Professional Documents
Culture Documents
genica.qahira.tonet.celine 3
History
Late 1960s – early 1970s
“The Creeper” was created under the Tenex OS and used global
computer networks to spread itself. It was capable of entering a
network by a modem and then transfer a copy of itself to remote
system.
genica.qahira.tonet.celine 4
History
““The Reeper” – first anti-virus program
genica.qahira.tonet.celine 5
History
1987 Ralph Burger published his book “Computer
Viruses: a High-tech Disease” which explained how
viruses are made, thus prompting creation of
thousands of viruses
genica.qahira.tonet.celine 6
Malicious code/Malware
Virus – a small piece of software that piggybacks on
real programs.
genica.qahira.tonet.celine 7
genica.qahira.tonet.celine 8
Adware – puts ads up on your screen
genica.qahira.tonet.celine 9
Top 10 Worst Computer Viruses
Top 10. Melissa Gotcha!
____________________________
Spring, 1999
As if viruses, worms and Trojan
Creator , David L. Smith horses weren't enough, we also
have to worry about virus
Based on Microsoft Word Macro hoaxes. These are fake viruses --
they don't actually cause any
First to spread over e-mail harm or replicate themselves.
Instead, the creators of these
viruses hope that people and
media companies treat the hoax
as if it were the real deal. Even
though these hoaxes aren't
immediately dangerous, they are
still a problem. Like the boy who
cried wolf, hoax viruses can
cause people to ignore warnings
about real threats.
genica.qahira.tonet.celine 10
Top 10 Worst Computer Viruses
Top 9. ILOVEYOU
Year 2000, Worm
genica.qahira.tonet.celine 11
THE DANGER OF ILOVEYOU VIRUS
It copied itself several It sent itself through
times and hid the copies in Internet Relay Chat clients
several folders on the as well as e-mail.
victim's hard drive.
It downloaded a file called
It added new files to the WIN-BUGSFIX.EXE from
victim's registry keys. the Internet and executed
it. Rather than fix bugs,
It replaced several different
this program was a
kinds of files with copies of password-stealing
itself. application that e-mailed
secret information to the
hacker’s e-mail address.
genica.qahira.tonet.celine 12
Top 10 Worst Computer Viruses
Top 8. The Klez Virus
Late 2001
The basic Klez worm infected a victim’s computer
through an e-mail message, it replicate itself and sent
itself to people in the victim’s address book.
Klez virus could act like a normal computer virus, a
worm or a Trojan horse, depending on its version.
It could even disable virus scanning software and pose as
a virus removal tool
Spoofing e-mail address
genica.qahira.tonet.celine 13
Top 10 Worst Computer Viruses
Top 7. Code Red and Code Red II
Summer, 2001
Exploit an operating system vulnerability that was found
in machines running Windows 2000 and Windows NT.
Original Code Red worm initiated a distributed denial of
service (DDoS) attack on the White House.
A Windows 2000 machine infected by Code Red II worm
no longer obeys the owner, the worm creates a backdoor
into the computer’s OS, allowing a remote user to access
and control the machine.
genica.qahira.tonet.celine 14
Top 10 Worst Computer Viruses
Top 6. Nimda
2001, Internet
genica.qahira.tonet.celine 17
Top 10 Worst Computer Viruses
Top 3. Sasser and Netsky
Sven Jaschan , 17 years old, German
Sasser Worm attacked computers through a Microsoft
Windows vulnerability
It don’t spread through e-mail. Instead, once the virus
infected a computer, it looked for other vulnerable systems. It
contacted those systems and instructed them to download
the virus.
