Computer Viruses. Contents are

Similar documents
Virus Protection for Small to Medium Networks

Willem Wiechers 3 rd March 2015

PKOMP 89/5. Analysis of the Bouncing Ball Virus M S Olivier H W Teitge

What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk.

Viruses, Worms, and Trojan Horses

(Self-Study) Identify How to Protect Your Network Against Viruses

How To Understand What A Virus Is And How To Protect Yourself From A Virus

P e r s o n a l E d i t i o n For Windows 95, 98, NT

UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Chapter 14 Computer Threats

ANTIVIRUS BEST PRACTICES

Agilent Technologies Electronic Measurements Group Computer Virus Control Program

McAfee Enterprise Edition v Installation & Configuration For Windows 98 and Me

Optimizing and Protecting Hard Drives Chapter # 9

Countermeasures against Computer Viruses

E-BUSINESS THREATS AND SOLUTIONS

Norton AntiVirus 9.0 for Macintosh

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Edge-based Virus Scanning

Virus Definition and Adware

Software Testing Methodology: Anti-spyware and AntiVirus

Network Incident Report

WHITE PAPER ON. Antivirus. Prepared by Mohammed Samiuddin. Institute of Technology Management & Research. Do not copy or distribute

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Protecting Anti-virus Programs From Viral Attacks

License for Use Information

Computer Viruses: How to Avoid Infection

Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks

CS549: Cryptography and Network Security

Symantec AntiVirus Corporate Edition Client Guide

Using Windows Update for Windows XP

Understanding Virus Behavior in 32-bit Operating Environments

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Computer Viruses. What is a virus? Participating With Safety Briefing no. 5


Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

Reduce Your Virus Exposure with Active Virus Protection

Abstract. A Definition From An Expert

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

CHAPTER 10: COMPUTER SECURITY AND RISKS

What's the difference between spyware and a virus? What is Scareware?

Computer Security Maintenance Information and Self-Check Activities

Surviving VIRUSES & WORMS in Today s Computing Environment

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Boston University Security Awareness. What you need to know to keep information safe and secure

You can protect your computer against attacks from the Internet with Windows Vista integrated Firewall.

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Real World and Vulnerability Protection, Performance and Remediation Report

Information Security Policy

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Intruders and viruses. 8: Network Security 8-1

Protecting the Infrastructure: Symantec Web Gateway

1949 Self-reproducing cellular automata Core Wars

Electronic Security is defined d as:

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

ANTIVIRUS AND SECURITY SOFTWARE

ESET NOD32 ANTIVIRUS 9

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ESET NOD32 ANTIVIRUS 8

How to remove Encrypted File guide. How to manually remove Encrypted File

VBSim. Symantec Computer Virus/Worm Simulation System. Version 1.2. Copyright 1999, Symantec Corporation

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

Anatomy of Computer Viruses

Verizon Security Scan Powered by McAfee. Installation Guide for Home Users

ESET SMART SECURITY 6

What you can do prevent virus infections on your computer

Using Windows Update for Windows Me

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Anti-Virus Scan Tool

Airtel PC Secure Trouble Shooting Guide

Anti Virus Software: Norton, McAfee, Trend Micro, or Hauri?

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

1 Introduction. Agenda Item: Work Item:

How not to lose your computer or your research. M.R. Muralidharan SERC IISc

VIRUS PROTECTION POLICY

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Malware Detection and Removal Techniques

ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

TrustPort, a.s. TrustPort Antivirus 2014 WindowsPE Plugin. User Manual. TrustPort, a.s.

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ESET SMART SECURITY 9

Using Windows Update for Windows 95/98

Statistical Analysis of Internet Security Threats. Daniel G. James

User's Guide. RecoveryExpert. Compute with confidence

Worms, Trojan Horses and Root Kits

How to easily clean an infected computer (Malware Removal Guide)

Quick Heal Exchange Protection 4.0

Identifying & Managing IT Risks to Your Business

EMERGENCY DISK RESTORE OPTION (AO REV EA) OPTION EDR

Introduction to Computer Security Table of Contents

Anti-Virus Comparative

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

What Do You Mean My Cloud Data Isn t Secure?

