IT_UNIT 3 (VIRUS)
IT_UNIT 3 (VIRUS)
SOCial
networking has evolved
through internet and has added different co
Tiavors according to the needs
of time. There are plenty of features being offered oy ocial
networking sites (SNS) which include making our profile, finding people with mutual
Sanngwin our Circles or
interesi
groups, interacting with people in our groups and geting uthe
information shared by other
people.
Ethical Dilemmas
invasion of privacy.
In this situation, the users relative information which s/he may be needing, gets
under the pile and may get ignored because of that useless pile of spamming
Public Bashing: While using social networks people think that they are private and
they can express anything they want to but they are not as private as they think. Once
we have posted something, it is not ours anymore and it can go viral as fast as a fire in
the forest without asking for our permission which then can't only affect our
reputation but also the person or company. This kind of cases can also raise a risk for
legal lawsuits
Dishonesty and Distortion: There is no fair enough method to validate the honesty
So, we should all keep ethics in front of use even while using social media.
Improper Anonymity and Distorted Endorsements: If one represent himself/ herself with
Security Threats
Information/ data security has become a continuing concern in all of
areas an Information
system. Security is neither a product nor software; it is a discipline that needs to be taken into
consideration in any organizational decision. It is indeed true that there is no existence such
22
Business (Theory)
Application
in
Technology
& Its
Information
security
that by increasing the
also correct
secure system. But it is
'completely
thing as a which, in turn,
a much more difficult target for intruders,
and system
measures that protects data
are in place.
of becoming a victim
when the right security technologies
reduces the chances
and intention to do
armed with technical capability, opportunity
But it is also true that, anyone
in the following
threat of computer data. So, e-security of data may be categorized
harm, is a
ways
editing of existing data.
or unauthorized access
of users and modification/
Authorized
Intentional harm
Insider attacks
Outsider attacks
Unintentional harm
To counter against security threats of data, the following measures can be taken:
Confidentiality: This means secret data must remain confidential. This means that if
somebody wants some data to be available to certain
people, then the operating system
must make that data available to those
particular people, with no one else allowed to see
that data. It prevents unauthorized disclosure of secured information.
Integrity: This means restricting unauthorized modification of secured information.
Unauthorized users must not be allowed to
modify the data without the
owner's
permission. Data modification includes not
only changing or
deleting data, but also
removing data or adding false data to change its behaviour.
23
Information Technolbyy
unusable. It assures
to make it
disturb
distu
the system
can
can
nobody
n obody
authorized users. This
is not denied to
m e a n s
This
service
v
A v a
a i l a b i l i t y :
and that
promptly,
denial of service to
works
system
causing a
the information,
that
u s e r s by
nolding
withhold
unauthorized
estrict
is to
authorized users.
parameters.
any other security
Insider attacks
Login Spoofing: It is a technique of collecting other users' passwords. A false login
interface that seems identical to the real thing is mounted on an actual login screen.
access. For example, a developer could add code to a login program to allow anyone
using a particular login name (like "student'), no matter the password. If this code is
inserted into a working program, the login succeeds by entering the login name as
Logic Bombs: These are code embedded in a program that is set to explode when
certain conditions are met. The conditions used to trigger the bomb can be the presence
Once triggered, a bomb may alter or delete data or sometimes entire files, causing a
machine halt or dealing some other damage. For example, if a developer is fired, the
logic bomb will trigger upon not receiving his daily password to a certain portion of code,
or when any.other set of conditions are
satisfied.
24
O u t s i d e ra t t a c k s
Ransomware)
Worm, Spyware,
codes- Virus,
Trojan Horse,
(Malicious
has
Virus (Computer Virus) host and
spread from host to
loaded and
designed to get viruses
program
virus is a small Computer
Computer user's knowledge.
without the
computer
itself in the
replicate
the ability to
without programming.
spread alter
reproduce
and written to
cannot
malicious code or program
virus is a type of
technical terms, a computer to another.
