SlideShare a Scribd company logo
1 of 29
Viruses & Application Security
Agenda
• What Is Computer Virus
• Symptoms
• How does it spread
• Types Of Viruses
• Other Programs similar to Viruses
• Application Security
• Why Application Security Is Important
• Why Often Application Security Is Ignored
• Basic Security Concepts
• Securing the Application
• Conclusion
What is a computer virus?
• Computer viruses are a type of software program that is like a
biological virus, replicate and spread without the users
knowledge
• Some virus may display only a message on the screen, others
may slow down the Pc
• They can also erase files or even format your floppy or hard
disk and crash the system
Symptoms
• Letters looks like they are falling to the bottom of the screen.
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard disk runs out of space.
• The computer does not boot.
How does it spread
• Computer viruses spread by attaching themselves to other
computer program files
• When you exchange a file from pen drive with virus into our Pc,
the virus spreads from one file to the another
• Viruses also spreads when a Computer Engineer comes to repair
your system and puts his/her diagnostics disks in your PC
Programs Effecting Computers

Computer Viruses

Malwares

Worms

Trojan horses

Spyware

Adware
Types of viruses

Resident

Direct Action

Overwrite

Boot

Macro

Directory
Polymorphic
File Infectors
Companion
Fat
Logic Bombs
Resident Virus
 A virus that takes up permanent residence in the RAM
memory. It can take over or interupt any operation executed
by the computer system. It can corrupt files and programs;
such as copy, open, close, rename and more.
 Examples: Randex, CMJ, Meve, and MrKlunky.
Direct Action Virus
 A batch file that resides in the root directory of the hard disk.
When executed it will infect files in the directory and also
directed to the batch file AUTOEXEC.BAT file PATH.
Overwrite Virus
 A virus that deletes of overwrites part or all of the information
in a file, making them partially or totally worthless. To get
rid of the virus, the file has to be deleted.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
• A virus that affects the boot sector of the hard drive or a
floppy drive. The boot sector gives the computer information
on how to boot, if it is not functioning the computer won't
boot. To avoid a boot virus, don't boot your computer with an
unknown floppy disk in your floppy drive and make sure it is
write protected.
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
 A virus written in a macro language that infects the files that
were created with it. When the file is opened the macro virus
runs automatically. This may arrive on your computer by
email attachment.
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
Directory Virus

Directory viruses will replace an existing executable and
move the real file somewhere else, so when you run it you are
unknowingly running the virus program instead of the
original. It then becomes impossible to find the original file.
Polymorphic Virus
 Viruses that encode or encrypt themselves so that each new
version is different. This enables them to replicate and very
hard for virus scanners to track down.
File Infectors
 The majority of viruses are file infectors. This virus is
activated by running an executable file like .exe or .com
extension files. Once run, the virus does its damage
according to the program in the executable file.
Companion Virus
 Once the system is infected they accompany the files that
already exist. They can lay in wait or take action
immediately.
Some examples include: Stator, Asimov.1539, and
Terrax.1069
Fat Virus
 This virus will only infect a computer running a file
allocation table (FAT) file system. This virus will prevent
access to parts of the hard drive preventing files to be
accessed Newer windows computers use NTFS and don't
need to worry about this virus.
Computers Must Exist within a
Secure Infrastructure
 Harden systems
 Use concept of least-privilege
 Patch management
 Firewalls
 Using Anti Virus Programs
 Intrusion detection
 Virus protection
Application Security
 An application is a program or group of programs designed for
end users.
 Security is the degree of resistance to, or protection from, harm.
It applies to any vulnerable and valuable asset, such as a person,
dwelling, community, nation, or organization.
 Application security is the use of software, hardware, and
procedural methods to protect applications from external and
internal threats.
Why Is Application Security
Important?
• New threats emerge every day
• Some hackers are not satisfied with penetrating your
network, they seek information that resides in your
applications/databases
• Applications are often with poor designs, software bugs,
and poor programming practices
• Applications may be a fast and have an easy entry point into
a secure network
• Applications contain and process your most critical
(important and sensitive) information
• Programming logic may be exposed to the possibility of being
attacked just as troublesome as difficulties inherent with
certain technologies
Why Is Application Security
Often Ignored?
 Usually there are time and budget constraints in application
development that cause proper testing and secure programming
training to fall to the way aside
 Security is typically not prioritized by programming teams, they
are paid to deliver functionality first and foremost
 E-commerce initiatives are often rushed into production
 Organizations often expect the software manufacturer “build in”
security is 80% process driven, 20% software driven
Four Basic Security Concepts
Poor application security measures can lead to breaches in data:
 Data Integrity
 Confidentiality
 Availability
 Accountability
Data Integrity
• Data Integrity means having a secure and reliable data in the
database
• Protection of information from tampering, forgery, or accidental
changes.
Examples:
• January 2004, there were 13,654 known attacks on Linux
Servers
Confidentiality
 Ensures that applications and data is accessible to only the users
intended and authorized to have access.
 Examples : While Login in Providing Id’s and Passwords
Availability
 Ensures that authorized users have access to the application and
the data when required.
 Example: Microsoft Developer Store
 Checking PNR Status Indian Railway Systems
Accountability Within the
Application
 Ensure accuracy of data and guide against unauthorized
modifications
 Who did what with your data?
 Examples : Having Notification To Our Mobiles From Social
Networking Sites
Securing the Application
 Authentication & Identification
 Authorization & Access Control
 Logging & Auditing Procedures
 Managing User Sessions
 Cryptography
 Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
Conclusion
Every Application must be developed in Ethical hacking
perspective
Prevent the loss, modification, or misuse of application systems
“data” or application architecture. Here we are focusing on
web-enabled systems
Making an e-commerce application secure is much harder than
just adding a password protected login screen!
Thank You

