SlideShare a Scribd company logo
- Reddhi Sekhar Basu(559)

PROGRAM AND SYSTEM THREATS
Trojan Horse
 A Trojan horse is a code segment that misuses
its environment.
 A Trojan, is a type of malware that
masquerades as a legitimate file or helpful
program possibly with the purpose of granting a
hacker unauthorized access to a computer.
 According to a survey conducted by
BitDefender from January to June 2009,
"Trojan-type malware is on the rise, accounting
for 83-percent of the global malware detected
in the world."
Trojan Horse
• Long search paths, such as are
common on UNIX systems,
exacerbate the Trojan horse
problem. For instance, the use of
“.” character in a search path, tells
the shell to include the current
directory in the search. So, if an
user A has “.” in his search path,
has set his current directory to
user B’s directory, and enters a
normal system command, the
command would be executed from
user B’s directory instead. The
program would run on user B’s
domain, allowing the program to
do anything that the user is
allowed to do, including deleting
files.
Popular Trojan Horses
• Netbus
• Subseven or Sub7
• Y3K Remote
Administration Tool
• Back Orifice
• Beast
• Zeus
• The Blachhole Exploit Kit
• Flashback Trojan
Login Emulator
An unsuspecting user logs in at a
terminal and notices that he has
apparently mistyped his password.
He tries again and is successful.
What has happened is that his
authentication key and password
have been stolen by the login
emulator that was left running on
the terminal by the thief. The
emulator stored away the password,
printed out a login error message,
and exited; the user was then
provided with a genuine login
prompt.
A Trojan may give a hacker remote access to a targeted
computer system. Operations that could be performed by
a hacker on a targeted computer system may include:
– Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-Service
attacks)
– Electronic Money theft
– Data Theft(e.g. retrieving passwords or credit card
information)
– Installation of software, including third-party malware
– Downloading or uploading of files on the user's computer
– Modification deletion of files
– Crashing the Computer
– Anonymizing Internet Viewing
Trapdoor
• Trap Door is a type of security breach where the
designer of a program or a system leaves a hole in
the software that only he is capable of using.
• A Trap Door is a secret entry point into a program
that allows someone to gain access without normal
methods of access authentication.
Example of a trapdoor
Programmers have been arrested for
embezzling from banks by including rounding
errors in heir code, and having the occasional
half cents credited to their accounts. This
account crediting can add up to a large sum of
money, considering the number of
transactions that a large bank executes.
Trapdoors
• Trapdoors can be included in the compiler as
well. The compiler could generate standard
object code as well as a trapdoor, regardless of
the source code being compiled.
• Trapdoors pose a difficult problem since to
detect them we have to analyze all the source
code for all components of a system.
Stack and Buffer Overflow
• Stack or buffer overflow is the
most common way for an attacker
outside of the system, on a
network or dial-up connection to
gain unauthorized access to the
target system. This be used by the
unauthorised user for privilege
escalation.
• Buffer overflow attacks are
especially pernicious as it can be
run within a system and travel
over allowed communications
channels. They can even bypass
the security added by firewalls.
• The attacker exploits a bug in the program. The bug can
be a simple case of poor programming, in which the
programmer neglected to code bounds checking on an
input field. In this case, the attacker sends more data
than the program was expecting. Using trial and error,
or by examination of the source code of the attacked
program if it is available, the attacker determines the
vulnerability and writes a program to do the following:
1. Overflow an input field, command line argument, of
input buffer until it writes into the stack.
2. Overwrite the current return address on the stack
with the address of the exploit code loaded in the next
step.
3. Write a simple setoff code for the next space in the
stack that includes the commands that the attacker
wishes to execute (e.g. spawn a shell)
Worm
• A worm is a process that uses the
spawn mechanism to clobber system
performance.
• The worm spawns copies of itself,
using up system resources and
perhaps locking out system use by all
other processes.
Worms Spread
 independently of human action
 usually by utilizing a security hole in a piece
of software
 by scanning a network for another machine that has
a specific security hole and copies itself to the new
machine using the security hole
Morris Worm
• Robert Tappan Morris is an
American computer scientist,
best known for creating the
Morris Worm in 1988,
considered the first
computer worm on Internet
- and subsequently
becoming the first person
convicted under Computer
Fraud and Abuse Act.
Morris Worm

Disk containing the source code for the Morris
Worm held at the Boston Museum of Science
Working of the Morris Worm
Morris Worm
 Once in place, the main program undertook systematic attempts to
discover user passwords. This happened in 3 stages:
1. Trying simple cases of no passwords or passwords
constructed of account user name combinations.
2. Using comparisons with an internal dictionary of 432
password choices.
3. Trying each word in the online UNIX dictionary
This elaborate and efficient 3-stage password cracking algorithm
enabled the worm to gain further access to other user accounts on
the infected system.
 With each new access the worm searched for already active copies
of itself. If it found one the new copy exited except for every
seventh instance.
Computer Viruses
A virus is a fragment of code embedded in a
legitimate program unlike a worm which is
structured as a complete, standalone
program.
Spread of Viruses
• Viruses are spread by users
downloading viral programs
from public bulletin boards
or exchanging disks
containing an infection.
• Exchange of Microsoft
Office documents are a
common form of virus
transmission these days
because these documents
contain so-called macros
which are Visual Basic
programs.
Classification of Viruses
NON-RESIDENT VIRUSES
• Non-resident viruses can be
thought of as consisting of a
finder module and a
replication module. The
finder module is responsible
for finding new files to
infect. For each new
executable file the finder
module encounters, it calls
the replication module to
infect that file.

RESIDENT VIRUSES
• The virus loads the
replication module into
memory when it is executed
instead and ensures that
this module is executed
each time the operating
system is called to perform
a certain operation.
Classification (contd.)
POLYMORPHIC VIRUS
• Change virus’s signature
each time.
• It’s designed to avoid
detection by antivirus
software.
• It acts like a chameleon.

STEALTH VIRUS
• It use some tactics to avoid
detection such as altering
its file size, concealing itself
in memory, and Modifies
parts of the system that can
be used to detect it.
Creeper Virus
The Creeper virus was first
detected on ARPANET. Creeper
was an experimental selfreplicating program written by
Bob
Thomas
at
BBN
Technologies in 1971. Creeper
used the ARPANET to infect
DEC
PDP-10
computers
running the TENEX operating
system. Creeper gained access
via the ARPANET and copied
itself to the remote system
where the message, "I'm the
creeper, catch me if you can!"
was displayed. The Reaper
program was created to delete
Creeper.
Michelangelo Virus
On March 6, 1992, the 517th
birthday of Michelangelo,
the Michelangelo virus was
scheduled to erase infected
hard disk files. But because
of the extensive popularity
surrounding the virus, most
sites had detected and
destroyed the virus before it
was activated, so it caused
little or no damage.
Love Bug Virus
• In 2000, the Love Bug
became very widespread. It
appeared to be a love note
sent by the friend of the
receiver. Once invoked, by
opening the Virtual Basic
script, it propagated by
sending itself to the first
users in user’s email contact
list. It just clogged user’s
inbox and email systems, but
was relatively harmless.
Protection against Viruses
• The problem of viruses can be dealt with by using
antivirus software. They work by searching all the
programs on a system for the specific pattern of
instructions known to make up a virus. When
they find a known pattern, they remove the
instructions, disinfecting the program.
• The best protection against virus is the method of
safe computing : purchasing unopened software
from vendor and avoiding free or pirated copies
from public sources or disk exchange.
Worms v/s Viruses
WORMS
 rely little or not at all on
humans to spread

VIRUSES
 dependent upon a host file

 spread across a network

 need the help of humans to
spread

 spread rapidly

 take a while to spread
Denial of Service
 Denial of service does not involve stealing of
resources or gaining information, but rather
disabling legitimate use of a system or facilty.
 It is easier than breaking into a machine.
 They are network based.
 They fall into 2 categories:
1. An attack that uses so many facility
resources that, in essence, no work can be done.

2. An attack that disrupts the network
facility of the computer.
 It is impossible to prevent Denial of Service
attacks. Frequently it is difficult to determine if a
system slowdown is due to surge in use or an attack.
ANY QUESTIONS ?

More Related Content

What's hot

Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
Vamsee Krishna Kiran
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Rootkits
RootkitsRootkits
Program security
Program securityProgram security
Program security
G Prachi
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)
SURBHI SAROHA
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Education
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
LearningwithRayYT
 

What's hot (20)

Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Rootkits
RootkitsRootkits
Rootkits
 
Program security
Program securityProgram security
Program security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)Confidentiality policies UNIT 2 (CSS)
Confidentiality policies UNIT 2 (CSS)
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Spyware
SpywareSpyware
Spyware
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Malicious
MaliciousMalicious
Malicious
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
 

