computer infections and protections(final)
TRANSCRIPT
![Page 1: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/1.jpg)
Denny Dizka Allister MacNeil December 3 2010
![Page 2: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/2.jpg)
TABLE OF CONTENTIntro
Table of contentOverviewHistory
Categories – Viruses and Protections1) Viruses 2) Worms 3) Trojans
1) Virus Detection 2) Firewalls 3) Advantages and Disadvantages
Summary / ConclusionReferencesQuestions
![Page 3: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/3.jpg)
Powerpoint TemplatesPage 3
● We will present you with detailed information about computer infections and protections users can take to not get infected.
● We will talk about 3 different kinds of infections like Computer Viruses, Worms, Back Door Trojan horses
● Also we will be talking about Virus Detection, Protections and Advantages and Disadvantages against the above stated infections.
OVERVIEW
![Page 4: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/4.jpg)
Powerpoint TemplatesPage 4
Background : One of the first ever computer infections was called The Creeper Virus. Created in 1971 by Bob Thomas at BBN technologies.
● The creeper was used to infect (ARPANET) Advanced Research Projects Agency Network. A message, "I'm the creeper, catch me if you can!" was displayed.
● The number of viruses out in the world are over 1 million in 2009, and are growing exponentially.
HISTORY
![Page 5: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/5.jpg)
Infections : There are many kinds of computer infections but among the most common types and likely to infect many of you are the following three.
1) Viruses 2) Worms 3) Trojans
Each of them is very different in theway it attacks computers.
CATEGORIES
![Page 6: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/6.jpg)
Powerpoint TemplatesPage 6
● Is a program written in computer languages, that can copy it self and continue to infect others.
● There are many kinds of viruses in existence, but the overall role they play are to replicate and spread to other computers and continue to destroy or steal data.
● Also confused with malware (which is spyware or adware) programs attatch to software which collects informations about your internet use.
VIRUSES
![Page 7: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/7.jpg)
Powerpoint TemplatesPage 7
● Exploit security vulnerabilities to spread itself automatically to computers through a network infrastructure.
● Worms are different than a traditional virus in that they search for and implant destructive code onto other systems.
● Many worms come in the form of email file attachments.
● When an infected document is opened, it copies itself into other documents, and then reproduce by emailing itself to the victim’s Outlook address book.
WORMS
![Page 8: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/8.jpg)
Powerpoint TemplatesPage 8
● Trojan horses are programs that appear harmless but givin time will present malicious functionalitys.
● Trojans access personal information stored on a home or business computer, then sends the data to a remote party via the Internet.
● Trojans may also serve as a "backdoor" application, opening network ports to allow other network applications access to that computer.
TROJANS
![Page 9: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/9.jpg)
Powerpoint TemplatesPage 9
● Remote Access Trojans● Password Sending Trojans● Key Loggers● Destructive Trojans● Denial of Service Attack Trojans● Proxy/Wingate Trojans● FTP Trojans
TYPES OF TROJANS
![Page 10: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/10.jpg)
Malware Infections
![Page 11: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/11.jpg)
Malware InfectionsThis chart shows the number of computers
cleaned by Microsoft, listed by country.
![Page 12: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/12.jpg)
Protections: As a result of virus creation, anti-virus software was developed to counter and remove the effects of a computer infection. Anti-virus software uses 3 methods of detection: Signature Based Detection, Rootkit Detection and Heuristics.
Other Protections: Firewalls, Specialized Removal Tools
CATEGORIES
![Page 13: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/13.jpg)
Powerpoint TemplatesPage 13
Signature Based Detection: Interacts with a dictionary which contains virus signatures and compares them to files being scanned. This is the most common form of virus identification.
Rootkit Detection: Some anti-virus programs have this scanning capability. Rootkits enable administrator-level access to a computer or network of computers.
Methods of Detection
![Page 14: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/14.jpg)
Powerpoint TemplatesPage 14
Heuristics: Uses more sophisticated analysis techniques to determine if a file is malicious by assessing that file’s behaviour. Can detect new virus’ based on the variants of known malware. False-Positives occur more frequently under this form of detection.
Methods of Detection (cont’d)
![Page 15: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/15.jpg)
Powerpoint TemplatesPage 15
Specialized Removal Tools: Programs used to remove infections that regular anti-virus programs can not.
Firewalls: Is used to block unauthorized access to a network, such as blocking people from accessing private networks.
Other Protections
![Page 17: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/17.jpg)
Powerpoint TemplatesPage 17
• Prevents file corruption/loss
• Protects information
Advantages
![Page 18: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/18.jpg)
Powerpoint TemplatesPage 18
• Paid updates
• False positives/negatives
• Could slow down your computer
• Fake anti-virus’ known as “scareware”
• Never fully protected
Disadvantages
![Page 19: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/19.jpg)
Powerpoint TemplatesPage 19
• Do not install programs that you have not downloaded
• Have a scheduled scanning time during the week
• If you are not sure about False-Positives/Negatives, or any other technical information, use Forums
• User Education
Recommendations
![Page 21: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/21.jpg)
● Computer infections and protections are ever changing, for one can not exist without the other.
● Avid users of the internet should have general knowledge about the threats that exist on the internet
CONCLUSION
![Page 22: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/22.jpg)
● How to browse the internet in relative safety by employing some simple practices to prevent infections.
● More can be at risk than just your computer.
CONCLUSION Cont.
![Page 23: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/23.jpg)
Powerpoint TemplatesPage 23
CONTENT● Web 12/1/2010http://www.computerworld.com/s/article/9075118/Number_of_viruses_to_top_1_million_by_2009
● Web 12/1/2010http://en.wikipedia.org/wiki/Computer_virus
● Web 12/1/2010http://www.ucmp.berkeley.edu/alllife/virus.html
● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise
● Web 12/1/2010http://www.microsoft.com/security/worms/whatis.aspx
● Web 12/1/2010http://www.tech-faq.com/computer-worm.html
● Web 12/1/2010http://www.tech-faq.com/trojan-virus.html
REFFERENCES
![Page 24: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/24.jpg)
Powerpoint TemplatesPage 24
CONTENT● Web 12/1/2010http://www.webopedia.com/TERM/M/malware.html
● Web 12/1/2010http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html
● Web 11/30/2010http://en.wikipedia.org/wiki/Antivirus_software
● Web 12/1/2010http://www.antivirusworld.com/articles/antivirus.php
● Web 12/1/2010http://antivirus.about.com/od/whatisavirus/a/virussignature.htm
● Web 11/30/2010http://www.faqs.org/faqs/firewalls-faq/
● Web 11/30/2010http://www.wifinotes.com/security/understanding-antivirus.html
REFFERENCES
![Page 25: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/25.jpg)
Powerpoint TemplatesPage 25
IMAGES● Web 12/1/2010http://www.techdc.com/pc-malwareinfections-on-the-rise
● Web 12/1/2010http://www.justmywebsite.co.uk/virus.html
● Web 12/1/2010http://www.bleepstatic.com/tutorials/fw/firewall_diag.gif
● Web 12/1/2010http://www.3its.com/resources/antivirus-logo.jpg
VIDEO● Web 12/1/2010http://www.youtube.com/watch?v=wHqs5UKLk2s
REFFERENCES
![Page 26: Computer infections and protections(final)](https://reader033.vdocuments.mx/reader033/viewer/2022051710/5a687fcb7f8b9a177a8b53a3/html5/thumbnails/26.jpg)
Any Questions?Thank you,