Hacking and virus and antivirus.

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

GROUP MEMBERS:

GROUP MEMBERS 31 NIKITA MIRANI 35 DISHANT NAGRANI 11 CHIRAG DEMLA 13 MUKTA CHUGH 15 UMESH GEMNANI 27 SONALI LACHHANI 30 KAVITA MAKHIJA 40 AKSHAY RAMCHANDANI

HACKING…:

HACKING…

HIGHLIGHTS :

HIGHLIGHTS What is hacking? Types of hacking Types of hackers Case study Security 31 NIKITA MIRANI

Introduction:

Introduction Hacking is unauthorized use of computer and network resources. Computer hacking is basically an alteration of computer hardware or software, in order to accomplish a goal which is outside of the creator’s original purpose.

Is hacking a crime?? :

Is hacking a crime?? Hacking is NOT a CRIME

UNETHICAL HACKING..?:

UNETHICAL HACKING..? It is illegal . It is done for just fun and money purpose. Most of the people do this for BLACKMAILING.

Ethical Hacking:

Ethical Hacking ----- To Stop a Hacker is to think Like One! Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

Why do hacker attack us??:

Why do hacker attack us?? Client or customer information or other business data Credit card details and social security numbers, for identity fraud or theft Passwords for access to our online bank, or web services Email addresses, which may be used for spamming 35 DISHANT NAGRANI

WHAT CAN A HACKER DO??:

WHAT CAN A HACKER DO?? Steal Your Number Take Your Information Steal your password file Keep a watch on your transactions Hijack your sessions

Effects of computer hacking:

Effects of computer hacking An unexplained decrease in hard drive space availability Files unexpectedly appear or grow in size Files unexpectedly disappear or are modified Sudden computer or network performance changes Frequent crashes Strange messages or dialog boxes appearing on our screen Our computer or router Internet data transfer light blinking, when we're not accessing the Net

PowerPoint Presentation:

Famous hackers all over the world 11 CHIRAG DEMLA

PowerPoint Presentation:

Stewert Nelson from America followed Nehshan in1972 Nahshon Even-Chaim (born May 1971), was the first major computer hacker Ankit Phadia from India is also a well known name in hackers history Abdur zairh from Pakistan has also a good name in this world

Types of Hackers:

Types of Hackers Distinction on the basis of knowladge CODERS ADMINS SCRIPT KIDDIES Distinction on the basis of LEGALITY WHITE HATS GREY HATS BLACK HATS

Coders:

Coders Have full knowledge. They know what exactly they are doing Well aware about the different codes Have complete idea what is going beyond coding.

Admins:

Admins Knows what they are doing. They don’t have idea that what exactly going beyond codes. Result oriented persons They are not so harmful.

SCRIPT KIDDIES:

SCRIPT KIDDIES Young in-experienced hackers Copy codes and techniques from knowledgeable hackers . Don’t know what’s going beyond the coding. Use techniques for fun purpose. Sometimes could be very dangerous for the system,

Case Study(contd..):

Case Study(contd..) H4cking prone areas

Black Hats:

Black Hats very dangerous persons. Always have motive to earn huge profit. Highly paid persons. Evolves themselves mostly in criminal activities. These could be coders, admins as well as script kiddies 13 MUKTA CHUGH

GREY HATS:

GREY HATS Also known as red hats. Perform both tasks fair as well as unfair. Generally these are admins. Have little high pay than white hats. Generally not so dangerous, but sometimes could be.

White hats:

White hats These are good hackers . Have genuine license to hack. Have registered police records Evolves themselves in good works Generally owned by companies for security designing Have high pay scales. Generally these are coders.

Steps performed by hacker:

Steps performed by hacker Reconnaissance… Scanning… Gaining access… Maintaining access… Covering tracks and Clearing logs…

Security & Counter Measures:

Security & Counter Measures Use of anti-viruses. Proper logout after use of mail id. Manual opening browser don't open spam. Password protected admin account. 31 NIKITA MIRANI

COMPUTER VIRUS…..:

COMPUTER VIRUS…..

