Your SlideShare is downloading. ×
0
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Network security threats – malware
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Network security threats – malware

3,553

Published on

A detailed presentation about Network security threats – malware

A detailed presentation about Network security threats – malware

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,553
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
207
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. <ul><li>Network Security Threats – Malware </li></ul>
  • 2. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more free computerscience ebooks and technology advancements in computer science. Please visit.... http://free-computerscience-ebooks.blogspot.com/ http://recent-computer-technology.blogspot.com/ http://computertechnologiesebooks.blogspot.com/ Please to keep provide many eBooks and technology news for FREE. Encourage us by Clicking on the advertisement in these Blog.
  • 3. Computer security <ul><li>refers to the security of computers against intruders (e.g., hackers) and malicious software (e.g., viruses). </li></ul><ul><li>Threat - A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm . </li></ul><ul><li>Attack - An assault on system security that derives from an intelligent threat </li></ul>
  • 4. Network Security <ul><li>refers to security against attacks which are often maliciously used to consume and destroy the resources of a network. </li></ul><ul><li>also cryptographic algorithms in network protocols and network applications. </li></ul><ul><li>Types of Network Threats </li></ul><ul><ul><li>logic attacks </li></ul></ul><ul><ul><ul><li>Logic attacks are known to exploit existing software bugs and vulnerabilities with the intent of crashing a system </li></ul></ul></ul><ul><ul><li>resource attacks. </li></ul></ul><ul><ul><ul><li>Resource attacks are intended to overwhelm critical system resources such as CPU and RAM </li></ul></ul></ul>
  • 5. What is Malware? <ul><li>a contraction of &quot;malicious software&quot; </li></ul><ul><li>refers to software developed for the purpose of doing harm. </li></ul><ul><li>Malware can be classified based on how they get executed, how they spread, and/or what they do. </li></ul><ul><li>Malware is not a virus. In fact, it consists of viruses, worms, Trojan horses, adware, rootkits and many other nasty infections. </li></ul>
  • 6. Types of Malware <ul><li>Viruses </li></ul><ul><ul><li>Viruses work and spread by attaching themselves to other pieces of software such that during the execution of the program the viral code is executed. </li></ul></ul><ul><ul><li>corrupts and modifies system files on your computer to cause damage </li></ul></ul><ul><ul><li>distributed through various storage mediums such as a flash drive </li></ul></ul><ul><li>Worms </li></ul><ul><ul><li>worms are stand-alone software and does not have to attach itself to a program in your system like a computer virus </li></ul></ul><ul><ul><li>damage to the computer network by causing increased bandwidth </li></ul></ul>
  • 7. Types of Malware <ul><li>Trojan Horses </li></ul><ul><ul><li>Similar to the mythical wooden horse used by the Greeks to invade Troy. </li></ul></ul><ul><ul><li>the Trojan horse is a very deceptive program that appears harmless but is actually one of the most dangerous types of malware. </li></ul></ul><ul><ul><li>may arrive as a friendly email attachment or present itself as a useful application on a website </li></ul></ul><ul><ul><li>does not have the ability to self replicate but to deliver destructive payloads and unload viruses, worms or spyware </li></ul></ul>
  • 8. Types of Malware <ul><li>Spyware </li></ul><ul><ul><li>a sneaky program that tracks and reports your computing activity without consent. </li></ul></ul><ul><ul><li>such as browsing patterns in the more benign case or credit card numbers in more serious ones. </li></ul></ul><ul><ul><li>usually comes bundled with free software and automatically installs itself with the program you intended to use. </li></ul></ul><ul><li>Rootkits </li></ul><ul><ul><li>a single program or collection of programs designed to take complete control of a system. </li></ul></ul><ul><ul><li>gives hacker all the abilities of a system administrator from a remote location. </li></ul></ul><ul><ul><li>Often used to attack other machines, distribute spam or steal passwords. </li></ul></ul>
