Download presentation
Presentation is loading. Please wait.
Published byDouglas Norman Modified over 9 years ago
1
CIS 442: Chapter 2 Viruses
2
Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware
3
Operating systems tasks Booting and resetting Managing volumes and files Managing executable programs and processes Managing memory Handling interrupts
4
Viruses Definition and history Viruses for mainframe and PCs Propagation or infection Payload or damage Trigger Replication Virus polymorphism
5
Virus writers Reasons for writing, using or distributing viruses General profile
6
Virus propagation From file to file and from computer to another. Looking for executable, and similar files Memory resident viruses Infected software, email attachement
7
Macro viruses Differences from typical viruses Document files
8
Virus classification methods By Infection By Damage By trigger By Platform
9
Classification File infector viruses Shell viruses Non-overwriting viruses Overwriting viruses Intrusive viruses Boot sector viruses Multipartitie viruses
10
Memory resident viruses BSI Boot sector viruses Differences between BSI and file infectors Bootstrap loader and virus hiding methods
11
File infector viruses infection methods Shell viruses Overwriting Non-overwriting Intrusive File attributes: Size, CRC(hash), MAC, code inside, access permissions
12
Companion-multipartitie Viruses File association DOS execution sequence (com, bat, exe). Multi-File infector and BSI viruses: advantages and challenges
14
Macro and Script Viruses Macros programs, examples Examples and characteristics of Macro Viruses Protection against Macro viruses.
15
Infected images and acrobat Buffer overflow problems
16
Virus life cycle Signature Infection Damage Trigger or Activation: Bombs
17
Virus Payloads Types and levels of payloads
18
Virus organization Infection marker Infector Trigger check Manipulation
19
Virus naming Based on type Based on creator Macro viruses Based on environment
20
Virus hiding methods Hiding methods Stealth techniques
21
Interrupts and viruses Relation between interrupts and viruses – trigger and activation Trapdoors
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.