cyber talk on virus-2

Upload: sudhanandasahu

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Cyber Talk on Virus-2

    1/8

    COMPUTER VIRUS ANDCOMPUTER VIRUS AND

    ITS SOLUTIONITS SOLUTION

    COMPUTER VIRUS ANDCOMPUTER VIRUS AND

    ITS SOLUTIONITS SOLUTION

    An Overview.An Overview.

    Sushanta Kumar ParidaSushanta Kumar ParidaA Student Of Computer Science Engineering,A Student Of Computer Science Engineering,

    Regd No. 0401229114Regd No. 0401229114EE--Mail ID: susdhi@indiatimes. comMail ID: susdhi@indiatimes. com

    An Overview.An Overview.

    Sushanta Kumar ParidaSushanta Kumar ParidaA Student Of Computer Science Engineering,A Student Of Computer Science Engineering,

    Regd No. 0401229114Regd No. 0401229114EE--Mail ID: susdhi@indiatimes. comMail ID: susdhi@indiatimes. com

    Under The Guidance

    Of

    Prof. Abhaya Samal, H.O.D, Comp. Sc. Engg.

    VENUE: Hotel Akbari, Cuttack, Orissa.

  • 8/7/2019 Cyber Talk on Virus-2

    2/8

    Cyber talk on virusCyber talk on virus

    Virus and its definition

    History of virus

    Working of virus

    Solution of virus

    Conclusion

  • 8/7/2019 Cyber Talk on Virus-2

    3/8

    Virus and its definitionVirus and its definition

    Vital Information Resources Under SiegeVital Information Resources Under Siege .. Viruses can be intentionally destructive.By destroying data, manyViruses can be intentionally destructive.By destroying data, many

    other viruses are fairly benign or merely annoying.other viruses are fairly benign or merely annoying.

    Viruses are somewhat less common than networkViruses are somewhat less common than network--borne worms.borne worms. In common parlance, the termIn common parlance, the term virusvirus is often extended to refer tois often extended to refer to

    worms, trojan horses and other sorts of malware.worms, trojan horses and other sorts of malware.

    The predominant negative effect of viruses is their uncontrolled selfThe predominant negative effect of viruses is their uncontrolled self--reproduction, which wastes or overwhelms computer resources.reproduction, which wastes or overwhelms computer resources.

    The insertion of a virus into the program is termed as an "infection",The insertion of a virus into the program is termed as an "infection",and the infected file, or executable code that is not part of a file, isand the infected file, or executable code that is not part of a file, iscalled a "host.called a "host.

  • 8/7/2019 Cyber Talk on Virus-2

    4/8

    History of viruses

    Program called "Elk Cloner is credited with being the first computer virus to

    appear

    The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two

    brothers, Basit and Amjad Farooq Alvi, operating out of Lahore

    During the 1980s, real computers started to spread to businesses and homes because of

    popularity. By the late 1980s, PCs were widespread in businesses, homes and college

    campuses

    Since the mid-1990s, macro viruses have become common. Most of these viruses are

    written in the scripting languages for Microsoft programs such as Word and Excel.These viruses spread in Microsoft Office by infecting documents and spreadsheets.

    Macro viruses pose unique problems for detection software. Since Word and

    Excel were also available for Mac OS, most of these viruses were able to spread

    on Macintosh computers as well. Numerically, most of these viruses did not have

    the ability to send infected e-mail.

  • 8/7/2019 Cyber Talk on Virus-2

    5/8

    Working of virusWorking of virus

    Replication strategiesReplication strategies Nonresident virusesNonresident viruses--Non resident viruses can be thought of as consisting of a finder module and a replicationNon resident viruses can be thought of as consisting of a finder module and a replication

    module. The finder module is responsible for finding new files to infect. For each new executable file the findermodule. The finder module is responsible for finding new files to infect. For each new executable file the findermodule encounters, it calls the replication module to infect that filemodule encounters, it calls the replication module to infect that file

    Resident virusesResident viruses--Resident viruses contain a replication module that is similar to the one that is employed byResident viruses contain a replication module that is similar to the one that is employed bynonresident viruses. However, this module is not called by a finder module. Instead, the virus loads thenonresident viruses. However, this module is not called by a finder module. Instead, the virus loads thereplication module into memory when it is executed and ensures that this module is executed each time thereplication module into memory when it is executed and ensures that this module is executed each time theoperating system is called to perform a certain operation.operating system is called to perform a certain operation.

    Companion virusesCompanion viruses--AA few older viruses called companion virusesfew older viruses called companion viruses[3][3]do not havedo not havehost files per se, but exploit MShost files per se, but exploit MS--DOS. A companion virus creates new filesDOS. A companion virus creates new files(typically .COM but can also use other extensions such as ".EXD") that have(typically .COM but can also use other extensions such as ".EXD") that havethe same file names as legitimate .EXE files. When a user types in the namethe same file names as legitimate .EXE files. When a user types in the nameof a desired program, if he does not type in ".EXE" but instead does notof a desired program, if he does not type in ".EXE" but instead does notspecify a file extension, DOS will assume he meant the file with the extensionspecify a file extension, DOS will assume he meant the file with the extensionthat comes first in alphabetical order and run the virus. For instance, if a userthat comes first in alphabetical order and run the virus. For instance, if a userhad "(filename).COM" (the virus) and "(filename).EXE" and the user typedhad "(filename).COM" (the virus) and "(filename).EXE" and the user typed

    "filename", he will run "(filename).COM" and run the virus."filename", he will run "(filename).COM" and run the virus.

  • 8/7/2019 Cyber Talk on Virus-2

    6/8

    Solution from virus destructionSolution from virus destruction

    Anti-virus software and other countermeasures.

    This software has the potential abilitiy to detect viruses which may not be discovered by anti-virus security firms. The second and most common method of virus detection is to create alist of virus signature definitions.

    Aladdin---eSafe from Aladdin Knowledge Systems is a comprehensive gateway-basedfamily of anti-virus security products.

    Cat ComputerServicesQuick Heal antivirus with its proactive and reactivetechnologies ensure complete protection from viruses, Trojans, back doors, worms, macro

    viruses, and other malicious programs.

  • 8/7/2019 Cyber Talk on Virus-2

    7/8

    C

    onclusionC

    onclusion Will the antiWill the anti--virus camp begin to win the battle, turning thevirus camp begin to win the battle, turning the

    virusgrowth curve the other directionvirusgrowth curve the other direction

    We should expecttosee younger, lessWe should expecttosee younger, less--technologicallytechnologically

    inclined people creatinganddisseminatingagreaterinclined people creatinganddisseminatingagreaternumberofmore potentviruses. The future looks brightnumberofmore potentviruses. The future looks brightindeedindeed-- forthe computervirus.forthe computervirus.

    Itisnot easy forthe Virusestoaffect Linux platform.Itisnot easy forthe Virusestoaffect Linux platform.

    There are severalthousandknownvirusesforWindows.AscThere are severalthousandknownvirusesforWindows.Asc

    an be seenin browsing Symantec's encyclopediaofvirusesan be seenin browsing Symantec's encyclopediaofviruses..

  • 8/7/2019 Cyber Talk on Virus-2

    8/8

    THANK YOUTHANK YOU