Sunteți pe pagina 1din 12

Virus and Others

Malware, short for malicious software, consists of programming (code,


scripts, active content, and other software) designed to disrupt or deny
operation, gather information that leads to loss of privacy or exploitation, gain
unauthorized access to system resources, and other abusive behavior.
A computer worm is a self-replicating malware computer program, which uses
a computer network to send copies of itself to other nodes (computers on the
network) and it may do so without any user intervention. This is due to security
shortcomings on the target computer. Unlike a computer virus, it does not need
to attach itself to an existing program. Worms almost always cause at least some
harm to the network, even if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted computer.
A Trojan horse, or Trojan, is software that appears to perform a desirable
function for the user prior to run or install, but (perhaps in addition to the
expected function) steals information or harms the system.
Spyware is a type of malware that can be installed on computers, and which
collects small pieces of information about users without their knowledge. The
presence of spyware is typically hidden from the user, and can be difficult to
detect. Sometimes, however, spywares are installed by the owner of a shared,
corporate, or public computer on purpose in order to secretly monitor other
users.
Adware, or advertising-supported software, is any software package which
automatically plays, displays, or downloads advertisements to a computer. These
advertisements can be in the form of a pop-up. They may also be in the user
interface of the software or on a screen presented to the user during the
installation process. The object of the Adware is to generate revenue for its
author. Adware, by itself, is harmless; however, some adware may come with
integrated spyware such as key loggers.
Scareware comprises several classes of scam software with malicious payloads,
or of limited or no benefit, that are sold to consumers via certain unethical
marketing practices. The selling approach uses social engineering to cause
shock, anxiety, or the perception of a threat, generally directed at an
unsuspecting user. Some forms of spyware and adware also use scareware
tactics.
Crimeware is a class of malware designed specifically to automate cybercrime.
Crimeware is designed (through social engineering or technical stealth) to
perpetrate identity theft in order to access a computer user's online accounts at
financial services companies and online retailers for the purpose of taking funds
from those accounts or completing unauthorized transactions that enrich the
thief controlling the crimeware. Crimeware also often has the intent to export
confidential or sensitive information from a network for financial exploitation.

A rootkit is software that enables continued privileged access to a computer


while actively hiding its presence from administrators by subverting standard
operating system functionality or other applications. The term rootkit is a
concatenation of "root" (the traditional name of the privileged account on Unix
operating systems) and the word "kit" (which refers to the software components
that implement the tool).
Spam is the use of electronic messaging systems to send unsolicited bulk
messages indiscriminately. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant
messaging spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, wiki spam, online classified ads spam, mobile phone messaging spam,
Internet forum spam, junk fax transmissions, social networking spam, television
advertising and file sharing network spam.
A computer virus is a computer program that can replicate itself and spread
from one computer to another. The term "virus" is also commonly but
erroneously used to refer to other types of malware that do not have the
reproductive ability. A true virus can spread from one computer to another
through a network or the Internet, or carried it on a removable medium such as a
CD, DVD, or USB drive. Viruses can increase their chances of spreading to other
computers by infecting files on a network file system or a file system that is
accessed by another computer.
Comparisons:
"computer virus" is sometimes used to include all types of malware, even
those that do not have the reproductive ability.
Malware includes computer viruses, computer worms, Trojan horses, most
rootkits, spyware, dishonest adware and other malicious and unwanted
software, including true viruses.
A worm can exploit security vulnerabilities to spread itself automatically to
other computers through networks, while a Trojan horse is a program that
appears harmless but hides malicious functions.
Some viruses and other malware have symptoms noticeable to the
computer user, but many are surreptitious or simply do nothing to call
attention to themselves.
Viruses are sometimes confused with worms and Trojan horses, which are
technically different.
Worms and Trojan horses, like viruses, may harm a computer system's
data or performance.
Some viruses do nothing beyond reproducing themselves.

Antivirus or anti-virus software is used to prevent, detect, and remove


malware, including but not limited to computer viruses, computer worm, trojan
horses, spyware and adware. This page talks about the software used for the
prevention and removal of such threats, rather than computer security
implemented by software methods.
Top 20 viruses in the history:
Creeper (1971), the first virus program running on the computer Dec. 10
under the operating system Tops Ten.

