CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.1 Malicious Logic.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
Maintaining the Network. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Hot and Cold Spares  Hot spare requires.
Lecturer: Fadwa Tlaelan
Chapter 3 (Part 1) Network Security
Unit 18 Data Security 1.
Chapter 14 Computer Security Threats
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
COMPUTER VIRUSES By Gobetti Andrea & Salvestrini Luca.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Structure Classifications &
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Malware.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
For any query mail to or BITS Pilani Lecture # 1.
Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Chapter Objectives In this chapter, you will learn:
War between Good and Evil.
Viruses and Other Malicious Content
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
مرکز فناوری اطلاعات دانشگاه رازی
Malicious Software Network security Master:Mr jangjou
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Malicious Program and Protection
Chapter 9 Intruders and Viruses.
Presentation transcript:

CIS 442: Chapter 2 Viruses

Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware

Operating systems tasks Booting and resetting Managing volumes and files Managing executable programs and processes Managing memory Handling interrupts

Viruses Definition and history Viruses for mainframe and PCs Propagation or infection Payload or damage Trigger Replication Virus polymorphism

Virus writers Reasons for writing, using or distributing viruses General profile

Virus propagation From file to file and from computer to another. Looking for executable, and similar files Memory resident viruses Infected software, attachement

Macro viruses Differences from typical viruses Document files

Virus classification methods By Infection By Damage By trigger By Platform

Classification File infector viruses Shell viruses Non-overwriting viruses Overwriting viruses Intrusive viruses Boot sector viruses Multipartitie viruses

Memory resident viruses BSI Boot sector viruses Differences between BSI and file infectors Bootstrap loader and virus hiding methods

File infector viruses infection methods Shell viruses Overwriting Non-overwriting Intrusive File attributes: Size, CRC(hash), MAC, code inside, access permissions

Companion-multipartitie Viruses File association DOS execution sequence (com, bat, exe). Multi-File infector and BSI viruses: advantages and challenges

Macro and Script Viruses Macros programs, examples Examples and characteristics of Macro Viruses Protection against Macro viruses.

Infected images and acrobat Buffer overflow problems

Virus life cycle Signature Infection Damage Trigger or Activation: Bombs

Virus Payloads Types and levels of payloads

Virus organization Infection marker Infector Trigger check Manipulation

Virus naming Based on type Based on creator Macro viruses Based on environment

Virus hiding methods Hiding methods Stealth techniques

Interrupts and viruses Relation between interrupts and viruses – trigger and activation Trapdoors