Computer Virus
Computer Virus
Overview
TYPES OF INFECTION DEFINITIONS DIFFERENCE BETWEEN VIRUS AND WORM ORIGINS TYPES OF VIRUSES WORMS
Overview Cont
MELISSA VIRUS I LOVE YOU VIRUS CODE RED (WORM) SYMPTOMS OF AN INFECTION PROTECTION MEASURES CONCLUSION REFRENCES
Types of Infection
VIRUSES E-MAIL VIRUSES WORMS TROJAN HORSES
Viruses
A virus is a small piece of software that piggybacks on real programs. 2 main characteristics of viruses
It must execute itself. It must replicate itself.
Virus
Virus might attach itself to a program such as spreadsheet. Each time the spreadsheet program runs, the virus runs too and replicate itself.
E-mail Viruses
Moves around in e-mail messages Usually replicate itself by automatically mailing itself to dozens of people in the victims email address book. Example MELISSA VIRUS Example I LOVE YOU VIRUS
WORMS
Small piece of software that uses computer networks and security holes to replicate itself. Copy of the worm scans the network for another machine that has a specific security hole. Copy itself to the new machine using the security hole and start replicating. Example CODE RED
Trojan Horses
A simple computer program It claim to be a game Erase your hard disk No way to replicate itself.
Why do people do it ?
For some people creating viruses seems to be thrill. Thrill of watching things blow up.
Viruses
Viruses show us how vulnerable we are A properly engineered virus can have an amazing effect on the Internet They show how sophisticated and interconnected human beings have become.
Types of Viruses
File infector virus
Infect program files
Multi-partite virus
infect both boot records and program files
Macro virus
infect data files. Examples: Microsoft Office Word, Excel, PowerPoint and Access files
Melissa Virus
Melissa Virus was the fastest spreading virus ever seen. Forced a number of large companies to shut down their e-mail systems.
Symptoms of Infection
Programs take longer to load than normal. Computers hard drive constantly runs out of free space. The floppy disk drive or hard drive runs when you are not using it. New files keep appearing on the system and you dont know where it come frm.
Protection
TO protect yourself you need to be Proactive about Security issues. Being reactive wont solve anything; Specially at crunch time and deadlines!! In matter of fact it can make the problem much more complex to solve, and the situation much worse, resulting in a complete Nightmare!! Best Measures are the preventative ones.
Protection Measures
You need to basically to do four steps to keep your computer and your data secure: 1. Get the latest Anti-Virus Software. 2. Make sure you have the latest security patches and hot fixes using Windows Update. 3. Use a Host-Based Firewall. 4. BACKUP your Important Files.
Conclusion
Be aware of the new infections out there. Take precaution measures. Always backup your data. Keep up-to-date on new Anti virus software. Simply avoid programs from unknown sources.
References
http://computer.howstuffworks.com/virus.htm http://www.son.washington.edu/nshelp/fire wall.asp Dewdney, A. K. The New Turing Omnibus. New York: Henry Holt and Company, 2001