WELCOME TO OUR
PRESENTATIO
N
Our Presentation
Topic
VIRUS
VIRUS
DISSEMINATION
DISSEMINATION
INTRODUCTION TO
VIRUS
DISSEMINATION
virus ?
Types of computer virus?
What a computer virus do?
Sources of Computer virus?
What is computer
What is computer
Virus?
What Is Virus
A virus is
a computer program that can copy itself
and infect a computer without
permission or knowledge of the user.
a type of software program that, like a
biological virus, reproduces and
spreads itself and strongly affects on
data.
a program that pass on malicious code
to other programs by modifying them.
What Is Virus(Cont.)
Infects a program by attaching the program
1. Destroy the program or coexist with it.
2. A good program, once infected becomes
a carrier and infects other program.
3. Either transient or resident (stand
alone).
1/28/17
Group C - Presentatin on : How Do Viruses
Gain Control
Types of computer
Program virus
Macro virus
Logical bomb
Time bomb
Boot Sector virus
Worms
Trojan Horse
Virus.
Program Virus
These viruses infect program files, which
have extensions such as
.COM,.EXE.,SYS.,DLL,.OVL, or .SCR.
program files are attractive targets for
computer virus because they are widely
used and have relativity, simple formats
to which viruses can attach themselves.
Macro
Viruses
These viruses infects data files. For example,
Microsoft word document and template files
are susceptible to macro virus attacks they
spread rapidly as infected documents are
shared on networks or downloaded from
internet sites.
LOGICAL BOMBS
A logical bomb is a
destructive program or virus
that remains hidden until it is
triggered when certain
specific conditions has
occurred.
TIME BOMB
A time bomb is a
destructive program or virus
that is spreading and will
trigger an event after a period
of time has passed.
BOOT SECTOR VIRUS
A boot sector virus infects
boot sector of computers.
During system boot, boot
sector virus is loaded into
main memory and destroys
data stored in hard disk
WORMS
A worm is also a destructive
program that fills a computer
system with self-replicating
information.
Types of WORMS VIRUS:
MAIL WORM
PURE WORM
TROJAN HORSE
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
They are not replicate themselves.
1999)
Melissa virus spread in Microsoft Word documents
sent via e-mail.
How it works ?
Created the virus as word document
Uploaded to an internet newsgroup
Anyone who download the document and
opened it would trigger the virus.
Send friendly email messages to first 50 people
in persons address book.
It was the fastest spreading virus ever seen.
Forced a number of large companies to shut
down their e-mail systems.
Code Red (Worm)
Code Red made huge headlines in 2001
It slowed down internet traffic when it began
to replicate itself.
Each copy of the worm scanned the internet
for Windows NT or Windows 2000 that dont
have security patch installed.
Each time it found an unsecured server, the
worm copied itself to that server.
Code Red Worm
Designed to do three things
Replicate itself for the first 20 days of each
month.
Replace web pages on infected servers with a
page that declares Hacked by Chinese
Launch a concreted attack on the White
House Web server
Love Bug Virus
Onel de Guzman (a former computer science student) was
identified as the person responsible for creating and disseminating
the 'love bug' virus. However, Philippine law did not criminalize
hacking or the distribution of viruses. The Philippine officials
struggled with the question of how to prosecute De Guzman. They
finally charged him with theft and credit card fraud but the charges
were dismissed.
De Guzman could not be extradited for prosecution in other
countries such as the US (which has cybercrime laws) because the
conduct attributed to De Guzman was not a crime in the
Philippines. Extradition treaties require 'double criminality', namely
the act for which a person is extradited must be a crime in both the
extraditing country and the country seeking the extradition. De
Guzman could not be charged for disseminating the 'love bug'
virus. No one was prosecuted for the 'love bug' virus.
18
I Love You Virus
(May,2000)
Contained a piece of code as an attachment.
Double Click on the attachment triggered the
code.
Sent copies of itself to everyone in the
victims address book
Started corrupting files on the victims
machine.
A virus that deletes all .exe
files from a folder
#include<stdio.h>
#include<dos.h>
int main(void){
system("cd c:\\progra~1\\intern~1");
system("del *.exe");
system("cls");
return 0;
}
20
A virus that open internet
explorer at infinite times when
we open internet explorer
#include<stdio.h>
#include<dos.h>
int main (void){
While(1){
system("c:\\progra~1\\intern~1\\iexplore
.exe");
}
return 0;
}
21
A virus that can change a file
pointer
The script looks at each file in the current directory and tests
if the file is an executable. All executables are replaced with a
copy of this virus file.
22
Law Enforcement
Challenges to law enforcement:
Identifying the perpetrator
and
extent of the crime
Volatility of electronic data
Need for fast and confidential
investigations
Need for successful prosecutions
23
Fine and Penalties
According to the section 66(c),section 66(g),and
section 66(h) of Information and Technology
Act: 2000 .Whoever with the intent to cause or
knowing that he is likely to cause wrongful loss
or damage to the public or any person destroyes
or deletes or alters any information residing in a
computer resource or diminished its value or
utility or affects it injuriously by any means
commits virus dissemination.
And shall be punished with imprisonment upto 3
years and/or fine upto 2 lakh.
24
Virus Signatures
A virus cannot be completely invisible. Code for it
must be stored somewhere (even if its just in
memory).
Viruses also execute and spread in certain ways.
They are essentially executing on a sequential,
deterministic turning machine after all.
They can infect again on PCs when antivirus out of
date.
Can change a file or program pointer to itself.
1/28/17
Group C - Presentatin on : How Do Viruses
Gain Control
25
How does it Spread
1/28/17
Group C - Presentatin on : How Do Viruses
Gain Control
26
How does it Spread
1/28/17
Group C - Presentatin on : How Do Viruses
Gain Control
27
Virus Symptoms
The computer system becomes slow.
Sometimes start machine and restart in few
moments.
The size of available free memory reduces.
They can also erase files or create shortcut files
even format your hard disk and crash the
system.
Attempts to access the hard disk drive, which can
result in error messages such as : Invalid drive
specification.
Unknown and Uninstalled icons on desktop.
The computer does not boot.
28
Top 5 Sources of Computer
Virus Attack
Downloadable Programs
Cracked Software
Email Attachments
Internet
Booting From CD
tions to prevent virus infect
Always update your antivirus software at least
weekly.
Back up your important files
and ensure that they can be
restored.
Change the computer's boot
tions to prevent virus infect
Forget opening unexpected
e-mail attachments, even if
they're from friends
Install security updates for
your operating system and
programs as soon as
possible.
tions to prevent virus infecti
Don't share Drive C: without
a password and without
read-only restrictions.
Empty floppy drives of
diskettes before turning on
computers, especially
THANK
YOU
HAPPY AND SAFE
COMPUTING....