Viewers also liked

Treatment sheet
Treatment sheetTreatment sheet
Treatment sheet
Adam Skinner
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
National parks of india
National parks of indiaNational parks of india
National parks of india
Gaurav Mishra
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11BarrBoy
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
Wayne Jones Jnr
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
amiable_indian
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (17)

Treatment sheet
Treatment sheetTreatment sheet
Treatment sheet
 
system Security
system Security system Security
system Security
 
National parks of india
National parks of indiaNational parks of india
National parks of india
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Operating system security
Operating system securityOperating system security
Operating system security
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Enabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using VirtualizationEnabling Worm and Malware Investigation Using Virtualization
Enabling Worm and Malware Investigation Using Virtualization
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Program and System Threats

Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
Jose Manuel Acosta
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
SusmitaSaha812194
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 

Similar to Program and System Threats (20)

Mitppt
MitpptMitppt
Mitppt
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Presentation2
Presentation2Presentation2
Presentation2
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Unit 7
Unit 7Unit 7
Unit 7
 

More from Reddhi Basu

Exception Handling
Exception HandlingException Handling
Exception Handling
Reddhi Basu
 
Software Engineering - Software Models
Software Engineering - Software ModelsSoftware Engineering - Software Models
Software Engineering - Software Models
Reddhi Basu
 
Storage Class Specifiers in C++
Storage Class Specifiers in C++Storage Class Specifiers in C++
Storage Class Specifiers in C++
Reddhi Basu
 
Storage Class Specifiers
Storage Class SpecifiersStorage Class Specifiers
Storage Class Specifiers
Reddhi Basu
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 

More from Reddhi Basu (6)

Exception Handling
Exception HandlingException Handling
Exception Handling
 
Software Engineering - Software Models
Software Engineering - Software ModelsSoftware Engineering - Software Models
Software Engineering - Software Models
 
Storage Class Specifiers in C++
Storage Class Specifiers in C++Storage Class Specifiers in C++
Storage Class Specifiers in C++
 
Storage Class Specifiers
Storage Class SpecifiersStorage Class Specifiers
Storage Class Specifiers
 
Big Data
Big DataBig Data
Big Data
 
System Security
System SecuritySystem Security
System Security
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Program and System Threats

