Computer Viruses

Views:
 
     
 

Presentation Description

this presentation covers in details about computer viruses, trojans and others threats

Comments

By: mohantxt (18 month(s) ago)

nice

By: inas11 (30 month(s) ago)

nice

By: pulkitjain91 (32 month(s) ago)

i need this ppt please mail this to me at pulkit_jain_91@yahoo.co.in

By: kannapharma (34 month(s) ago)

please mail me sir kannapharma@gmail.com

By: IAGAUR (38 month(s) ago)

funniest but knowledgeable presentation

See all

Presentation Transcript

Slide 1: 

COMPUTER VIRUSES AND ANITVIRUSES TECHNIQUES

Slide 2: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT IS COMPUTER VIRUS ? ?

Slide 3: 

SEQUENCE OF PRESENTATION * VIRUS (ROGUE SOFTWARE) I COMPUTER VIRUS

Slide 4: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHO ARE ROGUE PROGRAMMERS ?

Slide 5: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * TYPES OF COMPUTER VIRUS

Slide 6: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT ALL CAN THEY DO ?

Slide 7: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * HOW DO THEY INFECT ?

Slide 8: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS V I R U S * HOW NOTICE ?

Slide 9: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * WHAT TO DO ? VIRUS NO !

Slide 10: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * LAST WORD

Slide 11: 

SEQUENCE OF PRESENTATION COMPUTER VIRUS * CONCLUSION

Slide 13: 

WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS “ A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF. ”

Slide 14: 

WHAT IS COMPUTER VIRUS ? COMPUTER VIRUS * BE A SET OF COMPUTER INSTRUCTIONS * BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS

Slide 15: 

COMPUTER VIRUS COMPUTER COMPONENTS SOFTWARE ROGUE SOFTWARE LEGITIMATESOFTWARE PRODUCTIVE DESTRUCTIVE

Slide 16: 

ROGUE SOFTWARE * BUG-WARE - NOT MEANT FOR DESTRUCTION * THE TROJAN HORSE - APPEARS TO BE USEFUL * CHAMELEONS - M ISCHIEF * REPLICATORS - COPY ITSELF TO EXHAUST DISK * WORMS - TRAVEL IN NETWORK

Slide 17: 

* SOFTWARE BOMBS - EXPLODE ON LAUNCH * LOGIC BOMBS - EXPLODE ON LOGIC * TIME BOMBS - EXPLODE ON TIME / DATE

Slide 18: 

WHO ARE ROUGE PROGRAMERS ? * PSYCHO CASES COMPUTER VIRUS - FOR FUN - RELEASE ANGER - TAKE REVENGE

Slide 19: 

WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * PROFIT EARNERS $ $ $ $ $ - VIRUS / ANTIVIRUS MARKET

Slide 20: 

WHO ARE ROUGE PROGRAMERS ? COMPUTER VIRUS * INFO ATTACKERS - DISRUPT ENEMY’S INFORMATION & NETWORK

Slide 21: 

TYPES OF COMPUTER VIRUS COMPUTER VIRUS * BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS RESIDENT NON RESIDENT

Slide 22: 

WHAT CAN THEY DO ? FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES COMPUTER VIRUS

Slide 23: 

COMPUTER VIRUS HOW DO THEY DO ? APPENDING INSERTION INTERCEPTION REDIRECTION REPLACEMENT

Slide 24: 

HOW DO YOU NOTICE ? COMPUTER VIRUS

Slide 25: 

HOW DO YOU NOTICE ? COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES COMPUTER VIRUS

Slide 26: 

HOW DO YOU NOTICE ? PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR COMPUTER VIRUS

Slide 27: 

WHAT TO DO ? ANTI VIRUS TECHNIQUES

WHAT TO DO ? : 

WHAT TO DO ? SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH COMPUTER ANTI VIRUS

Slide 29: 

WHAT TO DO ? SAFE COMPUTING METHODS * YOU MUST COMPUTER ANTI VIRUS

Slide 30: 

WHAT TO DO ? SAFE COMPUTING METHODS COMPUTER ANTI VIRUS YOU MAY USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS

Slide 31: 

WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEMS TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION SLOW SPEED UNNECESSARY INTERRUPTS CAN BE INFECTED BY VIRUS HEAVY ON RAM COMPUTER ANTI VIRUS

Slide 32: 

WHAT TO DO ? ANTIVIRUS SOFTWARE SYSTEMS DETECTION SYSTEMS LOAD, RUN AND EXIT CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC COMPUTER ANTI VIRUS

Slide 33: 

WHAT TO DO ? SOME ANTIVIRUS SOFTWARE VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS COMPUTER ANTI VIRUS

Slide 34: 

WHAT TO DO ? THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS

Slide 35: 

SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE

Slide 36: 

THE LAST WORD “THE ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS.” E. H. SPAFFORD ASSOCIATE PROFESSOR DEPTT OF COMPUTER SCIENCES PURDUE UNIVERSITY

CONCLUSION“LEARN TO LIVE WITH IT” : 

CONCLUSION“LEARN TO LIVE WITH IT” SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION