page 26: Computer infections and protections(final)

Any Questions?Thank you,