Tuesday, April 8, 2014

Unit II - Computer Virus & Network Communication



Computer Virus
What is computer virus?
v  It is a parasitic program that infects another legitimate program which is called the host.
v  Computer virus refers to a   program which damages computer systems and/or destroys or erases data files
Important Characteristic of  computer virus is its ability to replicate itself
Computer Virus spreads in the following ways
      Downloading an infected file to your computer
      Receiving an infected disk from another user
      Copying an infected file
What can a virus do?
      It can annoy their victims rather than cause specific damage. They are described as benign.
        Causes damage to computer system if permitted to run.
Computer Viruses are programs that are created for the following purposes. They are:
q  Copy themselves to other programs or areas of disk
q  Replicate rapidly and frequently
q  Display information in the screen
q  Modify, Corrupt or destroy selected files
q  Erase the contents of entire disk
q  Lie dormant for a specified time or until a given condition is met and then becomes active
Types of Computer Virus
      Bimodal, Bipartite or Multipartitie Virus
      Logical Bombs
      Time Bombs
      Boot sector Virus
      Cluster Viruses
      Joke Programs
      Stealth Virus
      Script Virus
      Trojan Horses
      Worm
      Macro Viruses
      Script Virus
      Polymorphic Virus
Bimodal, Bipartite, Multipartite Virus
This typeof virus can infect both files and boot sector of a disk.
Time Bomb
A time bomb is a virus program that performs an activity on a particular date .It hides on a victim’s disk and waits until a specific date before running
Logical Bomb
           A logical bomb is a destructive program that performs an activity when a certain action has occurred. It may be activated by a date, a change to a file or a particular action taken by a user or a program
Worm Virus
A worm is also a destructive program that fills a computer system with self-replicating information. Effective worm copies itself and takes up as much space as possible in the Host’s memory . Worms are commonly spread over Internet .
Boot Sector Virus
      A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk . When the computer is started the virus copies itself into memory where it hides and infects other disks .
  Cluster virus
 This type of virus makes changes to a disk’s file system. If any program is run from the infected disk, the program causes virus to run . This causes illusion that the virus has infected every program on the disk.
Joke Programs
       These are not viruses and do not inflict any damage . Their purpose is to frighten their victims into thinking that a virus has infected and damaged their system. For example a joke program can display a message warning to the user not to touch any keys or the computer’s hard disk will be formatted.
Macro Virus
A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk .
Script Virus
Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages .

Trojan Horses
Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.Trojan Horse usually comes with monitoring tools and key loggers
Polymorphic Virus
This can change itself each time it is copied, making it difficult to isolate .
Stealth Virus
          This virus takes up residence in Computer memory, making it hard to detect.
Antivirus Softwares:
In order to protect our computer systems from the danger of virus infection, we can follow certain precautionary measures as well as some remedial measures. These measures include the use of certain softwares called Antivirus Softwares to protect our files from being infected by computer viruses.
         Antivirus Software is a software that scans computer memory and disks for known viruses and eradicates them. A good Antivirus Program checks for infected files automatically every time you insert any kind of disk or download a file via network or internet connection . It can also scan email messages and attached files . Sophisticated Virus scanners can also alert you if a web page attempts to load suspicious code onto your PC.
Some of the  Popular Anti virus Programs are :
»          McAfee Antivirus
»        Norton Antivirus
»        Virex
»        PC-cillin
»        Avast .
»        Kaspersky Anitvirus.
Actions to prevent virus infection:
v  Always update your anti-virus software at least weekly.
v  Back up your important files and ensure that they can be restored.
v  Change the computer's boot sequence to always start the PC from its hard drive
v  Don't share Drive C: without a password and without read-only restrictions.
v  Empty floppy drives of diskettes before turning on computers, especially laptops.
v  Forget opening unexpected e-mail attachments, even if they're from friends
v  Get trained on your computer's anti-virus software and use it.
v  Have multiple backups of important files. This lowers the chance that all are infected.
v  Install security updates for your operating system and programs as soon as possible.
v  Jump at the chance to learn more about your computer. This will help you spot viruses.

                                                Network Communication
Communication System:
Process describing transfer of information, data, instructions between one or more systems through some media
   Examples
n  people, computers, cell phones, etc.
n  Computer communication systems
Signals passing through the communication channel can be Digital, or analog
n  Analog signals: continuous electrical waves
n  Digital signals: individual electrical pulses (bits)

Communication Model:

 



Characteristics of Communication:
*      must have a Sender and  Receiver
*      A protocol is a set of rules which governs the transfer of data between computers. Protocols allow communication between computers and networks.
*      Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers
*      protocols will determine the speed of transmission, error checking method, size of bytes, and whether synchronous or asynchronous
Communication Software:
n  Hypertext Transfer Protocol (HTTP): A client/server application that uses TCP for transport to retrieve HTML pages.
n  Domain Name Service (DNS): A name-to-address translation application that uses both TCP and UDP transport.
n  Telnet: A virtual terminal application that uses TCP for transport.
n  File Transport Protocol (FTP): A file transfer application that uses TCP for transport.
n  Trivial File Transfer Protocol (TFTP): A file transfer application that uses UDP for transport.
n  Network Time Protocol (NTP): An application that synchronizes time with a time source and uses UDP for transport.
n  Border Gateway Protocol (BGP): An exterior gateway routing protocol that uses TCP for transport. BGP is used to exchange routing information for the Internet and is the protocol used between service providers.
Communication Hardware:
Any type of hardware capable of transmitting data, instructions, and information between devices
Examples:
Dial-up modem: uses standard phone lines
ISDN and DSL Modem: Allows digital communication between networks and computers
Cable modem: a modem that transmits and receives data over the cable television (CATV) network
Network interface cards: Adaptor cards residing in the computer to transmit and receive data over the network (NIC) (e.g., Ethernet)
Physical Transmission Media:
A tangible media
n    Examples: Twisted-pair cable, coaxial cable, Fiber-optics, etc.
Twisted-pair cable:
n    One or more twisted wires bundled together (why?)
n    Made of copper
Coax-Cable:
n    Consists of single copper wire surrounded by three layers of insulating and metal materials
n    Typically used for cable TV
Fiber-optics:
n    Strands of glass or plastic used to transmit light
n    Very high capacity, low noise, small size, less suitable to natural disturbances
Networks:
n  Collection of computers and devices connected together
n  Used to transfer information or files, share resources, etc.
n  What is the largest network?
n  Characterized based on their geographical coverage, speed, capacities
n  Networks are categorized based on the following characteristics:
n  Network coverage: LAN, MAN, WAN
n  Network topologies: how the computers are connected together
n  Network technologies
n  Network architecture
LAN:
            Local Area Network is a group of computers connected within a building or a campus (Example: computers located on a single floor or a building or it might link all the computers in a small company. 

MAN:
Metropolitan Area Network – a backbone that connects LANs in a metropolitan area such as a city and handles the bulk of communications activity across that region.  




WAN:
Wide Area Network  covers a large geographical area such as a city or country.  Communication channels include telephone lines, Microwave, satellites, etc.




 Bus Topology :


Star Topology :

Ring Topology :




No comments: