Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Computer viruses

in examples

AGENDA

AGENDA

  • What is computer virus?
  • A ruthless hardware destroyer
  • A worm in the White House?
  • Ransomware - modern ransomer
  • Bakasoftware: sneaky (anti) virus
  • Can virus used as a weapon?
  • Summary

VIRUS

VIRUS

DEFINITION

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

CHERNOBYL VIRUS

CHERNOBYL VIRUS

1998

The first virus that actually had the power to damage your computer’s hardware — to fix it, you had to physically replace electronics.

Title

Title

Title

Chen Ing Hau

CODE RED

It was first spotted on July 13th, 2001. The worm infected 360,000 computers in under 14 hours. That’s one of the fastest outbreaks of all time.

Worms are standalone pieces of code that can infect your computer directly. They don’t need to infect any specific program to work.

HELLO! Welcome to http://www.worm.com! Hacked By Chinese!

GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

NNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0

CRYPTOLOCKER

The idea behind Cryptolocker was simple. It would infect your computer, encrypt all your files, and then give you three days to pay three hundred dollars in an untraceable currency like Bitcoin.

Title

More than $100 million in losses were attributed to the schemes, which infected hundreds of thousands of computers, including a Massachusetts police department that paid a $750 ransom to restore its access to investigative files, digital mugshots and other administrative documents.

Title

BAKASOFTWARE

A program that gets onto your computer by making you believe it’s something harmless. Or even something that’s supposed to protect you from viruses.

Title

Title

STUXNET

The first known digital weapon deployed in 2009 to slow Iranian nuclear development.The goal was to develop a virus that could take out the centrifuges powering uranium enrichment in the Natanz enrichment plant in Iran.

Title

Stuxnet had to be carried into Natanz on thumb drives, either by double agents or unknowing accomplices. To avoid detection, it came with security certifications stolen from legitimate companies like RealTek and JMicronTechnology, both based in Taiwan.

Title

For 17 months, the virus managed to quietly work its way into the Iranian systems, slowly destroying vital samples and damaging necessary equipment.

Before: 800 centrifuges a year

After: up to 2 thousand centrifuges every couple of months

The most sophisticated piece of malware

Title

According to Microsoft, the virus would have taken at least 10,000 hours of coding, and taken a team of five people or more, at least six months of dedicated work.

SUMMARY

Learn more about creating dynamic, engaging presentations with Prezi