SEMINAR ON COMPUTER VIRUSES

Views:
 
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

PowerPoint Presentation:

SEMINAR REPORT ON COMPUTER VIRUSES Submitted To:- Submitted By:- Mrs. Debaswapna Mishra Mr. Jyotiprakash Das Asst. Prof., CSA Dept. Roll No-58MCA/11 MCA 5 th Semester

PowerPoint Presentation:

INTRODUCTION the most high-profile threats to information integrity is the computer virus. The most sophisticated threats to computer systems are presented by programs that exploit the vulnerabilities in computing systems Malware has a mechanism to replicate and propagate itself. The different types of malware are: Trap doors, logic bombs, trojan horses, viruses, worms and zombies.

PowerPoint Presentation:

Other viruses Worms Spam Virus Hoaxes Trojan Horses Adware Spyware Malware

PowerPoint Presentation:

What is a viruses ? Full form of “ Virus ” V I R U S VITAL INFORMATION RESOURCE UNDER SEIZED Virus A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another when its host is taken to the target computer through Internet, CD, DVD, Floppy Disk, Pen Drive and other removable medium .

:

Boot viruses Program viruses Polymorphic viruses Stealth viruses Macro viruses Network viruses Multipartite Viruses Types of viruses

Boot viruses: :

Boot viruses: These viruses infect floppy disk. These viruses load into memory if the computer tries to read the disk while it is booting. Boot sector viruses can be created without much difficulty and infect either the Master boot record of the hard disk or the floppy drive.

program viruses: :

program viruses: They infect program files like files with extensions like .EXE, .COM , .BIN , .DRV and .SYS. Some file viruses just replicate while others destroy the program being used at that time. when executed they load the virus in the memory along with the program and perform the predefined steps and infect the system

STEALTH VIRUSES: :

STEALTH VIRUSES: These viruses steals computers memory . They viruses are use various methods to hide themselves and to avoid detection.

POLYMORPHIC VIRUSES: :

POLYMORPHIC VIRUSES: These viruses are more difficult to detect They have the ability to mutate this means that they change the viral code known as the signature each time it spreads or infects.

macro viruses: :

macro viruses: A macro virus is a new type of computer virus that infects macros with in a document . In essence, a macro is an executable program embedded in a word processing document or other type of file. Typically users employ macros to automate repetitive tasks and there by save key strokes.

network virus: :

network virus: These viruses rapidly spreads through LAN and internet. INTERNET LAN

Multipartite Viruses:

Multipartite Viruses Multipartite viruses are the hybrid variety; they can be best described as a cross between both Boot Viruses and File viruses. They not only infect files but also infect the boot sector.

PowerPoint Presentation:

How does a virus works ? A Virus is a malicious code whose chief purpose is to copy itself and maybe doing something malicious along the way. To do this, it needs to enter in an execution stream. The virus can get itself called by adding a line to a configuration script, appending itself to files which are to be opened and maybe processed, or getting the OS or a process to run it through an exploit.

PowerPoint Presentation:

Antivirus Approaches The ideal solution to the threat of viruses is prevention. Do not allow a virus is get into the system in first place. This goal is in general difficult to achieve, although prevention can reduce the no: of successful viral attacks.. Detection: Once the infection has occurred, determine that it has occurred and locate the virus. Identification: Once detection has been achieved, identify the specific virus has infected a program. Removal: Once the specific virus has been identified, remove all traces of the virus from the infected program and restore it to its original state. Advances in viruses and antivirus technology go hand in hand. As the virus arms race has evolved, both viruses and antivirus software have grown more complex and sophisticated

PowerPoint Presentation:

Get a high quality anti – virus as well as anti – spyware. Set up a software firewall. If you don’t have a software firewall built in then upgrade your operating system. Set up your computer so that it doesn’t autolaunches files, updates, security checks, html pages, cookies, etc. without your permission. Protection from virus

PowerPoint Presentation:

Usage of the “ good-virus ” in Centralized Anti-Virus Update: The person responsible for maintaining the virus protection has to go personally to each computer and download the new version of the package manually from the server, the situation has not improved very much. One segment of the worm will constantly monitor the logins. Each time a workstations attempts to login, that segment automatically queries that workstation whether it is running the anti-virus product and which version of it. Affirmation to “ good virus ” Norms: It conforms to the Control requirement as the virus attempts to spread only on the computers attempting to access the network on which it is running. In fact, the replication code will not be copied, if they are not needed. The fact that it is a worm and spreads as a whole on the network makes it relatively easy to fulfill the requirement too. Since the "virus" modifies only old copies of itself and does not touch other programs, no compatibility problems due to its virus-like behavior will occur.

PowerPoint Presentation:

conclusion Computer viruses are not evil and that programmers have a right to create them, posses them and experiment with them. But we should never support those people who writing viruses with destructive nature Thus it can be effectively proved that it is possible to use the concept of a virus for beneficial purposes. The future might use this technology for tedious and resource consuming jobs like software updates, system maintenance and intruder detection. The “good viruses” are capable of annihilating their malicious counterparts

PowerPoint Presentation:

The Little Black book of Computer Viruses (electronic edition) By Mark A. Ludwig An Undetectable Computer Virus by David Chess and Steve White, presented at the Virus Bulletin Conference, September 2000 [PDF version] Fred Cohen, Computer Viruses - Theory and Experiments, Computer Security: A Global Challenge, Elsevier Science Publishers B. V. (North-Holland), 1984, pp. 143-158. Fred Cohen, Models of Practical Defenses against Computer Viruses, Computers Security , 8 (1989), 2, pp. 149-160. Nachenberg, C. “Computer Virus-Antivirus Coevolution.” Communications of the ACM. Computational Aspects of Computer Viruses by Fred Cohen Trends in Computer Virus Research by Fred Cohen Methodology of Computer Anti-Virus Research by Vesselin Bontchev Bibliography

PowerPoint Presentation:

Thank you

PowerPoint Presentation:

Queries ?

authorStream Live Help