RecoverIt Frequently Asked Questions

Transcription:

FANCIFU L 7

Computer Viruses Contents are Introduction Types of Viruses How viruses contaminate & spread How does one determine that a computer or disk is infected? How can a virus be removed?

What is Virus? A virus is a "parasitic" program written intentionally to enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or "boot sectors" and replicates itself, thus continuing to spread (without your knowledge). Though some viruses do little but replicate, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless and left on a system.

Types of Viruses Viruses are classified by their behavior in infecting computer systems: Program Viruses infect executable program files, such as those ending in.com,.exe,.ovl,.drv,.sys, or.bin. These are the files that typically start programs for you. For example, Netscape.exe starts Netscape. Boot Sector Viruses infect our Master Boot Record, FAT and Partition Table. In plain English, this means that these Viruses attack the "table of contents" on your hard drive. With a destroyed or damaged table of contents, files can be unrecoverable without professional assistance..

Types of Viruses (contd ) Multipartite Viruses infect both programs and boot sectors. Double trouble. Worms are virus-like programs that are primarily designed to replicate themselves, but often without infecting other files on the computer. Recent examples of viruses with worm-like behavior are the Melissa virus and the ILOVEYOU virus, which both made use of email programs to send themselves out to everybody in a user's address book. Macro Viruses are transmitted in Microsoft applications that support Macros, such as Word and Excel. Macros are normally harmless little applications that a user can run in a document (say, an application that automatically calculates some values in a spreadsheet). Recently, malicious hackers have turned to using this Macro functionality to attack our computers.

How Viruses Contaminate and Spread A virus is typically inactive until an infected program is run or the boot record is read. As the virus is activated it loads into the computer's memory where it can perform a triggered event and/or spread itself. Disks used in an infected system can then carry the virus to another machine. Programs downloaded from bulletin boards and web sites can also spread viruses. Data files can even spread viruses, thanks to the invention of the Macro Virus..

How Viruses Contaminate and Spread (contd ) Boot Infecting Viruses should be of a special concern to users who share computers or floppy disks or any other storage device.. Every disk contains a boot sector whether it is a bootable disk or not. When the computer is powering up looking for the Boot information and reads an infected disk in the drive, the virus is transferred to the computer s hard drive. Once the boot code on the drive is infected, the virus will be loaded into memory every time the computer starts up. From memory the boot virus can travel to every disk that is read,, and the infection will spread. Most boot viruses could be on a system for a long time without causing problems. There are some nasty ones, however, that will destroy the boot information or erase the hard drive. Advice: do not use your floppy disk or any other storage device in a computer that does not have virus protection. You are risking your data.

How does one determine that a computer or disk is infected? To determine whether or not a floppy disk or computer drive is infected by a virus, it is necessary to run a virus scanning utility, a program that can detect and often remove viral code. These scanning utilities constitute the core of all anti-virus software, and every computer should be loaded with some sort of anti-virus software. Some of these programs can be made to run permanently from the computer s memory, which allows for continuous virus scanning. This solution allows for more dynamic detection and removal of viruses, especially those which enter the system through the use of floppy disks. IT Services recommends that you run anti-virus software on your machine at all times, and that you keep its virus information up to date.

How can a virus be removed? To remove a virus you will need to obtain an anti-virus software package; there are numerous programs available on the market, ranging in price from $30-60 (more depending on the number of updates included with the package). Such as McAfee, Norton,Avast, Quick Hill, Kasper sky etc. Most viruses are rather innocuous and can easily be detected and removed from your computer without any subsequent damage to your system. Nonetheless, it is imperative that you scan your system frequently to minimize the chance of data loss and security compromises.. Anti-virus software is covered by copyright law and is not considered shareware, hence HDS Information Technology Services will be unable to provide you with copies of such programs. You will have to obtain your own copy through a software vendor.