1 / 24

Chapter 1

Viruses: Attack of the Malicious Programs. Chapter 1. What is a virus?. What is a virus?. A computer virus is a malicious computer program that, when executed by an unsuspecting human, performs tasks that primarily include replicating itself and deploying a payload. What is a virus?.

vito
Download Presentation

Chapter 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Viruses: Attack of the Malicious Programs Chapter 1

  2. What is a virus?

  3. What is a virus? • A computer virus is a malicious computer program that, when executed by an unsuspecting human, performs tasks that primarily include replicating itself and deploying a payload.

  4. What is a virus? • A computer virus is a malicious program.. • Written by somebody who is up to no good that, when executed by an unsuspecting human • Viruses need human help, usually, the human is tricked into starting the virus. performs tasks that include replicating itself and deploying a payload • (next slide)

  5. Some possible virus payloads • jokes/vandalism • Data destruction/corruption • Spam distribution • Data/information theft • Hijacking • Ransomware • Virus and spyware distribution

  6. Kinds of malware • Viruses • Macro Viruses • Memory-resident viruses • File infector viruses • Boot Viruses • Trojan Horses • Hoaxes • Worms

  7. Macro viruses • Macros are command sequences available in many systems; word is one, excel is another. • A macro can eploy a virus, just like any other executable. • The often come with email attachments. • They can open/close/write/destroy files. • If they destroy your registry, your computer will not boot! • Best: turn off the capability to run macros by default.

  8. Turning off macros • Office 2003: • Tools → Options → Security tab. In macro security, click Macro security button, click security level tab, and choose a level. The book recommends medium setting. • Office 2007: • Office button → <product> Options → Trust Center, click trust center setting button. Choose the macro setting you want: recommended: Disable all macros with Notification.

  9. Memory Resident Viruses • Memory resident viruses load into RAM when activated and stay there; though they will disappear when the machine is turned off, the often set up a mechanism so they reappear when the machine is rebooted. • They slow down the computer and can damage data and system files and may stop the computer from running correctly.

  10. File infector viruses • These are files that attach to program files (files called *.EXE or *.COM) • They have access to anything the original program has and can damage any of them, ergo, the whole computer (software).

  11. Boot Viruses • These are viruses which “hide” the boot area of a disk/floppy. The may render the disk useless as a bootable disk.

  12. Trojan Horses • Trojan Horses are viruses that are inside other (interesting) programs; you run the program and launch the virus at the same time.

  13. Multi-Partite Viruses • They just combine all of the above.

  14. Hoaxes • Letters that warn you about viruses that aren't • Threaten catastrophe • Reference a technology authority like IBM, Microsoft or the FBI. • Ask that it be resnt, probably several times. • Usually a Google Search will reveal the hoax. • Other sites to look: www.f-secure.com/virus-info/hoax and www.snopes.com

  15. Worms • These are malware that goes from computer to computer withut human intervention. • Besides other ill-effects, they often clog networks looking for computers to infect.

  16. Some avoidance tips • Install an anti-virus program and keep it up to date • McAfee or AVG from http://free.grisoft.com/ • Be wary of unexpected links and attachments • Don't use P2P/BitTorrent • Never turn off your anti-virus or your firewall. • Check thumb drives, floppies, burned CDs and DVDs • Don't accept files from unknown people when using Internet Chat programs such as MSN Messenger, IM, Yahoo Messenger, IRC.

  17. Symptoms of a sick System • Frequent crashes and system restarts • slow/erratic performance • Broken/erratic internet connection • An active internet connection in an otherwise idle computer • Stuff in your sent folder you didn't send. • Missing or corrupt data/files.

  18. What to do? • Update your antivirus software. • Disconnect from the internet: turn off your modem/router and wireless. (Quarantine every computer) • If your antivirus found the virus and cleaned it, you are fine, otherwise: • Boot into safe mode • Do a system virus scan. Repeat until clean.

  19. If you cannot get on the Internet... • Your virus may have fiddled with a file called HOSTS • Its full name is: C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS on most systems (XP and VISTA, probably Windows 7 also). • Its contents should only be: 127.0.0.1 localhost and (in Vista, Windows 7): ::1 localhost • There may be some lines with ipv6xx names on them, they are OK. • Edit the file with Notepad

  20. Operating System Security Features • KEEP YOUR OS UP TO DATE; set it to check for updates periodically (at least once a week). • Install and run antivirus software; keep it up to date (it should update automatically). • Keep your Firewall operational. • In Vista and Windows 7, (and in the MAC), every time some program tries to change the system in some significant fashion, a window prompt appears. Called UAC in Windows, it can be turned off. DON'T

  21. More System Security Features • Be sure to set up all accounts as STANDARD accounts; have a special Administrator account (hopefully called something else) for admin tasks. • Windows has something called Data Execution Prevention (DEP). To set: • In XP: use sysdm.cpl, Advanced, performance, click on Settings and choose the level. • In Vista/Windows 7: system, Advanced System Setting, Advanced Tab, Settings, DEP settings.

  22. Viruses on Other devices • On the MAC: before OS X there were about 60-80 viruses.; only a handful for OS X. So, not a real problem; however: • PC viruses can happily live (dormant) in MAC files. • Newer MACs can run Windows, and there, all bets are off. • Unix/Linux have seen a handful of Virus, none for monetary gain. It is possible, now, to run Windows in Linux, so, again, the Caveat above applies. Also, PC viruses can exist in any file.

  23. Viruses in Phones/PDAs • Attacks against cell phones: Through SMS messages. The possibility existed. Otherwise • Five kinds of devices: • Symbian • Handful, spread through Bluetooth • RIM (Blackberrys) • None known • Iphones, etc. • None known, unless the phone is “jailbroken” • Windows Mobile Phones • Too new. • Android • Some apps have been malicious, but not been able to spread.

  24. If your virus doesn't remove,try: • http://www.sarc.com/avcenter/tools.list.html • http://us.mcafee.com/virusinfo/default.asp?id=vrt. • http://www.kaspersky.com/removaltools • http://www.bitdefender.com/site/Download/browseFreeRemovalTool/ • http://www.f-secure.com/download-purchase/tools.shtml • http://www.microsoft.com/security/malwareremove/

More Related