More Related Content

What's hot (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Zika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusZika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusNarayan Prahlad
 
Replication of DNA Virus Genomes
Replication of DNA Virus GenomesReplication of DNA Virus Genomes
Replication of DNA Virus GenomesYora Permata Dewi
 
Epidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteEpidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteswarnendu basak
 
Cultivation of Viruses
Cultivation of VirusesCultivation of Viruses
Cultivation of VirusesIslam Sarakbi
 
Chapter 2 classification of virus
Chapter 2 classification of virusChapter 2 classification of virus
Chapter 2 classification of virusAlia Najiha
 
Virus structure: classification: replication
Virus structure: classification: replicationVirus structure: classification: replication
Virus structure: classification: replicationMarilen Parungao
 

Viewers also liked (8)

Zika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusZika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virus
 
Replication of DNA Virus Genomes
Replication of DNA Virus GenomesReplication of DNA Virus Genomes
Replication of DNA Virus Genomes
 
Epidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteEpidemology and control of protozoan parasite
Epidemology and control of protozoan parasite
 
Cultivation of Viruses
Cultivation of VirusesCultivation of Viruses
Cultivation of Viruses
 
Chapter 2 classification of virus
Chapter 2 classification of virusChapter 2 classification of virus
Chapter 2 classification of virus
 
Zika virus
Zika virusZika virus
Zika virus
 
Virus structure: classification: replication
Virus structure: classification: replicationVirus structure: classification: replication
Virus structure: classification: replication
 
Bacteriophage vectors
Bacteriophage vectorsBacteriophage vectors
Bacteriophage vectors
 

Similar to Secure Your Apps: Understanding Application Security Risks & Best Practices

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Program security
Program securityProgram security
Program securityG Prachi
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 

Similar to Secure Your Apps: Understanding Application Security Risks & Best Practices (20)

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Program security
Program securityProgram security
Program security
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Secure Your Apps: Understanding Application Security Risks & Best Practices

