cruda, mayday pp tx 2
DESCRIPTION
my presentation during 6.09TRANSCRIPT
Advance Computer
Skills
Computer VIRUSModule
By: Mayday R Cruda
Objectives
• Name some Computer Virus
• List different attacks of computer viruses
HISTORYOF
COMPUTERVIRUS
1966 70’s 80’s 90’s 2000
Johnvon Newman
RABBITFork Bomb
CreeperANIMAL
ELK cloner
BRAINBoot sector
Ping Pong
Morris Ghostball
Melissa
LOVE BUG
Anna Kournikova
CODE RED
Netsky and Sasser
Storm worm
COMPUTER VIRUS
Program that spread,replicateandInterferes computer operation
How does it
AFFECTComputers?
Viruses can
• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable
Viruses behave in different ways
• Hide in the system• Replace files• Replicate files• Delete files• Run programs• Send files and info• Deny access• Reboot computers• Clog your memory
How virus spreads
Email attachmentsRogue WebsitesNetworksInfected storage disksInfected SoftwareFake Anti Virus SoftwarePirated programsFrom Mobile Devices
Different types of
Computer Virus
• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus
• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits
• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus
• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits
OVERWRITE VIRUS
deletes information contained in the files that it infects and sometimes reboot the system
EX. WayTrj.RebootTrivial.88.D
DAMAGE: files may be partially or totally useless
DIRECTORY VIRUS (CLUSTER)changing the path that indicates the location of a file and renaming all
executable to non-executable extensions. When you run the program, you first run the virus
EX. Dir-2 virus (creeping death)
DAMAGE: Once infected, it becomes impossible to locate the original files.
FAT virus
Damaged the part of a disk used to store all the information about the location of files, available space, unusable space, etc.FILE ALLOCATION TABLE
Ex. Link Virus
Damage: cause serious damage to computer reformat needed.
WEB scripting Virus
originated from websites used for social networking. Attached a link that could lead to other harmful sites.
SymptomsYahoo and Google search will be re-directedHomepage of web browser, desktop background often get
changed automatically
Damage: slow down the performance of the machine
Trojans• Disguise as a useful program• steal end-user information (credit card info, banks etc.)
• perform destructive harm on the target computer• download additional computer malware
Took its name From the Greek myth ‘Trojan Horse’ex. Chernobyl virus 1998
Damage: perform destructive features on the computer.
Wormsreplicates itself in order to spread to other computerssends out hundreds or thousands of copiescreating a huge devastating effect
Ex. Morris worm – worth damaged between $10,000,000 and $100,000,000 ILOVEYOU virus - Onel A. de Guzman, $5.5 billion to $8.7 billion in damages. 10% of all Internet-connected computers were hit.
Damageconsumes too much system memory(or network bandwidth), causing Web servers, network servers and individual computers to stop responding
Rootkitallow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlookWorst case:
control your computer and turn it into ‘Zombie’
“secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely”
HOW TO COUNTER
COMPUTER VIRUS
SCAN EMAIL ATTACHMENTS
USE WINDOWS FIREWALL
INSTALL A RELIABLE ANTIVIRUS
AVOID SUSPICIOS WEBSITE
WATCH YOUR DOWNLOADS
ANY
recap
Computer Virus• Memory Resident Virus• Direct Action Viruses• Overwrite Viruses• Boot Sector Virus• Macro Virus• Directory Virus• Polymorphic Virus
• Companion Viruses• FAT Virus• Multipartite Virus• Web Scripting Virus• Worms• Trojans• Logic Bombs• Rootkits
Viruses can
• slow down your computer• corrupt your system files• make some programs faulty or corrupt• damage your boot sector• Tie up Internet traffic• turn your computer into a slave• steal important information from your computer• change the power ratings and blast your computer• worst case can make your computer unusable
END