SlideShare a Scribd company logo
1 of 17
Delibrate
Software attacks
Mrs.G.Chandraprabha.,M.Sc.,M.Phil.,
Assistant Professor
Department of Information Technology,
V.V.Vanniaperumal College for Women,
Virudhunagar.
Objectives
Malware
Virus
Worms
Trojan Horses
Polymorphic Threats
Virus and Worm Hoaxes
Back Doors
Denial-of-Service(DOS)
Distributed Denial-of –Service(DDOS)
Man in the Middle
2
Deliberate software attacks
 Deliberate software attacks occur when an
individual or group designs and deploys software to
attack a system.
 This attack an consist of specially crafted software
that attackers trick users into installing on their
systems.
 This software is used to overwhelm the processing
capabilities of online system or to gain access to
protected systems by hidden .
3
Malware
“Malware is reffered to
as Malicious Code or
Malicious Software”.
“ Malicious Software
programs are designed
to damage, destroy”.
4
Types of Malware
5
Virus
✘ A computer virus consists of code segments that
perform malicious actions.
✘ The virus controlled targeted program carries a
virus plan by replicating itself into additional
targeted systems.
✘ The current software such as Symantec Norton
AntiVirus, Kaspersky AntiVirus, AVG
AntiVirus and McAfee VirusScan.
6
Virus
✘ The Macro Virus, which is embedded in
automatically executing macro code used by
word processors, spreadsheets.
✘ The Boot Virus, which infects the key
operating system files in a computer’s boot
sector.
✘ Viruses are classified as Memory-resident
viruses or Non-memory-resident viruses.
7
8
Worms
 Worms can continue replicating themselves
until they completely fill available resources,
Such as memory, hard drive space, and
network bandwidth.
 Code Red, Sircam, Nimda and KleZ are
examples of class of worms. E-mail contains
the Nimda and Sircam worms.
 The KleZ worm delivers a double-barreled
payload that contain the worm to deliver a
macro virus.
Trojan Horses
Trojan Horses are
frequently desguised as
helpful, interesting, or pieces
of software.
Trojan Horses are brought
into a system, they become
activated and can wreak
havoc on the unsuspecting
user.
9
Polymorphic Threats
“A Polymorphic
threat actually evolves,
changing its size and
other file to elude
detection by antivirus
software programs”.
10
Virus ans Worm hoaxes
♦Virus and Worms perhaps more time and money are spent resolving
virus hoaxes.
♦A computer VIRUS is a type of computer program that, when
executed, replicates itself and insets its own code, ultimately affecting
the functioning of the computer.
♦A computer WORM is a type of malware that spread itself from
computer to computer by replicating itself without any human
interaction.
♦One of the most Prominent virus hoaxes was the 1994 “Good Times”
12
☻A back door is also an intentional access control bypass
left by a system designer to facilitate development.
☻A newly discovered access mechanism, an attacker can
gain access to a system or network resource through a back
door.
☻A back door/ Trap door component in a system,
allowing the attacker to access the system with special
privileges.
☻ Sometimes these doors are left behind by system
designers or maintenance staff such as door is referred to as
a maintenance hook.
Back Doors
13
Denial-of-Service(DOS)
An attack that attempts to overwhwlm a
computer target’s ability to handle incoming
communications, prohibiting legitimate users
from accessing those systems.
In a denial of service attack, a hacker
comprises a system and uses that system to
attack the target computer, flooding it with more
requests for service than the target can handle.
14
Distributed Denial-of-Service
♦ A DOS attack in which a coordinated stream of requests is launched
againsta target from many locations at the same time using bots or zoombies.
♦In a distributed denial-of-service attack, dozens or even hundreds of
computers are compromised, loaded with DOS attack software, and then
remotely activated by the hacker to conduct a coordinated attack
15
Man in the Middle
An attacker monitors packets from the network,
modifies them, and inserts them back into the network.
In a TCP hijacking attack, also known as Session
hijacking, the attacker uses address spoofing to
impersonate other legitimate entities on the network.
16
IS-Delibrate software attacks.pptx

More Related Content

What's hot

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsSam Bowne
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Sam Bowne
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database ThreatsImperva
 

What's hot (20)

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World Incidents
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Malicious
MaliciousMalicious
Malicious
 
Ransomware
RansomwareRansomware
Ransomware
 
Network security
Network securityNetwork security
Network security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database Threats
 

Similar to IS-Delibrate software attacks.pptx

CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptxAvinash627658
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Similar to IS-Delibrate software attacks.pptx (20)

CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Malware
MalwareMalware
Malware
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Information security
Information securityInformation security
Information security
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
virus
  virus  virus
virus
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
TIC
TICTIC
TIC
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

More from V.V.Vanniaperumal College for Women

More from V.V.Vanniaperumal College for Women (20)

Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Control Memory.pptx
 
ADDRESSING MODES.pptx
ADDRESSING MODES.pptxADDRESSING MODES.pptx
ADDRESSING MODES.pptx
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
 
Timing & Control.pptx
Timing & Control.pptxTiming & Control.pptx
Timing & Control.pptx
 
Human Rights - 1.pptx
Human Rights - 1.pptxHuman Rights - 1.pptx
Human Rights - 1.pptx
 