It is
In more
from o n e computer
spread
that is designed to
operates and or
the way a computer the system
memory
and finally halt
utilize all available
that is quickly
a such a piece of code has successfuly
attached
Once a virus
delete the files
from the computer.
it may corrupt/ cause the
even circumstances
dormant until
the virus will lie
document,
to a program, file, or
on any
virus can remain dormant
that a
code. This means
device to execute its
computer or
can."
viruses include the "Brain" virus, which initially appeared
in
of early computer
Notable examples
MS-DOS personal computer virus. Brain was a
oot
to be the first
10R and is considered
25
Technology
& NS
Information
a new
i n s t a l l e d on
once
sectors and,
disk boot
floppy inserted
infected
new disks
through infect any
spread subsequently
virus. It and
sector
system's mem
emory
the
tself to
install
would
PC, it
discovered in 1987 and
was
into that PC. Virus,
a s the "riday
the 13
also known
virus, would infect a
The
"Jerusalem"
attachments. The DOS virus
email
disks and
Israel via floppy
spread
throughout
calendar reached Friday the 13th
when the system's
and programs
delete all files If the
system and email attachment.
as an
was distributed
first appeared in 1999,
The Melissa virus, which
the first 50 people in
an
the program.
disabled or lowered security protections in
affected Nokia Symbian
verified example of a Mobile phone virus and
"Cabir" virus is the first
because it proves that a virus
Cabir is considered a 'proof-of-concept' virus,
operating system.
doubted.
phones, something that was
once
can be written for mobile
Internet file downloads or socially shareable content such as greetings cards, audio/
video files,
Types of Virus:
26
Information Technology & ts Application in Business (Theory)
hidden inside is
transferred to the user's computing device.
that Is
eorogram, the malware
isolate and
s o u r c e s or download files from
click on links from un-trusted
virus software up-to-date and never
unknown senders.
infected computer.
Allowing remote computer to
access
Trojan-Mail-finders:It harvest email addresses from our computer which are then sold
Trojan-downloader:lt does just what it says - is downloads and installs new versions of
Rootkit Trojan: It conceals objects and activities on the infected computer. They are
primarily used to avoid being detected by security software, buying time to take further
advantage of the hack.
29
I n f o r m a u O n
tally
incremental install
more
downloader
that
isticated
more
sophist software less
a security
is make
detection by
to
T r o j a n - d r o p p e r : t
as
in such a way
viruses
and
new
Trojans
known
of a
likely. takes advantage
contains code that
program
that
It is a
Exploit Trojan: the infected computer.
on
software running
within a piece of
vulnerability
information from online gamers.
user
Thief:lt steals
Trojan-Game
longer use it
to where we can no
modifies our computer to the point
Trojan-Ransom:lt
restore the
paying a cash ransom it may (or may not)
or access certain data. In return for
Trojan-Fake AV:t is a program that simulates the activity of antivirus software. They are
designed to extort money from the target in return for detection and removal of threats -
Backdoor Trojan: it gives the hacker remote control over the infected computer.
Trojan-SMS:It is relatively simple and can be very expensive. It invades our cell phone
Over the years, Trojan horses have been discovered by anti-malware vendors, security
researchers and private individuals. Some of the most famous
discoveries include:
Zeus: A financial services crime-ware
toolkit that allows a hacker to build his own
Trojan horse. First detected in 2007, the
Trojans built with Zeus still remain the most
dangerous banking Trojans in the world, using form
grabbing, key-logging and
polymorphic variants of the Trojan that use
drive-by downioads to capture victim
credentials..
in Business (Theory
criminal surveillance.
the century to assist with
software program
(popularly
wom is a malicious, self-replicating
A computer worms are
hardware programs.Most
affects the functions
of software and
malware) which lInternet
some spread by tricking
software, although
known security holes in
designed to exploit
users. arrive in
or instant message
(IM). They
email
worms, for instance, spread via
Mass-mailing
our machine.
download them the worm silently infects in
attachments and once we
message
Cybercriminals upload infected
avenue for worms.
networks are another
Peer-to-peer (P2P)
And once it is downloaded,
to entice users into downloading them.
names
files with desirable
infected.
the computer is
For example, it can also self-
of a computer virus in many ways.
