SlideShare a Scribd company logo
1 of 14
K.M Riajul Islam
1
University of Rajshahi
Chapter-19
Malicious Software
2
Malicious Program?
3
• A Malicious Program is a set of instructions
that run on your computer and make your
system do something that an attacker wants to
do.
Taxonomy of Malicious Programs
4
Malicious
Programs
Needs host
program
Independent
Trap door Logic bombs Trojan horse Viruses Worm Zombie
Replicate
Trap Doors
• Single entry point into a program.
• Allows those who know access bypassing usual
security procedures.
• Have been commonly used by developers.
• The backdoor is code that recognizes some special
sequence of input or is triggered by being run from a
certain user ID or by an unlikely sequence of events.
• Backdoors become threats when unscrupulous
programmers use them to gain unauthorized access.
Logic Bomb
• One of oldest types of malicious software.
• Code embedded in legitimate program.
• Activated when specified conditions met.
• Presence/absence of some file.
• Particular date/time.
• Particular user.
• When triggered typically damage system.
• Modify/delete files/disks, halt machine etc.
Trojan Horse
• Program with hidden side-effects.
• Which is usually superficially attractive.
• For example, game, s/w upgrade etc.
• When run performs some additional tasks.
• Allows attacker to indirectly gain access which they do
not have directly.
• Often used to propagate a virus/worm or to
install a backdoor.
• Or simply to destroy data.
Zombie
• Program which secretly takes over another
networked computer.
• Then uses it to indirectly launch attacks.
• Often used to launch distributed denial of service
(DDoS) attacks.
• Exploits known flaws in network systems.
Virus
• A virus is a program that can infect other
programs by modifying them.
• A computer virus carries in its instructional
code the recipe for making perfect copies of
itself like biological virus.
• Lodged in a host computer, the typical virus
takes temporary control of the computer’s
disk operating system.
• Whenever the infected computer comes into
contact with an uninfected piece of
software, a fresh copy of the virus passes
into the new program.
Phases of Virus Lifetime
• The virus
is idle
and
waiting
Dormant
• The virus
places a
copy of
itself into
other
programs
Propagation
• Virus is
activated to
perform
function for
which it
was
intended
Trigger
• Virus function
is performed
Execution
Types of Virus
• Parasitic virus: Attaches itself to executable files and replicates
when the infected program is executed.
• Memory-resident virus: Resides in main memory as part of a
resident system program. This virus infects every program that
executes.
• Boot-sector virus: Infects a master boot record or boot record and
spreads when a system is booted from the disk containing virus.
• Stealth virus: A form of virus that hides itself from detection by
antivirus software.
• Polymorphic virus: A virus that mutates with every infection,
making detection by the “signature: of the virus impossible
Worms
 A worm is a program that can replicate itself
and send copies from computer to computer
across network connections but not infecting
program.
 Can run independently.
 Self replicating – usually very quickly.
 Usually performs some unwanted function.
 Actively seeks out more machines to infect.
Network Vehicles of Worms
Electronic mail facility
A worm mails a copy of itself to another
systems.
Remote execution capability
A worm executes a copy of itself on
another system remotely.
Remote login capability
Logs onto a remote system as a user and
then uses commands to copy itself from
one system to the other.
Thank You
14

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virusUtchi
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Program security
Program securityProgram security
Program securityG Prachi
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
computer software
computer softwarecomputer software
computer softwareAYUSH GARG
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer virusestheonlineguru
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand securityarun nalam
 

What's hot (20)

Virus
Virus Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Program security
Program securityProgram security
Program security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Virus
VirusVirus
Virus
 
computer software
computer softwarecomputer software
computer software
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 

Similar to Cryptography presentation

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 

Similar to Cryptography presentation (20)

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Cryptography presentation

  • 3. Malicious Program? 3 • A Malicious Program is a set of instructions that run on your computer and make your system do something that an attacker wants to do.
  • 4. Taxonomy of Malicious Programs 4 Malicious Programs Needs host program Independent Trap door Logic bombs Trojan horse Viruses Worm Zombie Replicate
  • 5. Trap Doors • Single entry point into a program. • Allows those who know access bypassing usual security procedures. • Have been commonly used by developers. • The backdoor is code that recognizes some special sequence of input or is triggered by being run from a certain user ID or by an unlikely sequence of events. • Backdoors become threats when unscrupulous programmers use them to gain unauthorized access.
  • 6. Logic Bomb • One of oldest types of malicious software. • Code embedded in legitimate program. • Activated when specified conditions met. • Presence/absence of some file. • Particular date/time. • Particular user. • When triggered typically damage system. • Modify/delete files/disks, halt machine etc.
  • 7. Trojan Horse • Program with hidden side-effects. • Which is usually superficially attractive. • For example, game, s/w upgrade etc. • When run performs some additional tasks. • Allows attacker to indirectly gain access which they do not have directly. • Often used to propagate a virus/worm or to install a backdoor. • Or simply to destroy data.
  • 8. Zombie • Program which secretly takes over another networked computer. • Then uses it to indirectly launch attacks. • Often used to launch distributed denial of service (DDoS) attacks. • Exploits known flaws in network systems.
  • 9. Virus • A virus is a program that can infect other programs by modifying them. • A computer virus carries in its instructional code the recipe for making perfect copies of itself like biological virus. • Lodged in a host computer, the typical virus takes temporary control of the computer’s disk operating system. • Whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the virus passes into the new program.
  • 10. Phases of Virus Lifetime • The virus is idle and waiting Dormant • The virus places a copy of itself into other programs Propagation • Virus is activated to perform function for which it was intended Trigger • Virus function is performed Execution
  • 11. Types of Virus • Parasitic virus: Attaches itself to executable files and replicates when the infected program is executed. • Memory-resident virus: Resides in main memory as part of a resident system program. This virus infects every program that executes. • Boot-sector virus: Infects a master boot record or boot record and spreads when a system is booted from the disk containing virus. • Stealth virus: A form of virus that hides itself from detection by antivirus software. • Polymorphic virus: A virus that mutates with every infection, making detection by the “signature: of the virus impossible
  • 12. Worms  A worm is a program that can replicate itself and send copies from computer to computer across network connections but not infecting program.  Can run independently.  Self replicating – usually very quickly.  Usually performs some unwanted function.  Actively seeks out more machines to infect.
  • 13. Network Vehicles of Worms Electronic mail facility A worm mails a copy of itself to another systems. Remote execution capability A worm executes a copy of itself on another system remotely. Remote login capability Logs onto a remote system as a user and then uses commands to copy itself from one system to the other.

Editor's Notes

  1. AA. This is SM. I welcome all of you for being here.
  2. Today my presentation topic is about Malicious Software. This is a chapter from CANSPP book written by William stallings.
  3. Now lets see the first topic …what is malicious program?
  4. A backdoor, or trapdoor, is a secret entry point into a program that allows someone that is aware of it to gain access without going through the usual security access procedures. Have been used legitimately for many years to debug and test programs, but become a threat when left in production programs, allowing intruders to gain unauthorized access. It is difficult to implement operating system controls for backdoors. Security measures must focus on the program development and software update activities.
  5. legal
  6. A Trojan horse is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.