  • 2. Agenda • What Is Computer Virus • Symptoms • How does it spread • Types Of Viruses • Other Programs similar to Viruses • Application Security • Why Application Security Is Important • Why Often Application Security Is Ignored • Basic Security Concepts • Securing the Application • Conclusion
  • 3. What is a computer virus? • Computer viruses are a type of software program that is like a biological virus, replicate and spread without the users knowledge • Some virus may display only a message on the screen, others may slow down the Pc • They can also erase files or even format your floppy or hard disk and crash the system
  • 4. Symptoms • Letters looks like they are falling to the bottom of the screen. • The computer system becomes slow. • The size of available free memory reduces. • The hard disk runs out of space. • The computer does not boot.
  • 5. How does it spread • Computer viruses spread by attaching themselves to other computer program files • When you exchange a file from pen drive with virus into our Pc, the virus spreads from one file to the another • Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC
  • 6. Programs Effecting Computers  Computer Viruses  Malwares  Worms  Trojan horses  Spyware  Adware
  • 7. Types of viruses  Resident  Direct Action  Overwrite  Boot  Macro  Directory Polymorphic File Infectors Companion Fat Logic Bombs
  • 8. Resident Virus  A virus that takes up permanent residence in the RAM memory. It can take over or interupt any operation executed by the computer system. It can corrupt files and programs; such as copy, open, close, rename and more.  Examples: Randex, CMJ, Meve, and MrKlunky.
  • 9. Direct Action Virus  A batch file that resides in the root directory of the hard disk. When executed it will infect files in the directory and also directed to the batch file AUTOEXEC.BAT file PATH.
  • 10. Overwrite Virus  A virus that deletes of overwrites part or all of the information in a file, making them partially or totally worthless. To get rid of the virus, the file has to be deleted. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
  • 11. Boot Virus • A virus that affects the boot sector of the hard drive or a floppy drive. The boot sector gives the computer information on how to boot, if it is not functioning the computer won't boot. To avoid a boot virus, don't boot your computer with an unknown floppy disk in your floppy drive and make sure it is write protected. Examples of boot viruses include: Polyboot.B, AntiEXE.
  • 12. Macro Virus  A virus written in a macro language that infects the files that were created with it. When the file is opened the macro virus runs automatically. This may arrive on your computer by email attachment. Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
  • 13. Directory Virus  Directory viruses will replace an existing executable and move the real file somewhere else, so when you run it you are unknowingly running the virus program instead of the original. It then becomes impossible to find the original file.
  • 14. Polymorphic Virus  Viruses that encode or encrypt themselves so that each new version is different. This enables them to replicate and very hard for virus scanners to track down.
  • 15. File Infectors  The majority of viruses are file infectors. This virus is activated by running an executable file like .exe or .com extension files. Once run, the virus does its damage according to the program in the executable file.
  • 16. Companion Virus  Once the system is infected they accompany the files that already exist. They can lay in wait or take action immediately. Some examples include: Stator, Asimov.1539, and Terrax.1069
  • 17. Fat Virus  This virus will only infect a computer running a file allocation table (FAT) file system. This virus will prevent access to parts of the hard drive preventing files to be accessed Newer windows computers use NTFS and don't need to worry about this virus.
  • 18. Computers Must Exist within a Secure Infrastructure  Harden systems  Use concept of least-privilege  Patch management  Firewalls  Using Anti Virus Programs  Intrusion detection  Virus protection
  • 19. Application Security  An application is a program or group of programs designed for end users.  Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.  Application security is the use of software, hardware, and procedural methods to protect applications from external and internal threats.
  • 20. Why Is Application Security Important? • New threats emerge every day • Some hackers are not satisfied with penetrating your network, they seek information that resides in your applications/databases • Applications are often with poor designs, software bugs, and poor programming practices • Applications may be a fast and have an easy entry point into a secure network • Applications contain and process your most critical (important and sensitive) information • Programming logic may be exposed to the possibility of being attacked just as troublesome as difficulties inherent with certain technologies
  • 21. Why Is Application Security Often Ignored?  Usually there are time and budget constraints in application development that cause proper testing and secure programming training to fall to the way aside  Security is typically not prioritized by programming teams, they are paid to deliver functionality first and foremost  E-commerce initiatives are often rushed into production  Organizations often expect the software manufacturer “build in” security is 80% process driven, 20% software driven
  • 22. Four Basic Security Concepts Poor application security measures can lead to breaches in data:  Data Integrity  Confidentiality  Availability  Accountability
  • 23. Data Integrity • Data Integrity means having a secure and reliable data in the database • Protection of information from tampering, forgery, or accidental changes. Examples: • January 2004, there were 13,654 known attacks on Linux Servers
  • 24. Confidentiality  Ensures that applications and data is accessible to only the users intended and authorized to have access.  Examples : While Login in Providing Id’s and Passwords
  • 25. Availability  Ensures that authorized users have access to the application and the data when required.  Example: Microsoft Developer Store  Checking PNR Status Indian Railway Systems
  • 26. Accountability Within the Application  Ensure accuracy of data and guide against unauthorized modifications  Who did what with your data?  Examples : Having Notification To Our Mobiles From Social Networking Sites
  • 27. Securing the Application  Authentication & Identification  Authorization & Access Control  Logging & Auditing Procedures  Managing User Sessions  Cryptography  Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
  • 28. Conclusion Every Application must be developed in Ethical hacking perspective Prevent the loss, modification, or misuse of application systems “data” or application architecture. Here we are focusing on web-enabled systems Making an e-commerce application secure is much harder than just adding a password protected login screen!