Malicious Software Network security Master:Mr jangjou

Slides:



Advertisements
Similar presentations
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Security+ Guide to Network Security Fundamentals, Third Edition
Chapter 14 Computer Security Threats
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Malware Fundamentals POLITEHNICA University of Bucharest 14 th of January 2015 Ionuţ – Daniel BARBU.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Business Technology Applications What is Malware.
1 3 Computing System Fundamentals 3.7 Utility Software.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
CHAPTER 3 Securing your PC and LAN Suraya Alias. Securing your desktop or Notebook Computer ◦Know an access control ◦Limit use of the administrator accounts.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
bitdefender virus protection
Computer safety Filip Hruby.
THIS IS A POWERPOINT PRESENTATION FOR THE TOPIC VIRUS SUBMITTED BY : ROHIT SHRESHTHA UNDER THE GUIDANCE OF MY FACULTY Mr. DATTATREYA JOSHI.
Viruses & Destructive Programs
MALWARE.
LECTURE 6 MALICIOUS SOFTWARE
What they are and how to protect against them
Tonga Institute of Higher Education IT 141: Information Systems
Three Things About Malware
3.6 Fundamentals of cyber security
Presentation on Computer Virus
Lecture 8. Cyber Security, Ethics and Trust
Malware aka- malicious software By: Ken Fogel
COMPUTER VIRUSES Computer Technology.
SEMINAR ON PC SECURITY FROM VIRUSES
Viruses and Other Malicious Content
BINF 711 Amr El Mougy Sherif Ismail
Fix to Quick Heal Update Error 1002 Call
Computer Technology Notes 5
Computer Applications Unit B
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
CompTIA Security+ Study Guide (SY0-501)
Chap 10 Malicious Software.
مرکز فناوری اطلاعات دانشگاه رازی
Malware CJ
Lab 7 – Defeating MALWARE
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Malicious Program and Protection
Presentation transcript:

Malicious Software Network security Master:Mr jangjou Presented by:Mohsen Najafi November 2011

Malware Propagation Concealment Virus Warm Trojans Root kit

Malware Types Root Kit Virus ADMIN Logic bomb Zombie Backdoor Warm Keylogger Spyware Trojan Virus

Root Kit ADMIN Power Privileged Access Least powerful Monitoring Open source and integrate with other malware Help to Trojan Attack with Kernel or User mode ADMIN Power

Logic bomb Behave like physical bomb Manual and Automatic Remove information in database

Warm Very Fast Spread Self Executable Carriage Other malware No change system and user file Propagation in Network connections

Keylogger Kernel base API base Form Grabbing base

Spyware Hidden form No self replicate Like adware A long with other software

Backdoor Remote Access Install with Worms Bypassing security

Zombie Connected to internet Under remote directions Active with spam Spammers controls Active with spam

Trojan Steal informations Low performance system Change configuration Crashing the computer Low performance system Install and work hiddenly

Viruses Boot sector File infector Macro virus Encrypted virus Stealth virus Polymorphic Metamorphic Oligomorphic

Symptoms of Malware System Crach always have Poor System Performance Your system has less available memory than it should Unusual messages or displays on your monitor Settings have changed and I can't change them back to the way they were Some of your files become corrupted or suddenly don't work properly

Antivirus How to work How to choose (Full of Free) (File server) (30% faster) (Multi core) (Wi-Fi network) (P2P file sharing) (Heuristic & Rootkit) (Script and warm) (Personal data & update) (Virus removal)