SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
COMPUTER VIRUSES AND WORMS
#1 VIRUS
Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation.
 A computer virus might corrupt or delete data on your computer, use your email program to
spread itself to other computers, or even erase everything on your hard disk.
 Computer viruses are often spread by attachments in email messages or instant messaging
messages. That is why it is essential that you never open email attachments unless you know
who it's from and you are expecting it.
 Viruses can be disguised as attachments of funny images, greeting cards, or audio and video
files.
 Computer viruses also spread through downloads on the Internet. They can be hidden in
illicit software or other files or programs you might download.
Typical things that some current Personal Computer (PC) viruses do:
 Display a message
 Erase files
 Scramble data on a hard disk
 Cause erratic screen behavior
 Halt the PC
 Many viruses do nothing obvious at all except
spread!
Types:
1. Executable Viruses
 Traditional viruses
 Pieces of code attached to a legitimate program
 Run when the legitimate program gets executed
 Loads itself into memory and looks around to see if it can find any other programs
on the disk
2. Boot Sector Viruses
 Traditional Virus
 Infect the boot sector on floppy disks and hard disks
 By putting its code in the boot sector, a virus can guarantee it gets executed
 Load itself into memory immediately, and it is able to run whenever the computer is
on
MELISSA VIRUS:
 March 1999
 The Melissa virus was the fastest-spreading virus ever seen
 Someone created the virus as a Word document uploaded to an Internet news group
 People who downloaded the document and opened it would trigger the virus
 The virus would then send the document in an e-mail message to the first 50 people in
the person's address book
 Took advantage of the programming language built into Microsoft Word called VBA
(Visual Basic for Applications)
 The Melissa virus is a macro virus that was spread through email attachments in 1999.
 The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo.
PREVENTION:
 Updates
o Windows has a feature called Critical Updates
o An entire branch of Microsoft dedicated to staying one step ahead of the
hackers
o When a possible security loophole is fixed, you need to download the patch right
away
 Anti-Viruses
 More secure operating systems
o e.g. UNIX
 Here are some actions you can take:
o Install an antivirus program.
o Don't open email attachments unless you're expecting them.
o Keep your computer updated.
o Use a firewall. Windows Firewall (or any other firewall) can help alert you to
suspicious activity if a virus or worm attempts to connect to your computer
TROJAN VIRUS
Trojans are malicious programs that perform actions that have not been authorized by the
user. These actions can include:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers
or computer networks
 Unlike computer viruses and worms, Trojans are not able to self-replicate
 How Trojans can impact you:
BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected computer –
including sending, receiving, launching and deleting files, displaying data and rebooting
the computer. Backdoor Trojans are often used to unite a group of victim computers to
form a botnet or zombie network that can be used for criminal purposes.
EXPLOIT: Exploits are programs that contain data or code that takes advantage of a
vulnerability within application software that’s running on your computer
 A very important distinction from true viruses is that they do not replicate
themselves, as viruses do. Trojans contain malicious code, that, when triggered,
cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in
effect, invite these programs onto your computers--for example, by opening an email
attachment.
#2 WORMS
Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and
becomes part of, another executable program; however, a worm is self-contained and does not
need to be part of another program to propagate itself.
WORMS – is a small piece of software that uses computer networks and security holes to replicate
itself. A copy of the worm scans the network for another machine that has a specific security hole. It
copies itself to the new machine using the security hole, and then starts replicating from there, as
well.
They are often designed to exploit the file transmission capabilities found on many computers.
MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert
Tappan Morris, who at the time was a graduate student at Cornell University.
It was released on November 2, 1988. The level of replication created system loads that not only
brought it to the attention of system administrators, but also disrupted the target computers. It was
guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it
ranged at each system from $200 to more than $53,000
Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’
probation, community service and a fine in excess of $10,000.
ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT

Contenu connexe

Similaire à COMPUTER VIRUSES AND WORMS.pdf

Similaire à COMPUTER VIRUSES AND WORMS.pdf (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer virus
Computer virusComputer virus
Computer virus
 

Plus de Mahmud Hasan Tanvir

Plus de Mahmud Hasan Tanvir (16)

DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEMDATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Chemistry Fundamentals
Chemistry FundamentalsChemistry Fundamentals
Chemistry Fundamentals
 
C++ QNA
C++ QNAC++ QNA
C++ QNA
 
Attributes in Entity-Relationship Model
Attributes in Entity-Relationship ModelAttributes in Entity-Relationship Model
Attributes in Entity-Relationship Model
 
Applications of Radioisotopes.pdf
Applications of Radioisotopes.pdfApplications of Radioisotopes.pdf
Applications of Radioisotopes.pdf
 
Arithmetic Expression
Arithmetic ExpressionArithmetic Expression
Arithmetic Expression
 
FOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLESFOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLES
 
Fable.docx
Fable.docxFable.docx
Fable.docx
 
Basic C Programming Lab Practice
Basic C Programming Lab PracticeBasic C Programming Lab Practice
Basic C Programming Lab Practice
 
Rape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdfRape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdf
 
First Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdfFirst Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdf
 
Difference between a variable and a constant.pdf
Difference between a variable and a constant.pdfDifference between a variable and a constant.pdf
Difference between a variable and a constant.pdf
 
Defects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdfDefects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdf
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Dernier (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

COMPUTER VIRUSES AND WORMS.pdf

  • 1. COMPUTER VIRUSES AND WORMS #1 VIRUS Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.  Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.  Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Typical things that some current Personal Computer (PC) viruses do:  Display a message  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread! Types: 1. Executable Viruses  Traditional viruses  Pieces of code attached to a legitimate program  Run when the legitimate program gets executed  Loads itself into memory and looks around to see if it can find any other programs on the disk 2. Boot Sector Viruses  Traditional Virus  Infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  Load itself into memory immediately, and it is able to run whenever the computer is on
  • 2. MELISSA VIRUS:  March 1999  The Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet news group  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e-mail message to the first 50 people in the person's address book  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)  The Melissa virus is a macro virus that was spread through email attachments in 1999.  The Melissa virus may also be known as Melissa, Simpsons, Kwyjibo or Kwejeebo. PREVENTION:  Updates o Windows has a feature called Critical Updates o An entire branch of Microsoft dedicated to staying one step ahead of the hackers o When a possible security loophole is fixed, you need to download the patch right away  Anti-Viruses  More secure operating systems o e.g. UNIX  Here are some actions you can take: o Install an antivirus program. o Don't open email attachments unless you're expecting them. o Keep your computer updated. o Use a firewall. Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer TROJAN VIRUS Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include:  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks  Unlike computer viruses and worms, Trojans are not able to self-replicate  How Trojans can impact you: BACKDOOR: A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting
  • 3. the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes. EXPLOIT: Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer  A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers--for example, by opening an email attachment. #2 WORMS Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. WORMS – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. They are often designed to exploit the file transmission capabilities found on many computers. MORRIS WORM: The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. It was released on November 2, 1988. The level of replication created system loads that not only brought it to the attention of system administrators, but also disrupted the target computers. It was guessed that the cost in "potential loss in productivity" caused by the worm and efforts to remove it ranged at each system from $200 to more than $53,000 Morris himself was convicted under the US Computer Crime and Abuse Act and received three years’ probation, community service and a fine in excess of $10,000. ROBERT TAPPAN MORRIS IS NOW A PROFESSOR AT MIT