Malicious Software.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Data and Computer Communications
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Chapter 18: Computer and Network Security Threats
Lecturer: Fadwa Tlaelan
Malware Ge Zhang Karlstad Univeristy. Focus What malware are Types of malware How do they propagate How do they hide How to detect them.
Chapter 14 Computer Security Threats
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 18 “Computer and Network Security Threats”.
Data and Computer Communications
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
CSCE 522 Lecture 12 Program Security Malicious Code.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Computer Skills and Applications Computer Security.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Britanny polca Objectives: * Identify what Malicious code is * Know the categories of Malicious code * Introduce you to the parts of Malicious software.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Malicious Software.
Operating Systems Services provided on internet
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Viruses and Other Malicious Content
NET 311 Information Security
Computer Applications Unit B
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Viruses and Virus Protection
Chap 10 Malicious Software.
Test 3 review FTP & Cybersecurity
Presentation transcript:

Malicious Software

Index Introduction Terminologies Categories Backdoors Logic Bomb Trojan Horse Nimda attack Important questions

Introduction Malicious software also known commonly as malware refers to a more sophisticated type of threat to the computer system which are presented by programs that exploit vulnerabilities in computing systems.

More about Malware Malware is a software designed to cause damage to or use up the resources of a target computer It is concealed within or masquerades as legitimate software In some cases it spreads itself via email or infected floppy disks

Terminologies Virus: malware that when executed tries to replicate itself into another executable code , this code is said to be infected .when the infected code is executed the virus also executes. Worm: a program that can run independently and propagate a working version of itself onto other hosts.

Mobile code: software that can be shipped to a collection of platforms and execute with identical semantics. Auto-rooter: malicious hacker tools used to break into new machines remotely. Kit : set of tools to generate virus automatically. Spammer programs : used to send large volumes of unwanted emails. Flooder : used to attack networked computer with a large volume of traffic to carry out a denial of service attack.

Root kit : set of tools used after attacker has broken into a system and gained root level control. Zombie ,bot :program activated on infected machine that is further activated to launch attacks on other machines. Spyware : software that collects information from a computer and transmits it into another system. Adware : advertising that is integrated into software that can result in pop ups or redirection of a browser onto a commercial site.

Needs a host Categories Of Malware Independent Referred to as parasitic Essential fragments of programs which cannot exists independently Ex viruses ,logic bombs ,back doors Needs a host Self contained programs that can be run on the o.s Ex worms , bot programs Independent

..Also classified into Activated by a trigger Ex logic bombs ,back doors , bot programs Do not replicate When executed may produce one or more copies of itself and can be activated on same systems Ex viruses and worms Do replicate

Backdoors It is a secret entry point into a program that allows to gain access without going through usual security procedures . It is a threat when unscrupulous programmers use them for unauthorized access. Programmers use backdoors legitimately to debug and test programs such a backdoor is called maintenance hook .This is usually done when programmers develop application that has an authorization procedure in it. To secure the backdoor the security measures should focus on the program development and software update activities.

Logic Bombs This is one of the oldest type of program threat . Logic bomb is basically a program embedded into a software by an intruder ,which lies dormant until a predefined condition is met after which the program then triggers an unauthorized act.

Trojan horse It is a program or a command procedure containing a hidden code that when invoked performs some unwanted or harmful function. Trojan horse can be used to change the file permission for the file to be shared within many users. It can be also used for destroying the file when it seems to be doing a particular task.

Nimda Attack Referred to as a simple worm , it uses four distribution methods which are as follows: Email: a user on a host opens an infected email attachment , nimda looks for email addresses on the host and sends copies of itself to these addresses. Windows shares : it scans hosts for unsecured file shares and infects the files on that host , so as when a user runs an infected file , which will activate nimda on that host.

Web Servers : Nimda scans web serves and if it finds a vulnerable server ,it attempts to transfer a copy of itself and infect it. Web Clients : if a vulnerable web client visits a web server that has been infected by Nimda the workstation of the web client will become infected.

Important Questions What is malicious software ? What are the categories of malicious software? Define : virus , worm , bot programs ,mobile code ,flooder , root kit , spyware , adware. Write short notes on backdoors , logic bomb , trojan horse. Explain in detail nimda attack.

The end Thank You  Referred from operating systems internals and design principles by William Stallings(sixth edition) Page no.(647-651) -By Rusha Lawande 411127