SlideShare a Scribd company logo
1 of 21
Download to read offline
By
Pranjal Vyas
Who Am I ?
• Mozillian
• Founder of Cyberhex
• “Malicious software” designed to infiltrate a computer without the owner's informed consent.
• Malware includes:
• Computer viruses
• Worms
• Trojan horses
• Backdoors (Method of bypassing normal authentication procedures and usually installed using
Trojan horses or worms.)
• For profit (Spyware, botnets, keyloggers, ransomware, adware and dialers)
Malwares
Backdoor or Trapdoor
• secret entry point into a program
• allows those who know access bypassing usual security procedures
• have been commonly used by developers
• a threat when left in production programs allowing exploited by attackers
• very hard to block in OS
• requires good s/w development & update
Vital Information Resources Under Seize (Virus)
• A computer virus is a malicious computer program (executable file) that
can copy itself and infect a computer without permission or knowledge
of the user.
• A virus can only spread from one computer to another by:
• Sending it over a network as a file or as an email payload.
• Carrying it on a removable medium.
• Viruses need USER INTERVENTION to spread …
• Some viruses are programmed to damage the computer by damaging
programs, deleting files, or reformatting the hard disk.
• Others are not designed to do any damage, but simply replicate
themselves and perhaps make their presence known by presenting text,
video, or audio messages.
Terms used in Virus
• Infection mechanism: The means by which a virus
spreads, enabling it to replicate. The mechanism is also
referred to as the infection vector.
• Trigger: The event or condition that determines when
the payload is activated or delivered.
• Payload: What the virus does, besides spreading. The
payload may involve damage or may involve benign but
noticeable activity.
Phase of Virus
• Dormant phase: The virus is idle. The virus will
eventually be activated by some event, such as a date,
the presence of another program or file, or the capacity
of the disk exceeding some limit. Not all viruses have
this stage.
• Propagation phase: The virus places a copy of itself into
other programs or into certain system areas on the disk.
The copy may not be identical to the propagating
version; viruses often morph to evade detection. Each
infected program will now contain a clone of the virus,
which will itself enter a propagation phase.
Phase of Virus(cont.)
• Triggering phase: The virus is activated to perform the
function for which it was intended. As with the dormant
phase, the triggering phase can be caused by a variety
of system events, including a count of the number of
times that this copy of the virus has made copies of
itself.
• Execution phase: The function is performed. The
function may be harmless, such as a message on the
screen, or damaging, such as the destruction of
programs and data files.
Types of viruses
▪ boot sector
virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks
(some infect the boot sector of the hard disk instead of the MBR).
▪ file infector
virus that usually infects memory and executable files, Once they are in system they remain for a
long time.
▪ macro virus
virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be
performed automatically when the application is started or something else triggers it. Macro
viruses tend to be surprising but relatively harmless.
▪ encrypted virus
virus using encryption to hide itself from virus scanners. That is, the encrypted virus jumbles up its
program code to make it difficult to detect. An encrypted virus's code begins with a decryption
algorithm and continues with scrambled or encrypted code for the remainder of the virus.
Types of viruses(cont.)
▪ stealth virus
virus that uses various mechanisms to avoid detection by antivirus software
▪ polymorphic virus
virus which is able to modify itself and making clone of it
▪ metamorphic virus
virus that can transform based on the ability to translate, edit and rewrite its own code. It is
considered the most infectious computer virus, and it can do serious damage to a system if it isn't
detected quickly.
Viruses
• alcon
• brain
• creeper
Worms
• replicating program that propagates over net
==>using email, remote exec, remote login
• has phases like a virus
• may disguise itself as a system process
• implemented by Xerox Palo Alto labs in 1980’s
SQL slammer Worm
• In January 2001, the SQL Slammer Worm slowed down global
Internet traffic as a result of DoS.
• The worm exploited a buffer overflow bug in Microsoft's SQL Server.
Worms
• hybris
• dabber
• brontok
Trojans
• A Trojan is a program that appears, to the user, to perform a
desirable function but, in fact, facilitates unauthorized access
to the user's computer system.
• Trojans may appear to be useful or interesting programs, or at
the very least harmless to an unsuspecting user, but are
actually harmful when executed.
• Trojans are not self-replicating which distinguishes them from
viruses and worms.
Trojans
• Code red
• Backdoor.acidoor
• Adware.arcadewe!gen
Thank you
vyaspranjal33
vyas_pranjal
vyaspranjal33@outlook.com
pranjalvyas96

