You are on page 1of 26

Virus- A small program written to alter the way

a computer operates, without the permission or


knowledge of the user. A virus must execute
and replicate itself. (symantec.com)

* Computer Viruses came on the seen in the


late 1980s with the phone modem.
* Bulletin Boards were the target, these
were simple games and spreadsheets
used by phone.
* The Trojan Horse was the second point of
attack, these were documents that
sounded cool so you downloaded them,
through the Internet.
* The Floppy Disk was the last to be picked
on, these viruses infiltrated your computer
through your Operating System.

* The Computer Viruses wouldnt be so


despised if all they did was replicate, but
they also attack and do damage to your
computer.
* So to prevent these damages you could run
a secure operating system like UNIX
(costly).
* Buying virus protecting software is the
most common way to defend yourself, i.e..
McAfee.
* Overall, just avoid programs from unknown
sources and never open E-mail attachments
from people you do not know.

Software (floppy disks and CDs)

E-mail

File infector viruses

Boot sector viruses

Master boot record viruses

Multi-partite viruses

Macro viruses

Script viruses

Companion viruses

Infect program files.


Can infect other files when infected program is run
from floppy, hard drive, or network.
Many are memory resident.
After memory is infected, any non-infected
executable that runs becomes infected.
Examples: Jerusalem and cascade
(Symantec.Com)

Infect the system area of a disk.


(boot record on floppy/hard disks)

Activate when user starts up from infected disk.

Always memory resident in nature.

Once in memory, all non-write protected floppy disks


will become infected when accessed.
Examples: Form, Disk Killer, Michelangelo, and Stoned
(Symantec.com)

Similar to boot sector virus except viral code is


located in different area.

Prevents computer from booting.

Examples: NYB, AntiExe, and unashamed


(Symantec.com)

Infect boot records and program files.

Difficult to repair.

Boot area and files must both be cleaned of


virus or re-infection will occur.
Examples: One_Half, Emperor, Anthrax, and
Tequila
(symantec.com)

Most common type of virus.


Infect data files word, excel, power point
and access files.
Use another programs internal programming
language which was created to allow users to
automate certain tasks within that program.
Examples:w97m.Melissa, WM.NiceDay, and
W97M.Groov

(Symantec.Com)

Infect various script languages such as DOS,


Java Script, and Visual Basic Script.
(www3.ca.com)

Execute through operating system rather than


directly infecting programs or boot sectors.
When you execute the command ABC, ABC.COM
executes before ABC.EXE Thus, a companion virus
could place its code in a COM file with its first name
matching that of an existing EXE file. When the user
next executed the ABC command, the virus
ABC.COM program would be run.
(www3.ca.com)

Worms spreads by creating duplicates of itself on


other drives, systems, or networks.

Trojan horses- programs that pretend to have a set


of useful or desirable features, but actually contains
a damaging payload. Not technically viruses, since
they do not replicate.

Virus hoaxes - email message that warns of a nonexistent virus. This can do harm by spreading fear.

Install an anti-virus program.


Remove disks from disk drive before shutting
down/restarting computer.
Be cautious of email attachments from
unknown sources.1
Do not set your email program to auto-run
attachments.
Write protect floppy disks when finished.

Why is a Firewall Necessary?

While the only way to fully protect your


computer is to turn it off, a firewall can at
least provide sufficient security when
one's computer is connected to the
Internet.
Installing a security system makes it more
difficult for individuals to gain unlawful
access to one's computer.
* It allows the user to block programs
from accessing his/her computer. In
essence, it is similar to the
homeowner preventing whom
cannot enter his/her home.

Norton Antivirus
McAfee virus scan

*Basically a firewall serves as a protective


barrier
to keep destructive forces from
your property.

* It is comparative to a physical firewall that


keeps fire from spreading from one area to
the next.
* A firewall can stop hackers, but only
if the user tells the firewall to block
this traffic.

* There are many ways in which individuals can


access or abuse unprotected computers.

Some of these ways include:


Remote login-when an individual is able to connect to
someone else's computer and control it.

Operating System Bugs- some operating system


(ex. Windows XP) have backdoors. Some have
insufficient security, along with bugs which an
experienced hacker can take advantage of.

Continued
Denial of Service- the hacker can cause a site to slow or
even crash.

Emails Bombs- someone sends the same email hundreds


of times causing your email system to no longer accept
messages.
Spam- can contain links, which if accidentally
clicked could allow a cookie to the backdoor of your
computer.

For More Information:


http://www.zonelabs.com/store/content/home.jsp
http://computer.howstuffworks.com/firewall
.htm

Hoax Categories:

Malicious Code (Virus and Trojan) Warning


Urban Myths
Give Aways
Inconsequential Warnings
Sympathy Letters and Requests to Help Someo
Traditional Chain Letters
Threat Letters
Scam Chains
Scare Chains
Jokes
True Legends
Hacked History
Unknown Origins

There are two factors that make a Hoax success


1. Technical sounding
language.
2. Credibility by
association.
An example of a Known
Hoax is:

The real
jdbgmgr
program.

The real
worm.

Recognizing a
Hoax:

A
hook

A
threat
A request

Virus Hoaxes are false reports about non-existent viruses,


often claiming to do impossible things.

Why people Send Hoax Messages


To see how far a letter will go.
To harass another person.
To bilk money out of people using a pyramid
scheme.
To kill some other chain letter.
To damage a persons or organizations
reputation.

Hoaxbuster
s http://hoaxbusters.ciac.org/HBHoaxCategories
McAfee Security
http://vil.mcafee.com/hoax.asp

Snopes
http://www.snopes.com/computer/virus/virus.htm

Virus Hoax
Busters
http://www.stockhelp.net/virus.html

You might also like