Вы находитесь на странице: 1из 28

Project on

Presented by
Suman Gupta
Roll No:MS118
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* WHAT IS COMPUTER VIRUS ?

?
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

*VIRUS
(ROGUE SOFTWARE)
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* WHO ARE ROGUE PROGRAMMERS ?


SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* TYPES OF COMPUTER VIRUS


SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* WHAT ALL CAN THEY DO ?


SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* HOW DO THEY INFECT ?


SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* HOW NOTICE ?

R
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* WHAT TO DO ?

NO !
VIRUS
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* LAST WORD
SEQUENCE
OF PRESENTATION
COMPUTER VIRUS

* CONCLUSION
WHAT IS COMPUTER
VIRUS ?
COMPUTER VIRUS

“ A COMPUTER PROGRAM ABLE TO


INFECT OTHER PROGRAMS BY
MODIFYING THEM TO INCLUDE A
POSSIBLY EVOLVED VERSION OF
ITSELF. ”
WHAT IS COMPUTER
VIRUS ?
COMPUTER VIRUS

* BE A SET OF COMPUTER
INSTRUCTIONS
* BE DELIBERATELY CREATED
* DO UNDESIRABLE THINGS (DAMAGES)
* PROPAGATE USING HOST PROGRAMS
COMPUTER
COMPONENTS
COMPUTER VIRUS
SOFTWARE

ROGUE LEGITIMATE
SOFTWARE SOFTWARE

DESTRUCTIVE PRODUCTIVE
ROGUE SOFTWARE
COMPUTER VIRUS

* BUG-WARE
- NOT MEANT FOR DESTRUCTION
* THE TROJAN HORSE
- APPEARS TO BE USEFUL
* WORMS
- TRAVEL IN NETWORK
* REPLICATORS
- COPY ITSELF TO EXHAUST DISK
* CHAMELEONS
- M ISCHIEF
ROGUE
SOFTWARE
SOFTWARE
COMPUTER VIRUS

* TIME BOMBS
- EXPLODE ON TIME / DATE
* LOGIC BOMBS
- EXPLODE ON LOGIC
* SOFTWARE BOMBS
- EXPLODE ON LAUNCH
WHO ARE ROUGE
PROGRAMERS ?
COMPUTER VIRUS

* PSYCHO CASES

- FOR FUN
- RELEASE ANGER
- TAKE REVENGE
WHO ARE ROUGE
PROGRAMERS ?
COMPUTER VIRUS

* PROFIT EARNERS
$
- VIRUS / ANTIVIRUS
MARKET
WHO ARE ROUGE
PROGRAMERS ?
COMPUTER VIRUS

* INFO ATTACKERS

- DISRUPT ENEMY’S
INFORMATION &
NETWORK
TYPES OF COMPUTER
VIRUS
COMPUTER VIRUS

* BOOT / PARTITION INFECTING VIRUS


* EXECUTABLE FILE INFECTING VIRUS
* MULTI-PART VIRUS
* DIRECTORY INFECTING VIRUS
RESIDENT NON RESIDENT
WHAT CAN THEY
COMPUTER VIRUS DO?
• FORMAT DISK
• COPY, RENAME AND DELETE FILES
• COPY THEMSELVES WITH NEW
CONFIGURATION INFORMATION
• MODIFY FILE DATES AND EXTENSIONS
• CALL OTHER COMPUTERS TO UPLOAD AND
DOWN LOAD FILES
HOW DO THEY DO ?
COMPUTER VIRUS

 APPENDING
 INSERTION
 INTERCEPTION
 REDIRECTION
 REPLACEMENT
HOW DO YOU NOTICE ?

COMPUTER VIRUS

 COMPUTER OPERATION BECOMES SLUGGISH


 PROGRAMS TAKE LONGER TO LOAD
 PROGRAMS ACCESS MULTIPLE DISK DRIVES
 UNUSUAL AND FREQUENT ACCESS TO DISK
 DISK SPACE DECREASES RAPIDLY
 BAD DISK SECTORS STEADILY INCREASE
 RAM DECREASES SUDDENLY OR STEADILY
 COMPUTER HALTS WITH OR WITHOUT FUNNY
MESSAGES
HOW DO YOU NOTICE ?
COMPUTER VIRUS

 PROGRAMS ENCOUNTER ERRORS


 PROGRAMS GENERATE UNDOCUMENTED

ERRORS
 FILES REPLACED WITH GARBAGE

 FILES MYSTERIOUSLY DISAPPEAR

 FILE ATTRIBUTES AND DATA CHANGE

 DATA FILES OR DIRECTORIES OF

UNKNOWN ORIGIN APPEAR


WHAT TO DO ?
COMPUTER VIRUS

THE IDEAL ANTIVIRUS SAFETY NET


CONSISTS OF AN INTELLIGENT, WELL
TESTED AND WELL BALANCED
COMBINATION OF SAFE COMPUTING
METHODS PLUS VIRUS PREVENTION
AND VIRUS DETECTION SYSTEMS
THE LAST WORD
COMPUTER VIRUS

“THE ONLY TRULY SECURE


SYSTEM IS ONE THAT IS
POWERED OFF, CAST IN A BLOCK
OF CONCRETE, AND SEALED IN A
LEAD-LINED ROOM WITH ARMED
GUARDS AND EVEN THEN I HAVE
MY DOUBTS.” E. H. SPAFFORD
ASSOCIATE PROFESSOR
DEPTT OF COMPUTER SCIENCES
PURDUE UNIVERSITY
CONCLUSION
“LEARN TO LIVE WITH IT”
COMPUTER VIRUS

 SAFE COMPUTING TECHNIQUES


 MANAGE SOFTWARE PIRACY
 EDUCATE USERS
 KEEP ABREAST OF THE LATEST
VIRUS AND ANTIVIRUS
 REVIEW SITUATION
Thank
you

Вам также может понравиться