cybercrime: virus and defense

20
Cybercrime : Virus & Defense

Upload: mdtanvir-ul-haque

Post on 10-Jan-2017

25 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cybercrime: Virus and Defense

Cybercrime :Virus & Defense

Page 2: Cybercrime: Virus and Defense

MD. Tanvir Ul HaqueClass ID: 1109017

Session : 2011-12

Page 3: Cybercrime: Virus and Defense

What Is Cybercrime?

Also called computer crime.

It is any illegal or criminal act dealing with computers and networks.

Additionally, cyber crime also includes traditional crimes conducted through the Internet.

Example: hate crimes, telemarketing and Internet fraud, credit card account thefts etc.

Page 4: Cybercrime: Virus and Defense

Virus Sometimes elaborated as Vital Information Resources Under

Siege(Slang).

A type of malicious software program (Malware).

Loaded onto a computer without any acknowledgement and runs against the owner’s wish.

It has the capacity to modify or replicate itself, in which case it will continue spreading.

Viruses are asymptomatic, as their symptoms are really hard to identify most of the time.

Page 5: Cybercrime: Virus and Defense

Evaluation Of Viruses

1. The earliest malware-like program was ”Creeper” (1971),detected on ‘ARPANET’. Written by Bob Thomas. It was a self-replicating program. It displayed:

Page 6: Cybercrime: Virus and Defense

Continue2. First personal computer virus was invented by the programmer Richard Screnta , it was “Elk Cloner”. The virus was attached to a computer game for the Apple DOS system.(1982)

3. In 1984 Fred Cohen use the name “VIRUS” in his paper "Computer Viruses – Theory and Experiments“ for self reproducing program. The name is proposed by Len Adleman.

4. “Brain” is considered to be the first stealth computer virus for IBM-PC. Written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from Pakistan(1986). It was a boot sector virus.

Page 7: Cybercrime: Virus and Defense

Continue5. In 1988, the first truly dangerous computer virus, called the ’Festering Hate virus’ was released infecting Apple operating systems.

Instead of just stalling computer function, this virus infected every file on the hard drive, floppy disks, and memory drives and eventually destroyed all files.

Page 8: Cybercrime: Virus and Defense

Properties Of Viruses1. Like human virus it spreads from one computer to another computer and leaving infections as it travels.

2. It causes annoying effects to damaging data, software and denial of services(DoS). 3. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.

Page 9: Cybercrime: Virus and Defense

Continue4. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether.

5. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.

Page 10: Cybercrime: Virus and Defense

The virus waits until

user transmits

the infected object to another

computer

User transmits an

infected object to another

computer

The virus locates and

infects suitable

objects on the new

computer

Lifecycle Of Virus

Page 11: Cybercrime: Virus and Defense

What does Viruses Do Erase files. Display a message. Scramble data on a hard disk. Cause erratic screen behavior. Halt the PC. Many viruses do nothing obvious

at all except spread. Hide data. Allow someone to gain illicit

access to the computer. Redirect websites to the adverts

or other websites.

Causes pop-up and try to tempt users to buy kinds of software

program. Reduce memory space. Damage disks & programs. Can record keystrokes and screen

data. Can steal confidential passwords

& information and pass to the malware author.

Finally, virus can grab control from the authentic user.

Page 12: Cybercrime: Virus and Defense

Types

Boot Sector Virus File Infecting Virus Macro Virus Metamorphic & Polymorphic

Virus Multipartite Virus Note : worms or trojans , two common

threats that are similar to viruses but technically not the same.

Page 13: Cybercrime: Virus and Defense

ContinueBoot sector virus: A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The infected code runs when the system is booted from an infected disk, but once loaded it will infect other disks when accessed in the infected computer. Removing a boot sector virus can be difficult because it may encrypt the boot sector. In many cases, users may not even be aware they have been infected with a virus until they run an antivirus protection program.

Page 14: Cybercrime: Virus and Defense

ContinueFile Infecting Virus: A file-infecting virus infects executable files with the intent to cause permanent damage or make them unusable. A file-infecting virus overwrites code or inserts infected code into a executable file. This type of virus can infect a number of operating systems, including Macintosh, Windows and Unix. Moreover, a severe form of file-infecting virus can also completely reformat a hard drive.Win32.Sality.BK is a popular file-infecting virus that was among the top 10 malware infections in 2011 and 2012.

Page 15: Cybercrime: Virus and Defense

ContinueMacro Virus: Macro viruses add their code to the macros associated with documents, spreadsheets and other data files.

The first macro virus, called “Concept”, appeared in July 1995 .

“Melissa” made history as the first macro virus with email. It started spreading via email on March 26, 1999 infecting tens of thousands within hours. Macro viruses subsequently became the dominant type of virus until the turn of the century, when Microsoft disabled macros by default in Office program (since Office v2000).

Page 16: Cybercrime: Virus and Defense

Metamorphic & Polymorphic Virus: Metamorphic malware is rewritten with each iteration and after each iteration the code is different from the preceding one. The code changes makes it difficult for signature-based antivirus software programs to recognize that different iterations are the same malicious program.

Polymorphic malware also makes changes to code to avoid detection. It has two parts, but one part remains the same with each iteration, which makes the malware a little easier to identify.

Continue

Page 17: Cybercrime: Virus and Defense

ContinueMultipartite Virus: Also called multi-part virus or hybrid virus. A multipartite virus is a fast-moving virus that uses file infectors or boot infectors to attack the executable files or the boot sector simultaneously. Most viruses either affect the boot sector or the program files. The multipartite virus can affect both the boot sector and the program files at the same time, thus causing more damage than any other kind of virus.This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Page 18: Cybercrime: Virus and Defense

Preventing Computer Virus

Never download programs from untrusted sites.

Be cautious when opening email attachments.

Disable image previews in your email client.

Use an anti-malware solution. Use a firewall. Regularly update your OS.

Monitor all devices proactively. Pay attention to virus warnings

and notifications. Inform your IT department. Take care in removing the virus.

Note : PLEASE , ALWAYS HAVE A BACKUP FILE

Page 19: Cybercrime: Virus and Defense

Reference List:https://answers.yahoo.com/question/index?qid=1006022302471http://www.cisco.com/c/en/us/about/security-center/virus-differences.htmlhttp://online.lewisu.edu/msis/resources/the-evolution-of-the-computer-viruswww.webopedia.comwww.techtarget.comwww.Wikipedia.comhttps://www.techopedia.com/definition/55/file-infecting-virushttps://usa.kaspersky.com/internet-security-center/definitionshttps://security4web.org/glossary.php?w=Encrypted%20Virushttps://blog.teamviewer.com/prevent-computer-virus/

Page 20: Cybercrime: Virus and Defense

THANK YOU