  • 9. Types of Malware <ul><li>Backdoor </li></ul><ul><ul><li>a piece of software that allows access to the computer system bypassing the normal authentication procedures. </li></ul></ul><ul><ul><li>on how they work and spread there are two groups, </li></ul></ul><ul><ul><ul><li>works much like a Trojan, i.e., they are manually inserted into another piece of software, executed via their host software. </li></ul></ul></ul><ul><ul><ul><li>works more like a Worm i.e., they are standalone and get executed as part of the boot process </li></ul></ul></ul><ul><li>Adware </li></ul><ul><ul><li>which is essentially add-supported software that has the ability to track your activity. </li></ul></ul>
  • 10. How To Tell If Malware Has Entered Your PC <ul><li>You start seeing an excessive amount of pop-up ads. </li></ul><ul><li>Your PC's operating system slows down significantly. </li></ul><ul><li>The amount of spam you receive in your email increases. </li></ul><ul><li>Your email account may send out messages to your contact list that you did not send. Sometimes it contains pornographic material or even a Trojan or worm. </li></ul><ul><li>The home page you have set in your browser is altered. </li></ul><ul><li>When you try to access a web page in your favorites list, another web page appears that contains advertising or content that encourages you to enter your personal information. </li></ul><ul><li>Your computer completely crashes. </li></ul><ul><li>You are unable to access your antivirus program to remove the malware. </li></ul>
  • 11. Example virus - 1 <ul><li>A Virus program to delete contents of ‘C’ drive. </li></ul><ul><li>Simple virus cant detected by any antivirus.... </li></ul><ul><ul><li>@Echo off Del C: *.* |y </li></ul></ul><ul><li>And save that as .bat not .txt and RUN IT. It will delete the content of C: drive... </li></ul>
  • 12. Example virus - 2 <ul><li>A Virus Program to Disable USB Ports. </li></ul><ul><li>to create a simple virus that disables/blocks the USB ports on the computer (PC). </li></ul><ul><li>C programming language is used to create the virus. </li></ul><ul><li>It contains the following two files, </li></ul><ul><ul><li>block_usb.c (source code) </li></ul></ul><ul><ul><li>unblock_usb.c (source code) </li></ul></ul>
  • 13. Example viruses - 3 <ul><li>Space Eater </li></ul><ul><ul><li>using C programming language </li></ul></ul><ul><ul><li>hen executed will eat up the hard disk space on the root drive of the computer on which it is run. </li></ul></ul><ul><ul><li>works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. </li></ul></ul><ul><ul><li>What type of Malware is this???? </li></ul></ul>
  • 14. Space Eater Trojan <ul><li>The algorithm of the Trojan is as follows </li></ul><ul><ul><li>1. Search for the root drive </li></ul></ul><ul><ul><li>2. Navigate to WindowsSystem32 on the root drive </li></ul></ul><ul><ul><li>3. Create the file named “ spceshot.dll ” </li></ul></ul><ul><ul><li>4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full </li></ul></ul><ul><ul><li>5. Once the drive is full, stop the process . </li></ul></ul><ul><li>not be able to clean up the hard disk space </li></ul><ul><li>because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. </li></ul><ul><li>it is often ignored by disk cleanup softwares. there is now way to recover the hard disk space unless reformatting his drive. </li></ul>
  • 15. How to compile, test and remove the damage of Space Eater? <ul><li>Testing: </li></ul><ul><ul><li>To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space. </li></ul></ul><ul><li>How to remove the Damage and free up the space? </li></ul><ul><ul><li>To remove the damage and free up the space, just type the following in the “ run ” dialog box. </li></ul></ul><ul><ul><li>%systemroot%system32 </li></ul></ul><ul><ul><li>Now search for the file “ spceshot.dll “. Just delete it and you’re done. No need to re-format the hard disk. </li></ul></ul><ul><li>NOTE: You can also change the ICON of the virus to make it look like a legitimate program. </li></ul>
  • 16. How does anti-virus software work? <ul><li>An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software. </li></ul><ul><li>Anti-virus software typically uses two different techniques to accomplish this: </li></ul><ul><ul><li>Dictionary based - Examining files to look for known viruses by means of a virus dictionary </li></ul></ul><ul><ul><li>Suspicious behavior based - Identifying suspicious behavior from any computer program which might indicate infection </li></ul></ul>
  • 17. <ul><li>Thank u </li></ul>

×