DOC PREVIEW
UCF COT 4810 - Computer Viruses and Worms

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Computer Viruses and WormsOverviewOverview Cont…Types of InfectionVirusesVirusE-mail VirusesWORMSTrojan HorsesDifference between Virus and WormWhy do people do it ?Slide 12Types of VirusesMelissa Virus (March 1999)Melissa VirusI Love You Virus (May,2000)Code Red (Worm)Code Red WormSymptoms of InfectionSymptoms of Infection Cont..ProtectionProtection MeasuresConclusionReferencesComputer Viruses and WormsComputer Viruses and WormsBy: By: Monika GuptaMonika GuptaOverviewOverview•TYPES OF INFECTION•DEFINITIONS•DIFFERENCE BETWEEN VIRUS AND WORM•ORIGINS•TYPES OF VIRUSES•WORMSOverview Cont…Overview Cont…•MELISSA VIRUS•I LOVE YOU VIRUS•CODE RED (WORM)•SYMPTOMS OF AN INFECTION•PROTECTION MEASURES•CONCLUSION•REFRENCESTypes of InfectionTypes of Infection•VIRUSES•E-MAIL VIRUSES•WORMS•TROJAN HORSESVirusesVirusesA virus is a small piece ofsoftware that piggybacks onreal programs.2 main characteristics of viruses It must execute itself. It must replicate itself.Virus Virus Virus might attach itself to a program suchas spreadsheet. Each time the spreadsheetprogram runs, the virus runs too andreplicate itself.E-mail VirusesE-mail Viruses•Moves around in e-mail messages•Usually replicate itself by automatically mailing itself to dozens of people in the victim’s email address book.•Example “MELISSA VIRUS”•Example “I LOVE YOU VIRUS”WORMSWORMS•Small piece of software that uses computer networks and security holes to replicate itself.•Copy of the worm scans the network for another machine that has a specific security hole.•Copy itself to the new machine using the security hole and start replicating. • Example “CODE RED”Trojan HorsesTrojan Horses•A simple computer program•It claim to be a game•Erase your hard disk•No way to replicate itself.Difference between Virus and Difference between Virus and WormWormThe difference between a worm and a virus is that a virus does not have a propagation vector. i.e., it will only effect one host and does not propagate to other hosts. Worms propagate and infect other computers. Majority of threats are actually worms that propagate to other hosts.Why do people do it ?Why do people do it ?•For some people creating viruses seems to be thrill.•Thrill of watching things blow up.VirusesViruses•Viruses show us how vulnerable we are•A properly engineered virus can have an amazing effect on the Internet•They show how sophisticated and interconnected human beings have become.–File infector virus•Infect program files–Boot sector virus•Infect the system area of a disk–Master boot record virus•infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. –Multi-partite virus•infect both boot records and program files–Macro virus•infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access filesTypes of VirusesTypes of VirusesMelissa Virus (March 1999)Melissa Virus (March 1999)Melissa virus spread in Microsoft Word documents sent via e-mail.How it works ?•Created the virus as word document•Uploaded to an internet newsgroup•Anyone who download the document and opened it would trigger the virus.•Send friendly email messages to first 50 people in person’s address book.Melissa VirusMelissa VirusMelissa Virus was the fastest spreading virus ever seen.Forced a number of large companies to shut down their e-mail systems.I Love You Virus (May,2000)I Love You Virus (May,2000)•Contained a piece of code as an attachment.•Double Click on the attachment triggered the code.•Sent copies of itself to everyone in the victim’s address book•Started corrupting files on the victim’s machine.Code Red (Worm)Code Red (Worm)•Code Red made huge headlines in 2001•It slowed down internet traffic when it began to replicate itself.•Each copy of the worm scanned the internet for Windows NT or Windows 2000 that don’t have security patch installed.•Each time it found an unsecured server, the worm copied itself to that server.Code Red WormCode Red WormDesigned to do three things Replicate itself for the first 20 days of each month. Replace web pages on infected servers with a page that declares “Hacked by Chinese” Launch a concreted attack on the White House Web serverSymptoms of InfectionSymptoms of Infection•Programs take longer to load than normal.•Computer’s hard drive constantly runs out of free space.•The floppy disk drive or hard drive runs when you are not using it.•New files keep appearing on the system and you don’t know where it come frm.Symptoms of Infection Cont..Symptoms of Infection Cont..•Strange sounds or beeping noises come from the computer.•Strange graphics are displayed on your computer monitor.•Unable to access the hard drive when booting from the floppy drive.•Program sizes keep changing.ProtectionProtection•TO protect yourself you need to be “Proactive” about Security issues. Being reactive won’t solve anything; Specially at crunch time and deadlines!! In matter of fact it can make the problem much more complex to solve, and the situation much worse, resulting in a complete Nightmare!!•Best Measures are the preventative ones.Protection MeasuresProtection Measures•You need to basically to do four steps to keep your computer and your data secure:1. Get the latest Anti-Virus Software.2. Make sure you have the latest security patches and hot fixes using Windows Update.3. Use a Host-Based Firewall.4. BACKUP your Important Files.ConclusionConclusionBe aware of the new infections out there.Take precaution measures.Always backup your data.Keep up-to-date on new Anti virus software.Simply avoid programs from unknown sources.ReferencesReferences•http://computer.howstuffworks.com/virus.htm•http://www.son.washington.edu/nshelp/firewall.asp•Dewdney, A. K. The New Turing Omnibus. New York: Henry Holt and Company,


View Full Document

UCF COT 4810 - Computer Viruses and Worms

Documents in this Course
Spoofing

Spoofing

25 pages

CAPTCHA

CAPTCHA

18 pages

Load more
Download Computer Viruses and Worms
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer Viruses and Worms and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Viruses and Worms 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?