BY FIOLA CARVALHO 411104 TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Data and Computer Communications
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
By Hiranmayi Pai Neeraj Jain
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
1 of 4 Malicious software, also known as “malware,” is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer.
Chapter 14 Computer Security Threats
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 14 Computer Security Threats
Cryptography and Network Security Malicious Software Third Edition by William Stallings Lecturer: Dr. Saleem Alzoubi.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
Cryptography and Network Security Chapter 21
Data and Computer Communications
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
 a crime committed on a computer network, esp. the Internet.
Data Security and Encryption (CSE348) 1. Lecture # 27 2.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Chapter 11 Malicious Software
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Viruses and Related Threats. 2 Summary  have considered:  various malicious programs  trapdoor, logic bomb, trojan horse, zombie  viruses  worms.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Malicious Software.
Computer Skills and Applications Computer Security.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Britanny polca Objectives: * Identify what Malicious code is * Know the categories of Malicious code * Introduce you to the parts of Malicious software.
Company LOGO Malicious SW By Dr. Shadi Masadeh 1.
Malicious Software.
Viruses and Other Malicious Content
How to Get Rid of Online Threats Impacting your Computer Device?
NET 311 Information Security
MALICIOUS SOFTWARE A.Sivaramakrishnan, AP
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Test 3 review FTP & Cybersecurity
Presentation transcript:

BY FIOLA CARVALHO TE COMP

CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat Malware Zombie  Reference  Questions

DEFINITION  Malicious software is a software that is intentionally included or inserted in a system for a harmful purpose.  Malicious software, also known as “malware,” is a nuisance, but increasingly, malicious software can damage data, computers, and computer networks. Examples include Trojan horses, vandalware, spyware, hoaxes, some viruses—including macro viruses—and worms.

Malicious Programs

Backdoor or Trapdoor  It is a secret entry point into a program.  It also allows those who know to access bypassing usual security procedures.  It have been commonly used by developers.  Backdoors become threats when unscrupulous programmers use them to gain unauthorized access.  It is difficult to implement operating system controls for backdoors.  It requires good s/w development & update.

Logic Bomb  It is one of oldest types of malicious software.  The logic bomb is code embedded in legitimate program.  It is activated when specified conditions met. E.g. presence/absence of some file particular date/time particular user  When triggered typically damage system, modify/delete files/disks, halt machine, etc.

Trojan Horse  It is a program or command procedure with hidden side- effects.  Trojan horse program can be used to accomplish functions indirectly. E.g. game, s/w upgrade etc.  It allows attacker to indirectly gain access that they do not have directly.  It is often used to propagate a virus/worm or install a backdoor or simply to destroy data.  Another common motivation for the Trojan horse is data destruction. The program appears to be performing a useful function (e.g., a calculator program), but it may also be quietly deleting the user’s files.

Mobile Code  It refers to program/script/macro that runs unchanged to heterogeneous collection of platforms.  It also applies to situations involving a large homogeneous collection (E.g. Microsoft Windows).  It is transmitted from remote system to local system & then executed on local system.  It often acts to inject virus, worm, or Trojan horse.  In other cases, mobile code takes advantage of vulnerabilities to perform own exploits such as unauthorized data access, root compromise.

Multiple-Threat Malware  Malware may operate in multiple ways.  Multipartite virus infects in multiple ways. E.g. multiple file types  Blended attack uses multiple methods of infection or transmission, to maximize the speed of contagion and severity of attack.  It may include multiple types of malware E.g. Nimda has worm, virus, mobile code

Zombie  It is the program which secretly takes over another networked computer.  It uses indirectly to launch attacks.  It is often used to launch distributed denial of service (DDOS) attacks.  Develops known faults in network systems.

REFERENCE Operating Systems by William Stallings ( Page no )

QUESTIONS  MAY 2011 What are different types of malicious software? How they are classified? Explain any two. ( 7 )

THANK YOU