0% found this document useful (0 votes)
227 views14 pages

Understanding Computer Worms

This slide presentation introduces computer worms, including their definition, characteristics, and working mechanisms. It discusses how worms spread through vulnerabilities in operating systems and applications, as well as through email attachments and file sharing. The presentation recommends security best practices like keeping systems patched, using antivirus software, and avoiding suspicious email attachments to prevent worm infections. Notable examples of past worms like Code Red, Blaster, and Sasser are also mentioned.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
227 views14 pages

Understanding Computer Worms

This slide presentation introduces computer worms, including their definition, characteristics, and working mechanisms. It discusses how worms spread through vulnerabilities in operating systems and applications, as well as through email attachments and file sharing. The presentation recommends security best practices like keeping systems patched, using antivirus software, and avoiding suspicious email attachments to prevent worm infections. Notable examples of past worms like Code Red, Blaster, and Sasser are also mentioned.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

COMPUTER WORMS

SLIDE PRESENTATION
-BY
SHARON VARGHESE.
INTRODUCTION

• What is a WORM ?
• What is a VIRUS ?
• What is a TROJAN HORSE ?
COMPUTER WORM

• DEFINTION.
• MOTIVATION AND ATTACKERS.
• EXPLOIT.
• CONCERN.
• CODING.
• BEGINNING.
CHARACTERISTIC OF WORMS

• _Vulnerabilities exploited on victims.


• _ Speed of spread.
• _ Strategies of spread.
• _ Payload of the worm.
• _ Intended goals.
WORM MODEL

• Probe.
• Transporter.
• Worm Engine.
• Payload.
WORKING MECHANISM
HOW WORMS GET HERE

• Shared media; diskettes, drives.


• Windows file sharing.
• E-mail attachments.
• Flaws and exploits in operating
system.
• Web Exploits.
HOW DO WE GET IT.

• Weak or non-existent password on desktop


computer .
• Un-patched or non-updated operating
system, Web browser, e-mail program.
• No or out of date anti-virus software
• No or out of date personal firewall software
• Opening unsolicited e-mail attachments,
even those from trusted sources.
SIGN OF INFECTION

• Sluggish network
performance
• Buggy operating
system function
• Unusual system
error messages
• Mysterious/unknown/
hidden files
AVOIDING WORMS ATTACK

• Most of the worms propagate using


Microsoft Outlook or Outlook Express.
• Avoid e-mail attachments.
• Configure Windows to always show file
extensions.
• Never open e-mail attachments with the
file extensions VBS, SHS or PIF.
• Never open attachments with double file
extensions such as [Link] or
[Link]
PREVENTION

• Applying patches or workarounds for the


vulnerability.
• Deploying anti-virus software on all
gateways and desktops.
• Using a best practice security
configuration for all Internet facing
computers.
• Using filtering and proxy services inbound
and outbound for all network services.
SOME FAMOUS WORMS.

• CODE RED.
• BLASTER.
• SASER.
• MELISA.
• LOVEBUG.
• BUGBEAR.
• NIMADA.
DIFFERENCE B/W VIRUS AND
WORM.
• Virus requires host program.
Worm doesn't need one.
• A virus copies itself around the system.
A worm copies of itself across network .
• Speed of spreading worm is faster than
virus.
• Virus are usually more lethal than
worms.
CONCLUTION

• SECUTRITY CONCERN.
• PREVENTING MEASURES.
• FUTURE.
• LEGAL ACTION.
• AWARENESS.

You might also like