  • 1. - Reddhi Sekhar Basu(559) PROGRAM AND SYSTEM THREATS
  • 2.
  • 3. Trojan Horse  A Trojan horse is a code segment that misuses its environment.  A Trojan, is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer.  According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world."
  • 4. Trojan Horse • Long search paths, such as are common on UNIX systems, exacerbate the Trojan horse problem. For instance, the use of “.” character in a search path, tells the shell to include the current directory in the search. So, if an user A has “.” in his search path, has set his current directory to user B’s directory, and enters a normal system command, the command would be executed from user B’s directory instead. The program would run on user B’s domain, allowing the program to do anything that the user is allowed to do, including deleting files.
  • 5. Popular Trojan Horses • Netbus • Subseven or Sub7 • Y3K Remote Administration Tool • Back Orifice • Beast • Zeus • The Blachhole Exploit Kit • Flashback Trojan
  • 6. Login Emulator An unsuspecting user logs in at a terminal and notices that he has apparently mistyped his password. He tries again and is successful. What has happened is that his authentication key and password have been stolen by the login emulator that was left running on the terminal by the thief. The emulator stored away the password, printed out a login error message, and exited; the user was then provided with a genuine login prompt.
  • 7. A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: – Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-Service attacks) – Electronic Money theft – Data Theft(e.g. retrieving passwords or credit card information) – Installation of software, including third-party malware – Downloading or uploading of files on the user's computer – Modification deletion of files – Crashing the Computer – Anonymizing Internet Viewing
  • 8.
  • 9. Trapdoor • Trap Door is a type of security breach where the designer of a program or a system leaves a hole in the software that only he is capable of using. • A Trap Door is a secret entry point into a program that allows someone to gain access without normal methods of access authentication.
  • 10. Example of a trapdoor Programmers have been arrested for embezzling from banks by including rounding errors in heir code, and having the occasional half cents credited to their accounts. This account crediting can add up to a large sum of money, considering the number of transactions that a large bank executes.
  • 11. Trapdoors • Trapdoors can be included in the compiler as well. The compiler could generate standard object code as well as a trapdoor, regardless of the source code being compiled. • Trapdoors pose a difficult problem since to detect them we have to analyze all the source code for all components of a system.
  • 12.
  • 13. Stack and Buffer Overflow • Stack or buffer overflow is the most common way for an attacker outside of the system, on a network or dial-up connection to gain unauthorized access to the target system. This be used by the unauthorised user for privilege escalation. • Buffer overflow attacks are especially pernicious as it can be run within a system and travel over allowed communications channels. They can even bypass the security added by firewalls.
  • 14. • The attacker exploits a bug in the program. The bug can be a simple case of poor programming, in which the programmer neglected to code bounds checking on an input field. In this case, the attacker sends more data than the program was expecting. Using trial and error, or by examination of the source code of the attacked program if it is available, the attacker determines the vulnerability and writes a program to do the following: 1. Overflow an input field, command line argument, of input buffer until it writes into the stack. 2. Overwrite the current return address on the stack with the address of the exploit code loaded in the next step. 3. Write a simple setoff code for the next space in the stack that includes the commands that the attacker wishes to execute (e.g. spawn a shell)
  • 15.
  • 16. Worm • A worm is a process that uses the spawn mechanism to clobber system performance. • The worm spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.
  • 17. Worms Spread  independently of human action  usually by utilizing a security hole in a piece of software  by scanning a network for another machine that has a specific security hole and copies itself to the new machine using the security hole
  • 18. Morris Worm • Robert Tappan Morris is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on Internet - and subsequently becoming the first person convicted under Computer Fraud and Abuse Act.
  • 19. Morris Worm Disk containing the source code for the Morris Worm held at the Boston Museum of Science
  • 20. Working of the Morris Worm
  • 21. Morris Worm  Once in place, the main program undertook systematic attempts to discover user passwords. This happened in 3 stages: 1. Trying simple cases of no passwords or passwords constructed of account user name combinations. 2. Using comparisons with an internal dictionary of 432 password choices. 3. Trying each word in the online UNIX dictionary This elaborate and efficient 3-stage password cracking algorithm enabled the worm to gain further access to other user accounts on the infected system.  With each new access the worm searched for already active copies of itself. If it found one the new copy exited except for every seventh instance.
  • 22.
  • 23. Computer Viruses A virus is a fragment of code embedded in a legitimate program unlike a worm which is structured as a complete, standalone program.
  • 24. Spread of Viruses • Viruses are spread by users downloading viral programs from public bulletin boards or exchanging disks containing an infection. • Exchange of Microsoft Office documents are a common form of virus transmission these days because these documents contain so-called macros which are Visual Basic programs.
  • 25. Classification of Viruses NON-RESIDENT VIRUSES • Non-resident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. RESIDENT VIRUSES • The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation.
  • 26. Classification (contd.) POLYMORPHIC VIRUS • Change virus’s signature each time. • It’s designed to avoid detection by antivirus software. • It acts like a chameleon. STEALTH VIRUS • It use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it.
  • 27. Creeper Virus The Creeper virus was first detected on ARPANET. Creeper was an experimental selfreplicating program written by Bob Thomas at BBN Technologies in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
  • 28. Michelangelo Virus On March 6, 1992, the 517th birthday of Michelangelo, the Michelangelo virus was scheduled to erase infected hard disk files. But because of the extensive popularity surrounding the virus, most sites had detected and destroyed the virus before it was activated, so it caused little or no damage.
  • 29. Love Bug Virus • In 2000, the Love Bug became very widespread. It appeared to be a love note sent by the friend of the receiver. Once invoked, by opening the Virtual Basic script, it propagated by sending itself to the first users in user’s email contact list. It just clogged user’s inbox and email systems, but was relatively harmless.
  • 30. Protection against Viruses • The problem of viruses can be dealt with by using antivirus software. They work by searching all the programs on a system for the specific pattern of instructions known to make up a virus. When they find a known pattern, they remove the instructions, disinfecting the program. • The best protection against virus is the method of safe computing : purchasing unopened software from vendor and avoiding free or pirated copies from public sources or disk exchange.
  • 31.
  • 32. Worms v/s Viruses WORMS  rely little or not at all on humans to spread VIRUSES  dependent upon a host file  spread across a network  need the help of humans to spread  spread rapidly  take a while to spread
  • 33.
  • 34. Denial of Service  Denial of service does not involve stealing of resources or gaining information, but rather disabling legitimate use of a system or facilty.  It is easier than breaking into a machine.  They are network based.  They fall into 2 categories: 1. An attack that uses so many facility resources that, in essence, no work can be done.  2. An attack that disrupts the network facility of the computer.  It is impossible to prevent Denial of Service attacks. Frequently it is difficult to determine if a system slowdown is due to surge in use or an attack.