Wom fits the description
are often referred to as viruses
across networks. That is why worms
worms do not alter rilesS Dut reside in active memory and duplicate
Secondly, unlike viruses,
that are automatic and usually invisihle to
themselves. Worms use parts of the operating system
the system Decomes apparent only when their uncontrolled
the user. Their existence in
31
Information 1e
travel unaided.
attacked
the world over recently when it
worm' turned heads
worm called 'Stuxnet
A computer
facilities of Iran.
the nuclear
The most dangerous part of worm is, it can replicate itself over 3, 00,000 times in just few hours
Spyware
It is malicious program that is loaded onto a PC surreptitiously and runs in the background,
monitors users activity and report that information without user's knowledge. Spyware is
generally used from tracking and storing Internet browsing patterns of users and try to get users
cookies, reducing internet speed. Moreover, spyware is also responsible to redirect users to un-
trusted sites.
Ransomware
Aransomware' virus is used strong encryption to encrypt users' files and data. Ransomware is a
victim.
2
Information Technology & Its Application in Business (iheory
Cascade etc.
are, Jerusalem,
types of viruses in
commands
macro language
viruses: These viruses specifically target
Macro
macros are saved
Microsoft Word/ Excel and
other programs. In Word,
applications like
Macro
embedded in the documents.
for commands or keystrokes that are
sequences
is also creates copies during replication and each infection is different from the other
removalby anti-malware/
This process makes that virus to evade identification, detection,
application's data. After infecting a system, an overwrite virus begins overwriting files
with its own code. These viruses can target specific files or applications or systematically
overwrite all files on an infected device. An overwrite virus can install new code in files
and applications that programs them to spread the virus to additional files, applications
FAT virus: It is a File Allocation Table (FAT) virus. FAT is a table, which is maintained
by Operating System to store information about size; location, details of files on the disk.
27
Information Technology
forces
Operating System and
the whole
files. Thus it disrupts
access and locate existing
other location.
some directory, that original file will be moved to some
Once it i executed, it may slow down the computer, may cause loss or theft of data or may be
Trojan was first appeared in 2006 but has evolved over the years and continued to cause
problems as new variants emerge.The Zeus' Trojan, one of the most well-known and widely
spread viruses in history. The Zeus Trojan was initially used to infect Windows systems and
harvest banking credentials and account information. This Trojan spreads through phishing
attacks, drive-by downloads and man-in-the-browser techniques to infect users.
A Trojan may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike
a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an
The term Trojan horse stems from Greek mythology. According to legend, the Greeks built a
larae wooden horse that the people of Troy pulled into the city. During the night, soldiers who
had been hiding inside the horse emerged, opened the city's gates to let their fellow soldiers in
and overran the city.
In computing, attackers must use social engineering tactics to trick the end user into executing
the Trojan. Typically, the malware
programming is hidden in an
innocent-looking email
attachment or free download. When the user clicks the email
on attachment or downloads the
28
Business (Theory)
Information Technology & its Application in
is often demanded in a
The motive for ransomware attacks is nearly always monetary. Payment
isn't known.
'bitcoin', so that the cyber-criminal's identity
virtual currency, such as
infected software
malicious email attachments,
Ransomware malware can be spread through
number o
websites. A growing
devices and compromised
apps, infected external storage of
that don't rely on any form
and other approaches
attacks have used remote desktop protocol
Ransomware prevention:
users to
To protect against ransomware attacks and other types of cyber-extortion, experts urge
back up computing devices on a regular basis and update software including antivirus
sofware on a regular basis. End users should beware of clicking on links in emails fromn
strangers or opening email attachments. Victims should do all they can to avoid paying
ransoms.
