Chapter 7 - Computer Infestation (Notes)
Chapter 7 - Computer Infestation (Notes)
Perspective &
Computer
Infestation
Class, do you know
what is computer
infestation?
Computer infestation is
an unwanted program
transmitted to a
computer without user’s
knowledge.
It was designed to
damage data and
software (does not
physically damage PC
hardware)
Three categories
(viruses, worms,
Trojan horses),
each differing in
the way they
spread, what
damage they do,
and how they hide
Computer Infestation is like an
electronic diseases. It can affect your
computer and anything attached to it.
PC support PC service Bench Help-desk
technician technician technician technician
PC SUPPORT TECHNICIAN
• PC support technicians are the "fix-it" people of the IT
world. Just as TV repairmen, auto mechanics,
plumbers and electricians are needed to maintain the
health of your home, PC support technicians are
needed to maintain your PC in good working order.
• Obviously, a good PC technician needs to be
mechanically inclined.
• Nevertheless, more than that, they need to be
proficient communicators.
• Diagnosing and repairing PC problems requires a
thorough understanding of the situation, which often
needs to be ascertained through conversations with
end-users
PC SUPPORT TECHNICIAN
• Depending on the users’ level of knowledge, the
response to the support technician's question of
"What is wrong with your PC?" can vary widely.
• Experienced users may say, "The network card is
intermittently disconnecting from the network".
• Less experienced users in the same situation may
respond, "I can't get to Yahoo to check my email".
• Novices may say, "My computer doesn't work."
• In the last case, the technician must use his
interpersonal skills to elicit enough information from
the user to give him a basis for formulating an opinion
about what is wrong with the PC
PC SUPPORT TECHNICIAN
Responsibilities
• Diagnose and Repair PC's
• Correct Software Faults
• Deal with Peripheral Issues
• Set-up and install new equipment
• Perform preventative maintenance
• Provide informal or "ad hoc" training
• Evaluate new products
Skills
• Knowledge of PC Hardware
• Knowledge of PC Software
• Understanding of Internet Communications
• Solid Grasp of Networking Theory
• Knowledge of PC Peripherals
HELP-DESK TECHNICIAN
• In days of yore (the early 1970's), there were no PCs.
• Computers were large mainframes sold by a handful
of major manufacturers.
• Back then, there weren't any help desks either.
• When there was a problem with the computer, the
manufacturer was called.
• The engineers who designed the computer had to
attempt to solve the problem.
• This took time away from their main task of designing
new computers as well as not earning revenue for the
computer manufacturer
HELP-DESK TECHNICIAN
• IBM, being a relatively perceptive organization hit
upon a wonderful idea.
• They encouraged customers to pre-screen calls to for
assistance internally before calling IBM for help.
• The incentive IBM offered was discounts on
equipment.
• By calling a central point for help, IBM hoped that the
customer would minimize the number of calls for
technical support by solving repeat problems
internally.
• Thus the concept of the modern help desk was born
HELP-DESK TECHNICIAN
Responsibilities
• Taking customer calls and logging problem incidents
• Analyzing and resolving problems
• Documenting new solutions to problems
• Participation in Change Management Process (i.e. - recording
new solutions in the appropriate database)
• Communication with customers and other employees in your
organization
• Training
Skills
• Business Skill
• Technical Skills
• Facility with database
• Soft skill
PC SERVICE TECHNICIAN
System
Related
Issues
Issues Security
in AV
S/W
Rogue
False
Security
Positive
Application
PERFORMANCE
Computer
Infestation
Trojan
Worm
Horse
What ‘s
wrong?
Huh, My whole
internal system is
damaged by virus
Do you
have a
backup?
continued
UNDERSTANDING COMPUTER INFESTATIONS
• The term "virus" is also commonly but erroneously used to refer to other types of
malware, including but not limited to adware and spyware programs that do not
have the reproductive ability.
• A true virus can spread from one computer to another (in some form of
executable code) when its host is taken to the target computer; for instance
because a user sent it over a network or the Internet, or carried it on a removable
medium such as a floppy disk, CD, DVD, or USB drive
UNDERSTANDING COMPUTER INFESTATIONS
• Trojan horse
▪ Does not need a host program to work
▪ Substitutes itself for a legitimate program
▪ Unable to replicate
TROJAN HORSE
• The Trojan Horse is a tale from the Trojan War, as
told in Virgil's Latin epic poem The Aeneid and by
Quintus of Smyrna. The events in this story from the
Bronze Age took place after Homer's Iliad, and
before his Odyssey. It was the stratagem that
allowed the Greeks finally to enter the city of Troy
and end the conflict.
• In one version, after a fruitless 10-year siege, the
Greeks constructed a huge wooden horse, and hid a
select force of 30 men inside.
• The Greeks pretended to sail away, and the Trojans
pulled the horse into their city as a victory trophy.
• That night the Greek force crept out of the horse and
opened the gates for the rest of the Greek army,
which had sailed back under cover of night. The
Greek army entered and destroyed the city of Troy,
decisively ending the war.
TROJAN HORSE PAYLOAD
Remote Access
Data Destruction
Downloader/dropper
continued
WHERE VIRUSES HIDE
• Macro viruses
▪Hide in a word-processing document that contains a
macro
▪Most common viruses spread by e-mail
• Multipartite viruses
▪Combination of a boot sector virus and a file virus
▪A multipartite virus is a computer virus that infects
multiple different targets.
▪For a complete cleanup, all parts of the virus must
be removed.
▪Because of the multiple vectors for the spread of
infection, these viruses could spread faster than a
boot or file infector alone
THE DAMAGE AN INFESTATION CAN CAUSE
▪ Ranges from very minor to major
▪ Is called the payload
▪ Can be accomplished in a variety of ways
THE DAMAGE AN INFESTATION CAN CAUSE
THE DAMAGE AN INFESTATION CAN CAUSE
HOW INFESTATIONS SPREAD
Trading storage containing
program files
Connecting computer to an
unprotected network
AIDS
•Not to be confused with AIDS (computer virus) or AIDS (trojan horse), this hoax is
about a non-existent virus that is purportedly distributed via electronic mail messages
that have "OPEN: VERY COOL! :)" as their subjects.
Amish Virus
•This joke email claims to be authored by the Amish who have no computers or
electricity to program viruses, thus ask you to delete your own hard drive manually
after forwarding the message to your friends.
Antichrist
•This is a hoax that warns about a supposed virus discovered by Microsoft and Mcafee
named "Antichrist" telling the user that it is installed via an e-mail with the subject
of:"SURPRISE?!!!!!!!!!!" after which, destroys the quadearasusalim.bdset one of the
most important sectors of the hard disk rendering it unusable.
PROTECTING AGAINST COMPUTER INFESTATIONS