Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Computer Malware Type And History

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.

Computer Malware Type And History

Avatar for afeefkhateeb

afeefkhateeb

January 20, 2018
Tweet

Other Decks in Technology

Transcript

  1. Outline • The malware. • The effect of the malware.

    • Timeline of malwares . • Main characteristics of malwares. • Types of malwares. • Virus classification based on target . • Detecting the virus • The antivirus • who write the viruses • Stuxnet • Recommendation
  2. Abstract • The internet has become a powerful tool for

    enhancing innovation and productivity .nevertheless , the increasing dependency on the internet and other communication network means that the internet has become a popular and efficient way to spread the computer viruses and other types of malicious software or Malware .
  3. The Malware What is a malware ? It is a

    program that can spread across computers and network by making copies of itself usually without the knowledge of the user
  4. The effect of the malwares 1)Slow down email 2)Steal confidential

    data. 3)Use your computer to attack websites 4)Let other users hijack your computer. 5)And more ………
  5. Timeline of viruses • 1950-2010 The first virus- at bell

    lab The most powerful virus in the 20th century - Michelangelo virus The most powerful virus in the 21th century –Stuxnet
  6. The Main Characteristics Of the Malware 1) self-replication 2) the

    population of growth. 3) Parasitic malware
  7. Types of viruses • Logic –bomb • Trojan horse •

    Back door • Spyware • Adware • Virus
  8. Back door Back door : self replicate : no. population

    growth : zero. parasitic : possibly. Example “”username = read_username() password = read_password() if tisername i s "133t h4ck0r": return ALLOW^LOGIN if username and password are valid: return ALLOW_LOGIN e l s e: return DENY^LOGIN””
  9. Spyware • Spyware : self replicate :No population growth :

    Zero parasitic : No Attacks 1)Email addresses 2)Username/password 3)Bank account 4)Software licence
  10. Adware • Adware : self replicate : No population of

    growth: Zero parasitic : No This is similar to spyware but it is concentrated ti advertisement
  11. Viruses Viruses or (Virii) : self replicate : yes population

    of growth : positive parasitic : yes Definitions of viruses 1)Germ 2)Intended 3)Dormant
  12. Command prompt • The first way is to use the

    command prompt • Very easy • …/cd/windows/system32/setup
  13. The antivirus • The second way we use is the

    antivirus What is the antivirus Definition : Antivirus is a software that can delete viruses ,prevent access to infected files and often eliminate the infection.
  14. Three steps the antivirus use 1)Detection: detecting whether or not

    some code is a virus or not which is in purest form of detection results in a Boolean value yes there is a virus- so it is infected no there is no virus. 2)Identification : once a virus is detected the identification process may be distinct from detection or identification may occur as a side effect of detection . 3)Disinfection : is the process of removing detected viruses this is something called cleaning .
  15. Who write viruses • If your computer, or your network,

    is hit by a virus, the first thing you’re likely to say – expletives apart – is “Why do people write these viruses?”
  16. Stuxnet • Now we will see the video which talks

    about stuxnet 1)zero days 2)Iran enrichment facility 3)”Israel” and USA 4) The purpose of Stuxnet
  17. Recommendation and conclusion I have found that there is no

    possibility that someone could prevent himself from malware %100 because every malware has its own characteristics and works different than any other malware so the user must take care and pay attention when using the internet or using any other peripherals like USB –Flash and also the user must make sure that an Email is from a known place and also the websites are famous, chose a good antivirus and make sure of its updates .
  18. Make a small virus using the notepad • Now we

    will make a small virus using the notepad …….
  19. References • 1) John Aycock, Springer, computer viruses and malware

    2006, definition and timeline pp. 11-33 andpp.53-70. • 2) Cio website for the malware timeline • http://www.cio.com/article/116250/A_Brief_History_o f_Malware_and_Cybercrime _(accessed july15, 2012) • 3) Eric Filio, Springer, computer viruses from theory to application2005, viruses or worms life cycle, pp.87-90. • 4) Paul Oldfield, Sophos, viruses and spam what you need to know, 2004, pp.27-52.