Registers.pptx
Registers.pptxRegisters.pptx
Registers.pptx
 
Instruction Codes.pptx
Instruction Codes.pptxInstruction Codes.pptx
Instruction Codes.pptx
 
Features of Java.pptx
Features of Java.pptxFeatures of Java.pptx
Features of Java.pptx
 
JVM.pptx
JVM.pptxJVM.pptx
JVM.pptx
 
Constructors in JAva.pptx
Constructors in JAva.pptxConstructors in JAva.pptx
Constructors in JAva.pptx
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
IS-Nature of forces.ppt
IS-Nature of forces.pptIS-Nature of forces.ppt
IS-Nature of forces.ppt
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
IS-honeypot.pptx
 
Sum of subset problem.pptx
Sum of subset problem.pptxSum of subset problem.pptx
Sum of subset problem.pptx
 
M-coloring.pptx
M-coloring.pptxM-coloring.pptx
M-coloring.pptx
 
storm.ppt
storm.pptstorm.ppt
storm.ppt
 
storm for RTA.pptx
storm for RTA.pptxstorm for RTA.pptx
storm for RTA.pptx
 
Yarn.ppt
Yarn.pptYarn.ppt
Yarn.ppt
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

IS-Delibrate software attacks.pptx

  • 1. Delibrate Software attacks Mrs.G.Chandraprabha.,M.Sc.,M.Phil., Assistant Professor Department of Information Technology, V.V.Vanniaperumal College for Women, Virudhunagar.
  • 2. Objectives Malware Virus Worms Trojan Horses Polymorphic Threats Virus and Worm Hoaxes Back Doors Denial-of-Service(DOS) Distributed Denial-of –Service(DDOS) Man in the Middle 2
  • 3. Deliberate software attacks  Deliberate software attacks occur when an individual or group designs and deploys software to attack a system.  This attack an consist of specially crafted software that attackers trick users into installing on their systems.  This software is used to overwhelm the processing capabilities of online system or to gain access to protected systems by hidden . 3
  • 4. Malware “Malware is reffered to as Malicious Code or Malicious Software”. “ Malicious Software programs are designed to damage, destroy”. 4
  • 6. Virus ✘ A computer virus consists of code segments that perform malicious actions. ✘ The virus controlled targeted program carries a virus plan by replicating itself into additional targeted systems. ✘ The current software such as Symantec Norton AntiVirus, Kaspersky AntiVirus, AVG AntiVirus and McAfee VirusScan. 6
  • 7. Virus ✘ The Macro Virus, which is embedded in automatically executing macro code used by word processors, spreadsheets. ✘ The Boot Virus, which infects the key operating system files in a computer’s boot sector. ✘ Viruses are classified as Memory-resident viruses or Non-memory-resident viruses. 7
  • 8. 8 Worms  Worms can continue replicating themselves until they completely fill available resources, Such as memory, hard drive space, and network bandwidth.  Code Red, Sircam, Nimda and KleZ are examples of class of worms. E-mail contains the Nimda and Sircam worms.  The KleZ worm delivers a double-barreled payload that contain the worm to deliver a macro virus.
  • 9. Trojan Horses Trojan Horses are frequently desguised as helpful, interesting, or pieces of software. Trojan Horses are brought into a system, they become activated and can wreak havoc on the unsuspecting user. 9
  • 10. Polymorphic Threats “A Polymorphic threat actually evolves, changing its size and other file to elude detection by antivirus software programs”. 10
  • 11.
  • 12. Virus ans Worm hoaxes ♦Virus and Worms perhaps more time and money are spent resolving virus hoaxes. ♦A computer VIRUS is a type of computer program that, when executed, replicates itself and insets its own code, ultimately affecting the functioning of the computer. ♦A computer WORM is a type of malware that spread itself from computer to computer by replicating itself without any human interaction. ♦One of the most Prominent virus hoaxes was the 1994 “Good Times” 12
  • 13. ☻A back door is also an intentional access control bypass left by a system designer to facilitate development. ☻A newly discovered access mechanism, an attacker can gain access to a system or network resource through a back door. ☻A back door/ Trap door component in a system, allowing the attacker to access the system with special privileges. ☻ Sometimes these doors are left behind by system designers or maintenance staff such as door is referred to as a maintenance hook. Back Doors 13
  • 14. Denial-of-Service(DOS) An attack that attempts to overwhwlm a computer target’s ability to handle incoming communications, prohibiting legitimate users from accessing those systems. In a denial of service attack, a hacker comprises a system and uses that system to attack the target computer, flooding it with more requests for service than the target can handle. 14
  • 15. Distributed Denial-of-Service ♦ A DOS attack in which a coordinated stream of requests is launched againsta target from many locations at the same time using bots or zoombies. ♦In a distributed denial-of-service attack, dozens or even hundreds of computers are compromised, loaded with DOS attack software, and then remotely activated by the hacker to conduct a coordinated attack 15
  • 16. Man in the Middle An attacker monitors packets from the network, modifies them, and inserts them back into the network. In a TCP hijacking attack, also known as Session hijacking, the attacker uses address spoofing to impersonate other legitimate entities on the network. 16