Hacking
Hacking can be classified as, identifying weakness in computer systems and/or networks and
exploiting the weaknesses to gain access. An example of hacking is using by passing the login
algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in
computer systems and/or networks to gain access. Hackers are usually skilled computer
programmers with knowledge of computer security.
Types of Hackers
33
& 1
TechnologIy
Information
c o m p u t e r
and/or
rules.
following system
by the computer
ofthe
abide
must
hackers o w n e r
Ethical the
from
p e r m i s s i o n
written
G e t
report
all the
ransparently
weaknesses.
the organization.
identified
vendors of the Tor
software
hardware and systems
Inform
access to computer
unauthorized
gains
hat):A hacker who transter
Cracker (Black
violate privacy rights,
data,
intent is usually
to steal corporate
personal gain. The
etc
funds from bank accounts breaks into
hat hackers. He/she
and black
hacker who is in between ethical
G r e y hat: A
reveal them weaknesses and
view to identify
computer systems without authority with a
Hack-tivist: A hacker who use hacking to send social, religious, and political etc.
hijacked website.
Spoofing
fraudulent or malicious practice in which communication is sent from
Spoofing, in general, is a
an unknown source disguised as a source known to the receiver. Spoofing is most prevalent in
In other words, spoof refers to hacking or deception that imitates another person, software
IP spoofing
34
( T h e o r y
Business
in
Application
.
Phone number or Caller ID spoofing
Web page spoof of
gaiing
way
or a
network
If the
range.
her IP address or IP address is
nelping to identifying a user by his/
InS
measures.
help bypass security is
"
GSs
to match
this criteria it may user
into thinkingu
UUsed to deceive a web page, pol, or other Internet contest
vote
her to get more hits or falsely increase a Dal
someone else allowing him or e
a
ours. For example, we may be in the 304 area code with the prefix 123 and get numbers from
304-123-4567. Although this form of telemarketing is illegal telemarketers use this tactic
because more people are likely to answer phone calls from local numbers.
Web page spoof: A fake web page or spoof on another commonly visited page. For example, a
malicious user may create a spoof page of Microsoft's, eBay, PayPal or Google's homepage
that looks identical but is hosted on a different server. These pages are commonly used in
phish ing e-mails to extract information from the user such and
as usernames
passwords.
35
in Busin
& fts
Application
siness
T e c h n o o g y
Information
data as it is
capture
individuals
to
Sniffing Sniffing
allows
to diagnosee
synonyms. professionals
snooping
is network
and
oing
is used by and
technique passwords
This
over a
network.
data like
n s m i t t e d
unencrypted
users to capture or
malicious
to a system
1Ssues and by access
WOTK
a u s e r can
gain
is captured
in transit,
information
Sernames. if this
network.
legitimate and genuine. In actuality, the phishing victim later discovers his personal identity and
In other words, phishing is the practice of defrauding users into giving up their usernames,
Never divulge personal information requested by email, such as name or debit credit
Verification of the Website's phone number is needed before making any calls to the
Using of updated computer security tools, such as anti-virus software, spyware and
firewall.
Never open unknown or suspicious email attachments.
Web
by typing the actual address in the
the website URL for legitimacy
.Doublecheck
browser
Spamming
commercial purposes.
email sent indiscriminately in bulk, often for
Spam is unsolicited junk
of electronic messaging systems like
e-mails and other digital delivery
Spamming is the use
mobile text messaging, social networking spam, junk fax transmissions, television advertising
Spamming (especially e-mail spam) is very common. According to various estimates, about
60% to 75% of all email in the world may be spam. Most spams are commercial advertising, but
some contain viruses. adware. Spams are becoming ever more sophisticated and specifically
targeted. Even an email that seems to come from a familiar source could still be fake.
*