You are on page 1of 26

Virus- A small program written to alter the way

a computer operates, without the permission or


knowledge of the user. A virus must execute
and replicate itself. (symantec.com)
* Computer Viruses came on the seen in the
late 1980’s with the phone modem.
* Bulletin Boards were the target, these were
simple games and spreadsheets used by
phone.
* The Trojan Horse was the second point of
attack, these were documents that sounded
cool so you downloaded them, through the
Internet.
* The Floppy Disk was the last to be picked
on, these viruses infiltrated your computer
through your Operating System.
* The Computer Viruses wouldn’t be so
despised if all they did was replicate, but
they also attack and do damage to your
computer.
* So to prevent these damages you could run
a secure operating system like UNIX (costly).
* Buying virus protecting software is the most
common way to defend yourself, i.e..
McAfee.
* Overall, just avoid programs from unknown
sources and never open E-mail attachments
from people you do not know.
 Software (floppy disks and CDs)
 E-mail
 File infector viruses
 Boot sector viruses
 Master boot record viruses
 Multi-partite viruses
 Macro viruses
 Script viruses
 Companion viruses
 Infect program files.
 Can infect other files when infected program is run
from floppy, hard drive, or network.
 Many are memory resident.
 After memory is infected, any non-infected
executable that runs becomes infected.
 Examples: Jerusalem and cascade
(Symantec.Com)
 Infect the system area of a disk.
(boot record on floppy/hard disks)
 Activate when user starts up from infected disk.
 Always memory resident in nature.
 Once in memory, all non-write protected floppy disks
will become infected when accessed.
 Examples: Form, Disk Killer, Michelangelo, and Stoned
(Symantec.com)
 Similar to boot sector virus except viral code is
located in different area.
 Prevents computer from booting.
 Examples: NYB, AntiExe, and unashamed
(Symantec.com)
 Infect boot records and program files.
 Difficult to repair.
 Boot area and files must both be cleaned of
virus or re-infection will occur.
 Examples: One_Half, Emperor, Anthrax, and
Tequila (symantec.com)
 Most common type of virus.
 Infect data files – word, excel, power point
and access files.
 Use another program’s internal programming
language which was created to allow users to
automate certain tasks within that program.
 Examples:w97m.Melissa, WM.NiceDay, and
W97M.Groov
(Symantec.Com)
 Infect various script languages such as DOS,
Java Script, and Visual Basic Script.
(www3.ca.com)
 Execute through operating system rather than
directly infecting programs or boot sectors.
 When you execute the command ‘ABC’, ABC.COM
executes before ABC.EXE Thus, a companion virus
could place its code in a COM file with its first name
matching that of an existing EXE file. When the user
next executed the ‘ABC’ command, the virus’
ABC.COM program would be run.
(www3.ca.com)
 Worms – spreads by creating duplicates of itself on
other drives, systems, or networks.
 Trojan horses- programs that pretend to have a set
of useful or desirable features, but actually contains
a damaging payload. Not technically viruses, since
they do not replicate.
 Virus hoaxes - email message that warns of a non-
existent virus. This can do harm by spreading fear.
 Install an anti-virus program.
 Remove disks from disk drive before shutting
down/restarting computer.
 Be cautious of email attachments from
unknown sources.1
 Do not set your email program to auto-run
attachments.
 Write protect floppy disks when finished.
Why is a Firewall Necessary?
● While the only way to fully protect your
computer is to turn it off, a firewall can at least
provide sufficient security when one's computer
is connected to the Internet.
● Installing a security system makes it more difficult
for individuals to gain unlawful access to one's
computer.
* It allows the user to block programs
from accessing his/her computer. In
essence, it is similar to the homeowner
preventing whom cannot enter his/her
home.
 Norton Antivirus
 McAfee virus scan
*Basically a firewall serves as a protective barrier
to keep destructive forces from your property.

* It is comparative to a physical firewall that keeps


fire from spreading from one area to the next.

* A firewall can stop hackers, but only if the


user tells the firewall to block this traffic.
* There are many ways in which individuals can
access or abuse unprotected computers.

● Some of these ways include:


● Remote login-when an individual is able to connect to someone else's
computer and control it.

● Operating System Bugs- some operating system (ex.


Windows XP) have backdoors. Some have insufficient
security, along with bugs which an experienced hacker can
take advantage of.
Continued

● Denial of Service- the hacker can cause a site to slow or even crash.

● Emails Bombs- someone sends the same email hundreds of times


causing your email system to no longer accept messages.

● Spam- can contain links, which if accidentally clicked could


allow a cookie to the backdoor of your computer.

For More Information:


http://www.zonelabs.com/store/content/home.jsp

http://computer.howstuffworks.com/firewall.htm
Hoax Categories:
• Malicious Code (Virus and Trojan) Warning
• Urban Myths
• Give Aways
• Inconsequential Warnings
• Sympathy Letters and Requests to Help Someone
• Traditional Chain Letters
• Threat Letters
• Scam Chains
• Scare Chains
• Jokes
• True Legends
• Hacked History
• Unknown Origins
There are two factors that make a Hoax successful:

1. Technical sounding
language.

2. Credibility by association.

An example of a Known Hoax


is:

The real The real


jdbgmgr worm.
program.
Recognizing a Hoax:
•A hook

•A threat

•A request

Virus Hoaxes are false reports about non-existent viruses,


often claiming to do impossible things.
Why people Send Hoax Messages

To see how far a letter will go.

To harass another person.

To bilk money out of people using a pyramid scheme.

To kill some other chain letter.

To damage a person’s or organizations reputation.


Hoaxbusters
http://hoaxbusters.ciac.org/HBHoaxCategories.html
McAfee Security
http://vil.mcafee.com/hoax.asp

Snopes
http://www.snopes.com/computer/virus/virus.htm

Virus Hoax Busters


http://www.stockhelp.net/virus.html

You might also like