Seminar on IT Ac 1
Presentation on:
VIRUS DISSEMINATION
2
INTRODUCTION Cyber crime is criminal activity done using computers and the Internet. This includes anything from ing illegal music files to stealing millions of dollars from online bank s. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. 3
TYPES OF CYBER CRIME HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION CYBER STALKING SOFTWARE PIRACY PORNOGRAPHY PHISHING SPOOFING CYBER DEFAMATION etc.
4
VIRUS DISSEMINATION Malicious softwares that attach itself to other software.. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's) A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own without traveling to a new host. Hence, virus dissemination is act of spreading malicious software which affect available files on the computer & spread over networks using internet.
5
Typical actions of virus Erase files Scramble data on hard disk Cause erratic screen behaviour Halt the PC Just replicate itself Loading data on internet
6
CHARACTERISTICS • Size - The sizes of the program code required for computer viruses are very small. • Versatile - Computer viruses have appeared with the ability to generically attack a wide variety of applications. • Propagation - Once a computer virus has infected a program, while this program is running, the virus is able to spread to other programs and files accessible to the computer system. • Effectiveness - Many of the computer viruses have catastrophic effects on their victims, including total loss of data, programs, and even the operating systems failure. • Functionality - A wide variety of functions has been demonstrated in virus programs. Some virus programs merely spread themselves to applications without attacking data files, program functions, or operating system activities while some attack system files. 7
CASE STUDY NAME: MELISSA TYPE: MACRO VIRUS AUTHOR: DAVID SMITH OPERATING SYSTEMS AFFECTED: WINDOWS XP, 2000 REPORTED COST: $1.1 BILLION
8
CASE STUDY Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the has the Microsoft Outlook e-mail program, causes the virus to be resent to the first 50 people in each of the 's address books. While it does not destroy files or other resources, Melissa has the potential to disable corporate and other mail servers as the ripple of e-mail 9
CASE STUDY WORKING: Melissa arrives in an email, with the subject line "Important Message From <email address of the from which the virus was sent>". The "sender" will be the actual email address that it came from. The body of the message is "Here is that document you asked for ... don't show anyone else ;-)". When an infected document is opened, Melissa checks if the Microsoft Office registry key has a subdirectory named "Melissa?" exists with "... by Kwyjibo" set as its value. If the value has been set, the virus will not perform the mailing routine. If the value is not set, the virus mails itself to fifty addresses in the 's Address Book. 10
CASE STUDY SOURCE CODE: seg000:00000000 seg000 segment byte public 'CODE' use32 seg000:00000000 assume cs:seg000 seg000:00000000 assume es:nothing, ss:nothing, ds:nothing, fs:nothing, gs:nothing seg000:00000000 47 45 54 20 2F 64+aGetDefault_ida db 'GET /default.ida? NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN' seg000:00000000 65 66 61 75 6C 74+ db 'NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNN' seg000:00000000 2E 69 64 61 3F 4E+ db 'NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNN' seg000:00000000 4E 4E 4E 4E 4E 4E+ db 'NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNN' seg000:00000000 4E 4E 4E 4E 4E 4E+ db 'N %u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u685' seg000:00000000 4E 4E 4E 4E 4E 4E+ db '8%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53f' 11
CASE STUDY EFFECT: While the virus has no deliberately malicious payload, it did place a burden on email servers, making it a Denial of Service attack. Also the "damages" were mostly lost productivity due to companies closing down their servers. Many people in the IT industry said that the situation could have been much worse, as all the virus really did was email itself. 12
CASE STUDY AVOIDANCE: • Avoiding Melissa does not mean you can't read your e-mail - only that you have to screen your notes and be careful about what attachments you open. • If you get an e-mail note with the subject, "Important Message from [the name of someone]," and it has an e-mail attachment (usually a 40 kilobyte document named LIST.DOC), simply DO NOT OPEN (for example, do not click on) the attachment. 13
CASE STUDY PROSECUTION: On December 10, 1999 Smith pleaded guilty and was sentenced to 10 years, serving 20 months, and was fined US $5,000. The arrest was the result of a collaborative effort involving (amongst others) the FBI, the New Jersey State Police, Monmouth Internet and a Swedish computer scientist.
14
SOLUTION To protect yourself you need to be “Proactive” about Security issues. Being reactive won’t solve anything; in matter of fact it can make the problem much more complex to solve, and the situation much worse, resulting in a complete Nightmare!! Best measures are the preventative ones. You need to basically to do four steps to keep your computer and your data secure: 15
SOLUTION STEPS: 1. Get the latest Anti-Virus Software. 2. Make sure you have the latest security patches and hot fixes using Windows Update. 3. Use a Host-Based Firewall. 4. BACKUP your Important Files. 16
LEGISLATION
LAWS: Section 43, 66 of IT Act,2000 and section 426 of IPC consists law against virus dissemination.
PUNISHMENT: Imprisonment up to three years, or/and with fine up to 2 lakh rupees.
17
CONCLUSION Cyber crime poses a big threat to both national and international security. Every country in the world needs to have establish laws to protect itself from cyber crime. However, the establishment of these laws alone is not enough, educating the masses against cyber crime and strict enforcement of these laws is also necessary. 18
REFRENCES WEBSITES: http://cybercellraj.com http://cybercellmumbai.gov.in http://cyberlawsindia.net BOOKS: • Peter Szor, The Art of Computer Virus and Defence, Harlow, England Addison Wesely Professional, 2005. • Nicholas Weaver, Vern Paxson, Stuart Staniford, and Robert Cunnigham, A Taxonomy of Computer 19 Worms
THANK YOU
Submitted to Mr. Ranjeet Pandey Dr. K.K. Agarwal
Submitted by Nidhish Bhatia IV year, B.Tech(IT)
20