More Related Content

What's hot (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Anti virus
Anti virusAnti virus
Anti virus
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Malware
MalwareMalware
Malware
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 

Similar to Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet

Similar to Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet (20)

Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Malicious
MaliciousMalicious
Malicious
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
anti_virus
anti_virusanti_virus
anti_virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
information about virus
information about virusinformation about virus
information about virus
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet

  • 2. Who Am I ? • Mozillian • Founder of Cyberhex
  • 3.
  • 4. • “Malicious software” designed to infiltrate a computer without the owner's informed consent. • Malware includes: • Computer viruses • Worms • Trojan horses • Backdoors (Method of bypassing normal authentication procedures and usually installed using Trojan horses or worms.) • For profit (Spyware, botnets, keyloggers, ransomware, adware and dialers) Malwares
  • 5. Backdoor or Trapdoor • secret entry point into a program • allows those who know access bypassing usual security procedures • have been commonly used by developers • a threat when left in production programs allowing exploited by attackers • very hard to block in OS • requires good s/w development & update
  • 6.
  • 7. Vital Information Resources Under Seize (Virus) • A computer virus is a malicious computer program (executable file) that can copy itself and infect a computer without permission or knowledge of the user. • A virus can only spread from one computer to another by: • Sending it over a network as a file or as an email payload. • Carrying it on a removable medium. • Viruses need USER INTERVENTION to spread … • Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. • Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages.
  • 8. Terms used in Virus • Infection mechanism: The means by which a virus spreads, enabling it to replicate. The mechanism is also referred to as the infection vector. • Trigger: The event or condition that determines when the payload is activated or delivered. • Payload: What the virus does, besides spreading. The payload may involve damage or may involve benign but noticeable activity.
  • 9. Phase of Virus • Dormant phase: The virus is idle. The virus will eventually be activated by some event, such as a date, the presence of another program or file, or the capacity of the disk exceeding some limit. Not all viruses have this stage. • Propagation phase: The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version; viruses often morph to evade detection. Each infected program will now contain a clone of the virus, which will itself enter a propagation phase.
  • 10. Phase of Virus(cont.) • Triggering phase: The virus is activated to perform the function for which it was intended. As with the dormant phase, the triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself. • Execution phase: The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction of programs and data files.
  • 11. Types of viruses ▪ boot sector virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (some infect the boot sector of the hard disk instead of the MBR). ▪ file infector virus that usually infects memory and executable files, Once they are in system they remain for a long time. ▪ macro virus virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. ▪ encrypted virus virus using encryption to hide itself from virus scanners. That is, the encrypted virus jumbles up its program code to make it difficult to detect. An encrypted virus's code begins with a decryption algorithm and continues with scrambled or encrypted code for the remainder of the virus.
  • 12. Types of viruses(cont.) ▪ stealth virus virus that uses various mechanisms to avoid detection by antivirus software ▪ polymorphic virus virus which is able to modify itself and making clone of it ▪ metamorphic virus virus that can transform based on the ability to translate, edit and rewrite its own code. It is considered the most infectious computer virus, and it can do serious damage to a system if it isn't detected quickly.
  • 14.
  • 15. Worms • replicating program that propagates over net ==>using email, remote exec, remote login • has phases like a virus • may disguise itself as a system process • implemented by Xerox Palo Alto labs in 1980’s
  • 16. SQL slammer Worm • In January 2001, the SQL Slammer Worm slowed down global Internet traffic as a result of DoS. • The worm exploited a buffer overflow bug in Microsoft's SQL Server.
  • 18.
  • 19. Trojans • A Trojan is a program that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. • Trojans may appear to be useful or interesting programs, or at the very least harmless to an unsuspecting user, but are actually harmful when executed. • Trojans are not self-replicating which distinguishes them from viruses and worms.
  • 20. Trojans • Code red • Backdoor.acidoor • Adware.arcadewe!gen