1 / 24

VIRUS TECHNOLOGY

VIRUS TECHNOLOGY. INTRODUCTION. The basics of computer Virus Summarizing what they are ? How they attack ? What we can do to protect our selves ?. What is Computer Virus ?.

darice
Télécharger la présentation

VIRUS TECHNOLOGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VIRUS TECHNOLOGY

  2. INTRODUCTION • The basics of computer Virus • Summarizing what they are ? • How they attack ? • What we can do to protect our selves ?

  3. What is Computer Virus ? • A comp. Virus is a coded program that is written in Assembly or System programming language to gain entry into host system and modify existing program and perform a series of action without user consent

  4. HISTORY OF COMPUTER VIRUSES • The Pre-Historic Period • The Early Times • The Middle Ages • The Current Picture • The Emerging Scenario

  5. CLASSIFICATION OF VIRUSES • General Classification Of Viruses • Behavioral Classification of Viruses

  6. General Classification Of Virus Viruses Boot Sector Viruses File Viruses Directory Viruses Parasitic Virus MacroVirus Hard Disk Master Boot Record (MBR)/ Partition Table Viruses Floppy Disk Boot Sector Viruses

  7. Behavioral Classification of Virus • Nature Of Attack • Deception Techniques Employed • Frequency of Infection Next

  8. Nature Of Attack Viruses Direct Action Viruses Resident Virus Back

  9. Deception Techniques Employed Viruses Stealth Virus Polymorphic Virus Cavity Virus Tunneling Virus Batch File Virus Camouflage Viruses Armored Viruses Companion Viruses Multipartite Viruses Back

  10. Frequency of Infection Viruses Fast Infector Virus Slow Infector Viruses Sparse Infector Viruses Back

  11. LIFE CYCLE OF A VIRUS Propagation The virus spreads to other systems The propagated virus is activated Gestation Activation STAGE - 3 STAGE - 2 STAGE - 4 The created virus is released to the outside world Users become aware of the virus and isolateit STAGE - 1 STAGE- 5 Discovery Creation The same or a diff. developer develops a diff. strain of a new virus and the progress begins afresh Vaccine for the virus is developed STAGE - 6 STAGE - 7 Assimilation Eradication When the use of vaccine become widespread thevirus is eradicated

  12. QUALITIES OF A VIRUS A virus must incorporate a replicating routine. A virus should be able to install itself in the RAM. A virus has a trademark trigger routine. Some viruses have an encryption routine. Most viruses are designed to exhibit some sort of stealth characteristics to avoid detection.

  13. HOW DOES VIRUS WORKS Enter by email,downloads,floppy disk or hacking Then make copies of itself to spread. They will wait for the signal for being activated.

  14. SYMPTOMS OF A VIRUS INFECTION Graphics and unusual text will appear. Music will play for no reason. Program and data file suddenly corrupted. Disk volume is changed. Files and directories have been changed suddenly. Your computer goes slowdown. System memory have been changed. Hardware devices begin to exhibit unusual behavour. Interrupt vector have been changed.

  15. HOW VIRUSES SPREAD SO QUICKLY ? The larger amount of spreading the virus is user base, the more widespread and quicker the infection. The level of piracy is also influence to spread. The complexity & characteristics of the virus code helps a virus to spread effectively. Internet is also cause to spread the virus quickly.

  16. POSITIVE VIRUS A virus is ‘bad’ or ‘good’ depends on the virus developer. Virus is made of two parts.  Propagation mechanism.  Payload. Propagation mechanism Spreads comp. To comp. It is a technical challenge that lets fun of designing it. Propagated virus automatically spreading until halted. Entire meaning is easy to get and hard to recover. Ex. If a virus which acts as anti-virus that detect the negative virus and remove from the system.

  17. “I LOVE YOU” VIRUS A love letter which is win32 based on e-mail attachments. HOW DO I GET IT ? Attachment named : LOVE-LETTER-FOR YOU.TXT The warning is protect.vbs. When it opened virus infects to the system. Unless you are sure that the doc. Is free from virus. If you are unsure than ask to the sender to confirm. Difficult to open .mp2 , .mp3 , .midi , .wav Etc. Difficult to open .jpg , .bmp , .gif etc

  18. What is Anti-Virus Anti-Virus is a specialized utility program which is used to detect , eradicate and prevent viruses.

  19. DIFFERENT ANTI-VIRUS TECHNOLOGY • Hook Driver It provides databases in notes. • Extension Manager It allows a program to be run natively.

  20. HOW EFFECTIVE IS AN ANTI-VIRUS S\W IS ? Methodology of detecting, and incorporate anti-virus. They have their own database to compare string of virus string to detect. An intelligent virus may breakdown your anti-virus s\w. Timely and regularly upgrade the anti-virus s\w If more than one user use one computer ,always check all local drives after download any data. NEXT

  21. COULD ANTI-VIRUS PROGRAM ITSELF BE INFECTED? Clever virus may infect the anti-virus s\w. Parallel you might be use the another corporate anti-virus. If one fails than the other might be detect. The developer make an anti-virus s\w after confirmation. NEXT

  22. QUALITIES OF AN ANTI-VIRUS S\W. Directly it remove to your system memory. Example of virus which is same as cancer cells. Two ways of virus detection. Signature based like polymorphic virus. Rule based like genetic in nature. Cat and mouse game bet’n developer and writers. NEXT

  23. LIMITATIONS OF ANTI-VIRUS PROGRAMS Limited database virus strings. old version can’t detect. Directly not work on on-line services. Restricted coverage area for an anti-virus s\w NEXT

  24. CONCLUSION • While using diff. External Data storage devices like cd’s, floppy disk • scan all the system with the help of upgrade anti-virus soft-ware. • The hazard ness cause by the virus to our system for which we have to take care. • “PREVENTION IS ALLWAYES BETTER THAN CURE”.

More Related