Professional Documents
Culture Documents
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
* HOW NOTICE ?
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
* WHAT TO DO ?
NO !
VIRUS
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
* LAST WORD
SEQUENCE OF PRESENTATION
COMPUTER VIRUS
* CONCLUSION
A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF ITSELF.
* BE A SET OF COMPUTER INSTRUCTIONS * BE DELIBERATELY CREATED * DO UNDESIRABLE THINGS (DAMAGES) * PROPAGATE USING HOST PROGRAMS
COMPUTER COMPONENTS
COMPUTER VIRUS
SOFTWARE
ROGUE SOFTWARE
* BUG-WARE - NOT MEANT FOR DESTRUCTION * THE TROJAN HORSE - APPEARS TO BE USEFUL * WORMS - TRAVEL IN NETWORK * REPLICATORS - COPY ITSELF TO EXHAUST DISK * CHAMELEONS - M ISCHIEF
ROGUE SOFTWARE * TIME BOMBS - EXPLODE ON TIME / DATE * LOGIC BOMBS - EXPLODE ON LOGIC * SOFTWARE BOMBS - EXPLODE ON LAUNCH
* PROFIT EARNERS
* BOOT / PARTITION INFECTING VIRUS * EXECUTABLE FILE INFECTING VIRUS * MULTI-PART VIRUS * DIRECTORY INFECTING VIRUS
RESIDENT NON RESIDENT
COMPUTER VIRUS
FORMAT DISK COPY, RENAME AND DELETE FILES COPY THEMSELVES WITH NEW CONFIGURATION INFORMATION MODIFY FILE DATES AND EXTENSIONS CALL OTHER COMPUTERS TO UPLOAD AND DOWN LOAD FILES
HOW DO THEY DO ?
COMPUTER VIRUS
COMPUTER OPERATION BECOMES SLUGGISH PROGRAMS TAKE LONGER TO LOAD PROGRAMS ACCESS MULTIPLE DISK DRIVES UNUSUAL AND FREQUENT ACCESS TO DISK DISK SPACE DECREASES RAPIDLY BAD DISK SECTORS STEADILY INCREASE RAM DECREASES SUDDENLY OR STEADILY COMPUTER HALTS WITH OR WITHOUT FUNNY MESSAGES
PROGRAMS ENCOUNTER ERRORS PROGRAMS GENERATE UNDOCUMENTED ERRORS FILES REPLACED WITH GARBAGE FILES MYSTERIOUSLY DISAPPEAR FILE ATTRIBUTES AND DATA CHANGE DATA FILES OR DIRECTORIES OF UNKNOWN ORIGIN APPEAR
WHAT TO DO ?
WHAT TO DO ?
COMPUTER ANTI VIRUS
SAFE COMPUTING METHODS ANTIVIRUS SOFTWARE SYSTEMS PREVENTION SYSTEM DETECTION SYSTEM SURGICAL APPROACH
WHAT TO DO ?
COMPUTER ANTI VIRUS
* YOU MUST - BOOT FROM FLOPPY DISK - DISCOURAGE PIRATED SOFTWARE - TAKE BACKUP
WHAT TO DO ?
COMPUTER ANTI VIRUS
YOU MAY
USE PRE RUN CHECKUPS CHANGE FILE ATTRIBUTES REINITIALIZE SYSTEM REINSTALL APPLICATIONS REFORMAT HARD DISK OBSERVE OPERATION TIMINGS LOG DISK SPACE LOG BAD SECTORS
WHAT TO DO ?
COMPUTER ANTIVIRUS SOFTWARE SYSTEMS ANTI VIRUS
PREVENTION SYSTEMS
TO STOP VIRUS ATTACKS IN REAL TIME BLOCK ILLEGAL DISK ACCESS AND PROGRAM LOADING PASSWORD PROTECTION - SLOW SPEED - UNNECESSARY INTERRUPTS - CAN BE INFECTED BY VIRUS - HEAVY ON RAM
WHAT TO DO ?
COMPUTER ANTI VIRUS
DETECTION SYSTEMS
LOAD, RUN AND EXIT
CHECK PROGRAM BEFORE EXECUTION COMPLEMENT PREVENTION SYSTEM PROGRAM SPECIFIC AND GENERIC
WHAT TO DO ?
COMPUTER ANTI VIRUS
VACCINES ANTIDOTES FILE COMPARISON UTILITIES VIRUS SCANNERS DISK MAPPERS MEMORY RESIDENT ANTIVIRUS PROGRAMS
WHAT TO DO ?
THE IDEAL ANTIVIRUS SAFETY NET CONSISTS OF AN INTELLIGENT, WELL TESTED AND WELL BALANCED COMBINATION OF SAFE COMPUTING METHODS PLUS VIRUS PREVENTION AND VIRUS DETECTION SYSTEMS
SURGICAL APPROACH Empty the House - TAKE OUT ALL HOUSE HOLD ITEMS DISINFECT THE EMPTY HOUSE
CLEAN AND DISINFECT EACH HOUSE HOLD ITEM AND BRING IT BACK ONE BY ONE START NORMAL LIFE
ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED OFF, CAST IN A BLOCK OF CONCRETE, AND SEALED IN A LEAD-LINED ROOM WITH ARMED GUARDS AND EVEN THEN I HAVE MY DOUBTS. E. H. SPAFFORD
ASSOCIATE PROFESSOR PURDUE UNIVERSITY DEPTT OF COMPUTER SCIENCES
CONCLUSION
LEARN TO LIVE WITH IT
SAFE COMPUTING TECHNIQUES MANAGE SOFTWARE PIRACY EDUCATE USERS KEEP ABREAST OF THE LATEST VIRUS AND ANTIVIRUS REVIEW SITUATION