INTRODUCTION:

INTRODUCTION What is virus…? Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS 15 UMESH GEMNANI

DEFINITION:

DEFINITION Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host

PowerPoint Presentation:

Symptoms Classifying viruses Examples Prevention Conclusion OVERVIEW

TRANSMISSION OF VIRUSES:

TRANSMISSION OF VIRUSES Most of the viruses spread through internet Today almost 87% of viruses spread through internet…..

Symptoms of virus attacks:

Symptoms of virus attacks Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Computer runs slower then usual Files sometimes disappear

Classification of Virus:

Classification of Virus 27 SONALI LACHHANI

TROJAN HORSE:

TROJAN HORSE Unlike viruses , Trojan horses do not replicate themselves but they can be just as destructive The term comes from the a Greek story of the Trojan Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations A trojan horse virus can spread in a number of ways. The most common means of infection is through email attachments Another way that malware developers spread their trojan horse viruses is via chat software such as Yahoo Messenger and Skype

WORMS:

WORMS These are special type of viruses. They don’t infect files. They immediately delete those file which they do not understand. worms are the program that reproduce, execute independently and travel across the network connect The key difference between a virus and worm is the manner in which it reproduces and spreads.

MACRO:

MACRO In computing terminology, a macro virus is a virus that is written in a macro language Modern antivirus software detects macro viruses as well as other VIRUSES According to some estimates, 75% of all viruses today are macro viruses Once a macro virus gets onto your machine, it can embed itself in all future documents you create with the application

PREVENTION:

PREVENTION The first step in preventing infection is by installing anti-virus software on your all your computers Update your anti-virus software regularly WHEN IN DOUBT, THROW IT OUT! Always use caution and do not open, download email attachments. Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.

Antivirus Program & its usage:

Antivirus Program & its usage

Contents::

Contents: Introduction to Antivirus Software Features Types of some popular antiviruses How an Antivirus works Tips For Virus Detection & Prevention Virus Updates. Worm Alert Misconceptions General precautions you should take 40 AKSHAY RAMCHANDANI

Antivirus Software:

Antivirus Software An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks.

Features:

Features Antivirus software have the capability of searching an entire file on a computer system. This prevents viruses, spyware, and malware from hiding on your computer system and compromising the data stored on it.

Types of some popular Antivirus:

Types of some popular Antivirus

McAfee Antivirus:

McAfee Antivirus

AVG Antivirus:

AVG Antivirus

Kaspersky Antivirus:

Kaspersky Antivirus

AntiVir Antivirus:

AntiVir Antivirus

NOD32 Antivirus:

NOD32 Antivirus

How an Antivirus works:

How an Antivirus works Using dictionary Approach: The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.

Using Suspicious Behavior Approach::

Using Suspicious Behavior Approach: Antivirus software will constantly monitors the activity of all the programs. If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus.

Tips for Virus Detection and Prevention :

Tips for Virus Detection and Prevention Do not open any files attached to an email from an unknown, suspicious or untrustworthy source. Do not open any files attached to an email if the subject line is questionable or unexpected . Back up your files on a regular basis. Update your anti-virus software regularly. Do not download any files from strangers. 30 KAVITA MAKHIJA

AntiVirus Updates:

AntiVirus Updates Providing regular updates for the virus dictionary. You should look for antivirus program that provides free virus updates on a periodic basis. Most commercial antivirus software in today’s scenario provide virus updates on daily basis.

Worm Alert:

Worm Alert

Virus found!!:

Virus found!! Repair Quarantine Delete Ignore

Misconceptions:

Misconceptions Although there are multiple types of antivirus software to help keep your computer system safe, you shouldn't use more than one at a time. Having several antivirus software programs installed on a single computer system will expose it to vulnerabilities.

General precautions you should take:

General precautions you should take When inserting removable media (floppy, CD, flash drive etc.) scan the whole device with the antivirus software before opening it. If you have internet access, make sure you use internet security software. Get Windows updates. From time to time, update your installed software to their latest version. E.g. (MS Office, Adobe Reader, java, Flash player etc.)

authorStream Live Help