It scan random IP address to find potential victims
Alters the OS in a way that made it difficult to shut down the
computer without cutting off power to the system
genica.qahira.tonet.celine 18
Top 10 Worst Computer Viruses
Top 3. Sasser and Netsky
Netsky virus moves through e-mail and Windows
network
It spoofs e-mail addresses and propagates through a
22,016-byte file attachment
It can cause denial of service (DoS) attack
Sven Jaschan, spent no time in jail; he received a
sentence of 1 year and 9 months probation because he
was under 19 he escaped being tried as adult in German
courts.
genica.qahira.tonet.celine 19
Top 10 Worst Computer Viruses
Top 2. Leap-A/Oompa-A
2006
genica.qahira.tonet.celine 20
Top 10 Worst Computer Viruses
Top 1. Storm Worm
Late 2006, called storm worm because one of the e-mail
carrying the virus had as its subject “230 Dead as Storm
batters Europe”.
Trojan horse program
Some version of the Storm Worm turn computers into
zombies or bots
Many versions of the Storm Worm fool the victim into
downloading the application through fake links to news
stories or videos.
genica.qahira.tonet.celine 21
How does virus spread?
Many computer virus programs
attach themselves to other
programs, and get into the
operating system when you use the
program.
genica.qahira.tonet.celine 22
Things that expose you to virus:
Using infected diskettes, cd’s or flash drives
genica.qahira.tonet.celine 23
Things that expose you to virus:
Downloading a program from a local hobbyist or major BBS (a
computer that is running software that allows users to leave
messages and access information of general interest)
genica.qahira.tonet.celine 24
Reasons for creating virus
The thrill they get in creating
destructive viruses.
The psychology of having to
do things because they can
Bragging rights
genica.qahira.tonet.celine 25
Things viruses can do
Fill up your computer with garbage ware
Mess up files
Reset a computer
genica.qahira.tonet.celine 26
Things viruses can do
Slow things down
genica.qahira.tonet.celine 28
Counter-Measures
Antivirus software – used to prevent, detect, and
remove malware, including viruses, worms, and Trojan
horse
genica.qahira.tonet.celine 29
Counter-Measures
Heuristic-based detection – like malicious activity
detection, it can be used to identify unknown viruses
genica.qahira.tonet.celine 30
Popular Antivirus Software
AVG
Avast
Avira Antivir
Norton
Kaspersky
ESET Nod32
genica.qahira.tonet.celine 31
Reference:
“A look at Major Computer viruses since 1982.” The Philippine Star 10 September 2007: C-5.
Fites, Philip. The Computer Virus Crisis. New York: Van Nostrand Reinhold, 1992.
Slade, Robert. Guide to Computer Viruses. Canada: Impressions Book and Journal Services
Inc., 1996.
http://en.wikipedia.org/wiki/Computer _virus
http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-
viruses.shtml
genica.qahira.tonet.celine 32
QUIZ
1. What does DDoS stand for?
A. Dangerous DOS open Security
B. Digital Default of Servers
C. Distributed Denial of Service
2. What’s another name for crackers – malicious hackers
who steal information or cause damage in secure
systems?
A. Black hats
B. Pirates
C. Digital rogues
genica.qahira.tonet.celine 33
QUIZ
3. What kind of malware is basically a computer program
that does something than it claims to do?
A. Worm
B. Trojan horse
C. Virus
4. What kind of malware does not require a host to
spread?
A. Worm
B. Trojan horse
C. Virus
genica.qahira.tonet.celine 34
QUIZ
5. What does BBS stand for?
A. Broadband system
B. Bandwidth Block system
C. Bulletin board system
6. What kind of malware typically resides in a larger,
innocent computer program?
A. Worm
B. Trojan horse
C. Virus
genica.qahira.tonet.celine 35
QUIZ
7. What is another term for a zombie computer army?
A. Backdoor army
B. Bots
C. Phishing pharm
8. What is the name of the virus created by Onel de
Guzman?
A. ILOVEYOU
B. Melissa
C. Sasser
genica.qahira.tonet.celine 36
QUIZ
9. What is the first anti-virus program?
A. The Creeper
B. The Reeper
C. The Cleaner
10. What is the name of the virus that attacks Mac
computers through iChat?
A. Nimda
B. Sapphire
C. Leap-A
genica.qahira.tonet.celine 37
QUIZ
11-15.
Give any 5 of popular anti-virus software discussed.
genica.qahira.tonet.celine 38