Elk Cloner (1985), the first personal computer virus on the Apple IIe which
was created by ninth graders.
The Internet Worm (1985), written by someone at Cornell University who
brought the Internet
Pakistani Brain (1988), this is the first virus that infects IBM PC. Written by
two brothers from Pakistan and was covered extensively by the media.
Jerusalem Family (1990), about fifty different strains of the virus is
believed to have originated from the University of Jerusalem.
Stoned (1989), is a virus that is widely known in the first decade of the
virus. Stoned is the boot sector / infector. Mbr reboot that will count the
number of the original infection and displays the phrase 'your computer is
now stoned'.
Mutation Engine Dark Anger (1990), was actually written in 1988, but was
first used in the early nineties in viruses like Pogue danCoffeeshop.
Micheangelo (1992), a variant of the Stoned, with a destructive payload.
World Concept (1995), macro viruses in Microsoft Word first. Word Concept
will issue a phrase, 'That's enough to PROVE my point' and is present in
the second era of computer viruses.
Cih / Chernobyl (1998), is the most destructive virus ever. Occurred on the
26th of each month (depending on which version is involved), remove the
hard drive, and eliminate the flash ROM BIOS of the computer user.
Melissa (1999), the first major virus that spreads via email, at the
beginning of the era of Internet viruses.
Lovebug (2001), the most popular e-mail worm ever.
Code Red (2001), named for a high-caffeine drinks, the virus is not spread
through the network email or web page.

Nimda (2000), a virus dubbed 'Swiss Army Knife', used as buffer overflows,
email, network share, and ten other methods to get into the network
Bagel Netsky (2004) the virus is designed to show a fake competition, or
battle each other.
Botnets (2004), infected computers that can be repeated in the network to
run the spam, infect new people, and steal data.
Zotob (2005), this worm only affects unpatched Windows 2000 systems,
but managed to take some major media sites, including CNN and the New
York Times.
Rootkit (2005), they have become one of the most popular means of
stealth in malicious code. It is used to make other malware invisible to the
operating system.
Storm Worm (2007), viruses go through thousands of iterations eventually
creating the largest botnet in the world. At one time it was believed that
more than fifteen million infected machines at the same time, and under
the control of the criminal world.
Italian Job (2007), more than malware. Italian Job is a coordinated attack
using a packaging tool kit known as MPack.
Top 10 dangerous malware:
April, 2013
1. Troj/Invo-Zip
2. W32/Netsky
3. Mal/EncPk-EI
4. Troj/Pushdo-Gen
5. Troj/Agent-HFU
6. Mal/Iframe-E
7. Troj/Mdrop-BTV
8. Troj/Mdrop-BUF
9. Troj/Agent-HFZ
10.Troj/Agent-HGT
www.pcclinicsite.com

June, 2013

September, 2013

11.Troj/Mdrop-DKE
12.Troj/Sasfis-O
13.Troj/Keygen-FU
14.Troj/Zbot-AOY
15.Troj/Zbot-AOW
16.W32/Womble-E
17.Troj/VB-FGD
18.Troj/FakeAV-DFF
19.Troj/SWFLdr-W
20.W32/RorpiaMemA
www.pcclinicsite.com

21.Troj/Invo-Zip
22.W32/Netsky
23.Mal/EncPk-EI
24.Troj/PushdoGen
25.Troj/Agent-HFU
26.Troj/Mdrop-BTV
27.Mal/Iframe-E
28.Troj/Mdrop-BUF
29.Troj/Agent-HFZ
30.Troj/Agent-HGT
Source: Sophos

A database administrator's responsibilities can include


the following tasks:
Installing and upgrading the database server and application tools, Allocating
system storage and planning future storage requirements for the database
system, Modifying the database structure, as necessary, from information given

by application developers, Enrolling users and maintaining system security,


Ensuring compliance with database vendor license agreement, Controlling and
monitoring user access to the database, Monitoring and optimizing the
performance of the database, Planning for backup and recovery of database
information, Maintaining archived data, Backing up and restoring databases,
Contacting database vendor for technical support, Generating various reports by
querying from database as per need.

Rapid application development (RAD) is both a general term used to refer


to alternatives to the conventional waterfall model of software
development as well as the name for James Martin's approach to rapid
development. In general, RAD approaches to software development put
less emphasis on planning and more emphasis on process. In contrast to
the waterfall model, which calls for rigorously defined specification to be
established prior to entering the development phase, RAD approaches
emphasize adaptability and the necessity of adjusting requirements in
response to knowledge gained as the project progresses. Prototypes are
often used in addition to or sometimes even in place of design
specifications.

RAD is especially well suited (although not limited to) developing software
that is driven by user interface requirements. Graphical user interface
builders are often called rapid application development tools. Other
approaches to rapid development include Agile methods and the spiral
model.

ECRM
CRM focuses on providing and maintaining quality services for customers by
effectively communicating and delivering products, services and solutions to
address customer problems.
It includes:
1. Call Handling
2. Sales Tracking
3. Transaction Support
The link between customer satisfaction and the ROI (Return on investment) is the
profit for a company as shown in the following figure.

Customer
Satisfaction
Customer
Commitment
Customer
Tracking and Analyzing Data
Retention

How you can interact with your customers:


1.

