SlideShare a Scribd company logo
K.M Riajul Islam
1
University of Rajshahi
Chapter-19
Malicious Software
2
Malicious Program?
3
• A Malicious Program is a set of instructions
that run on your computer and make your
system do something that an attacker wants to
do.
Taxonomy of Malicious Programs
4
Malicious
Programs
Needs host
program
Independent
Trap door Logic bombs Trojan horse Viruses Worm Zombie
Replicate
Trap Doors
• Single entry point into a program.
• Allows those who know access bypassing usual
security procedures.
• Have been commonly used by developers.
• The backdoor is code that recognizes some special
sequence of input or is triggered by being run from a
certain user ID or by an unlikely sequence of events.
• Backdoors become threats when unscrupulous
programmers use them to gain unauthorized access.
Logic Bomb
• One of oldest types of malicious software.
• Code embedded in legitimate program.
• Activated when specified conditions met.
• Presence/absence of some file.
• Particular date/time.
• Particular user.
• When triggered typically damage system.
• Modify/delete files/disks, halt machine etc.
Trojan Horse
• Program with hidden side-effects.
• Which is usually superficially attractive.
• For example, game, s/w upgrade etc.
• When run performs some additional tasks.
• Allows attacker to indirectly gain access which they do
not have directly.
• Often used to propagate a virus/worm or to
install a backdoor.
• Or simply to destroy data.
Zombie
• Program which secretly takes over another
networked computer.
• Then uses it to indirectly launch attacks.
• Often used to launch distributed denial of service
(DDoS) attacks.
• Exploits known flaws in network systems.
Virus
• A virus is a program that can infect other
programs by modifying them.
• A computer virus carries in its instructional
code the recipe for making perfect copies of
itself like biological virus.
• Lodged in a host computer, the typical virus
takes temporary control of the computer’s
disk operating system.
• Whenever the infected computer comes into
contact with an uninfected piece of
software, a fresh copy of the virus passes
into the new program.
Phases of Virus Lifetime
• The virus
is idle
and
waiting
Dormant
• The virus
places a
copy of
itself into
other
programs
Propagation
• Virus is
activated to
perform
function for
which it
was
intended
Trigger
• Virus function
is performed
Execution
Types of Virus
• Parasitic virus: Attaches itself to executable files and replicates
when the infected program is executed.
• Memory-resident virus: Resides in main memory as part of a
resident system program. This virus infects every program that
executes.
• Boot-sector virus: Infects a master boot record or boot record and
spreads when a system is booted from the disk containing virus.
• Stealth virus: A form of virus that hides itself from detection by
antivirus software.
• Polymorphic virus: A virus that mutates with every infection,
making detection by the “signature: of the virus impossible
Worms
 A worm is a program that can replicate itself
and send copies from computer to computer
across network connections but not infecting
program.
 Can run independently.
 Self replicating – usually very quickly.
 Usually performs some unwanted function.
 Actively seeks out more machines to infect.
Network Vehicles of Worms
Electronic mail facility
A worm mails a copy of itself to another
systems.
Remote execution capability
A worm executes a copy of itself on
another system remotely.
Remote login capability
Logs onto a remote system as a user and
then uses commands to copy itself from
one system to the other.
Thank You
14

More Related Content

What's hot

Virus
Virus Virus
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
Rahul Baghla
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
Ajay Sharma
 
Program security
Program securityProgram security
Program security
G Prachi
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Imran Khan
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
sitinursyafiqah
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
Priyanka Daimary
 
Virus
VirusVirus
computer software
computer softwarecomputer software
computer software
AYUSH GARG
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
theonlineguru
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
arun nalam
 

What's hot (20)

Virus
Virus Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Program security
Program securityProgram security
Program security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Virus
VirusVirus
Virus
 
computer software
computer softwarecomputer software
computer software
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 

Similar to Cryptography presentation

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Pranjal Vyas
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
diarfirstdiarfirst
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
prawinrajanIT
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
Priyatham Galisetty
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Computer virus
Computer virusComputer virus
Computer virus
vazhichal12
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
Tasif Tanzim
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
GrittyCC
 

Similar to Cryptography presentation (20)

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 

Cryptography presentation

  • 3. Malicious Program? 3 • A Malicious Program is a set of instructions that run on your computer and make your system do something that an attacker wants to do.
  • 4. Taxonomy of Malicious Programs 4 Malicious Programs Needs host program Independent Trap door Logic bombs Trojan horse Viruses Worm Zombie Replicate
  • 5. Trap Doors • Single entry point into a program. • Allows those who know access bypassing usual security procedures. • Have been commonly used by developers. • The backdoor is code that recognizes some special sequence of input or is triggered by being run from a certain user ID or by an unlikely sequence of events. • Backdoors become threats when unscrupulous programmers use them to gain unauthorized access.
  • 6. Logic Bomb • One of oldest types of malicious software. • Code embedded in legitimate program. • Activated when specified conditions met. • Presence/absence of some file. • Particular date/time. • Particular user. • When triggered typically damage system. • Modify/delete files/disks, halt machine etc.
  • 7. Trojan Horse • Program with hidden side-effects. • Which is usually superficially attractive. • For example, game, s/w upgrade etc. • When run performs some additional tasks. • Allows attacker to indirectly gain access which they do not have directly. • Often used to propagate a virus/worm or to install a backdoor. • Or simply to destroy data.
  • 8. Zombie • Program which secretly takes over another networked computer. • Then uses it to indirectly launch attacks. • Often used to launch distributed denial of service (DDoS) attacks. • Exploits known flaws in network systems.
  • 9. Virus • A virus is a program that can infect other programs by modifying them. • A computer virus carries in its instructional code the recipe for making perfect copies of itself like biological virus. • Lodged in a host computer, the typical virus takes temporary control of the computer’s disk operating system. • Whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the virus passes into the new program.
  • 10. Phases of Virus Lifetime • The virus is idle and waiting Dormant • The virus places a copy of itself into other programs Propagation • Virus is activated to perform function for which it was intended Trigger • Virus function is performed Execution
  • 11. Types of Virus • Parasitic virus: Attaches itself to executable files and replicates when the infected program is executed. • Memory-resident virus: Resides in main memory as part of a resident system program. This virus infects every program that executes. • Boot-sector virus: Infects a master boot record or boot record and spreads when a system is booted from the disk containing virus. • Stealth virus: A form of virus that hides itself from detection by antivirus software. • Polymorphic virus: A virus that mutates with every infection, making detection by the “signature: of the virus impossible
  • 12. Worms  A worm is a program that can replicate itself and send copies from computer to computer across network connections but not infecting program.  Can run independently.  Self replicating – usually very quickly.  Usually performs some unwanted function.  Actively seeks out more machines to infect.
  • 13. Network Vehicles of Worms Electronic mail facility A worm mails a copy of itself to another systems. Remote execution capability A worm executes a copy of itself on another system remotely. Remote login capability Logs onto a remote system as a user and then uses commands to copy itself from one system to the other.

Editor's Notes

  1. AA. This is SM. I welcome all of you for being here.
  2. Today my presentation topic is about Malicious Software. This is a chapter from CANSPP book written by William stallings.
  3. Now lets see the first topic …what is malicious program?
  4. A backdoor, or trapdoor, is a secret entry point into a program that allows someone that is aware of it to gain access without going through the usual security access procedures. Have been used legitimately for many years to debug and test programs, but become a threat when left in production programs, allowing intruders to gain unauthorized access. It is difficult to implement operating system controls for backdoors. Security measures must focus on the program development and software update activities.
  5. legal
  6. A Trojan horse is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.