2. Personalization

3. Contact Centers
Tracking and Analyze data:
1. Log file Analysis

Profit

2. Data Mining
3. Customer Registration
4. Cookies (A small text file (up to 4KB) created by a Web site that is stored
in the user's computer either temporarily for that session only or
permanently on the hard disk (persistent cookie). Cookies provide a way
for the Web site to recognize you and keep track of your preferences.)
Contact Centers: Frequently Asked Questions (FAQs), E-mail, Online Text
Chatting, Speech Synthesis and Recognition, Voice Communications.

Typical Business touch points for CRM:

Phases of CRM:
Customer acquisition management is the set of methodologies and systems to
manage customer prospects and inquiries generated by a variety of marketing
techniques. ... Customer Acquisition Management can be considered the
connectivity between advertising and customer relationship management
Definition: Enhancement
A change or the process of change, brought about, to improve a product or
service and to increase its value, is known as enhancement. A variety of
enhancements can be used in business to increase the efficiency and
effectiveness of different processes and functionalities.
Here, we will focus on some of the important enhancements, commonly used in
the industry.
Enhancing customer experience:

Better the customer experience, more is the customers loyalty towards a brand.
Enhancing the experience of existing customers is preferred to finding new
customers, because of the cost-effectiveness and profitability factors. Some
strategies employed for the enhancement of customers experience are:
Organize delivery schedule to deliver the products on time, as per the
requirements of the customers
Problems should be identified and resolved as quick as possible
Building relationships, on a personal level, with the key customers
Using technology, wherever possible, to improve the service quality offered to
the customers
Giving adequate customer service training to the staff on a regular basis
Use social media as:

Run promotions and contests

Reply to feedback online

Create relevant and engaging posts

Customer retention refers to the activities and actions companies and


organizations take to reduce the number of customer defections. The goal of
customer retention programs is to help companies retain as many customers as
possible, often through customer loyalty and brand loyalty initiatives.
Continuum from mass marketing to relationship marketing:
Mass Marketing

Relationship
Marketing

Discrete transactions

Continuing transactions

Short-term emphasis

Long-term emphasis

Acquisition focus

Retention focus

Share of market

Share of mind

Strategies for Web Site Development


In-house Development
Outsourcing

Adv of in house:If successful it can fulfill the exact demand, Greater control over
the system, Secured
Disadv of in house: Requires expertise, Requires proper hardware, software,
networking components and also adequate office space, Time consuming

Levels of outsourcing:
Appointing a company to develop the entire system
Buying a pre-packaged solution
Outsourcing the front-end application
Outsourcing the database
Using the ISP for connecting to internet
E-mail handling and response
Electronic payment system
Adv of out sourcing:
No need of in-house expertise
Reduced risk of failure
Savings in terms of time and money
Dis adv:
Loss of control
Poor service level agreement
Conflict between management
Server: A server is a host on the internet that manages network resources and
fulfills requests from clients. There are many types of servers1. Web servers
2. E-mail servers
3. Database servers
4. File servers
5. Print servers
DNS (Domain Name System): It serves as the e-commerce stores virtual location
on the web such as http:// www.philanthropy.com

As it is difficult to remember the IP address of a website. Sun Microsystems


developed DNS. It is the letter equivalent of IP address.
It is much easier to remember DNS address than the corresponding IP address.
For example the IP address of http:// www.philanthropy.com is 198.108.95.145
Domain Name registration: Domain names should be registered through
registrars accredited by ICANN (Internet Corporation for Assigned Names and
Numbers).
The web host

Provides the website owner a high bandwidth connection to the internet

Stores all of the website content on its servers, which process all of the
information trafficked to and from the website

Selecting an alternative hosting service

Free Hosting: For very simple websites, such as personal homepages.

Shared Server Hosting: Many websites are placed on the same server.
It is the cheapest alternative for small businesses.

Dedicated Server Hosting: A website is allocated to its own dedicated


server. It is suitable for larger websites.

In-house Hosting: Only for those companies which have adequate


resources such as dedicated personnel, power backup, security,
maintenance, and redundancy.

E-commerce Hosting

Factors to Evaluate when Selecting a Hosting Service:

Functionality
Reliability and Bandwidth
Security
Backup and disaster recovery
Cost
The Seven Design Elements of Customer Interface
The 7C framework: Context , Content , Community
,Customization,Communication,Connection,Commerce
Context: Sites layout and design,Content: Text, picture, sound and
video,Community: User- to - user communication,Customization: Ability to
tailor the website,Communication: Two way communication between site and
user,Connection: How the site is linked to other sites,Commerce: Capabilities
to enable commercial transactions.
Web content development tips: Stay fresh,Be relevant and unique.Make it
easy to find.Serve a smorgasbord of content.Deliver content everywhere.

SDLC:
Whats important in application development?
Three key components of an IS application are
The Data
The way Data Flows
The Processing Logic to manipulate data and produce information
for decision making
Systems Development Life Cycle (SDLC):
Traditional methodology for developing, maintaining, and replacing
information systems
Phases in SDLC include
Planning
Analysis
Design
Implementation
Maintenance

S-ar putea să vă placă și