Download presentation
Presentation is loading. Please wait.
Published byRenée de Smedt Modified over 5 years ago
1
Malicious Software Network security Master:Mr jangjou
Presented by:Mohsen Najafi November 2011
2
Malware Propagation Concealment Virus Warm Trojans Root kit
3
Malware Types Root Kit Virus ADMIN Logic bomb Zombie Backdoor Warm
Keylogger Spyware Trojan Virus
4
Root Kit ADMIN Power Privileged Access Least powerful Monitoring
Open source and integrate with other malware Help to Trojan Attack with Kernel or User mode ADMIN Power
5
Logic bomb Behave like physical bomb Manual and Automatic
Remove information in database
6
Warm Very Fast Spread Self Executable Carriage Other malware
No change system and user file Propagation in Network connections
7
Keylogger Kernel base API base Form Grabbing base
8
Spyware Hidden form No self replicate Like adware
A long with other software
9
Backdoor Remote Access Install with Worms Bypassing security
10
Zombie Connected to internet Under remote directions Active with spam
Spammers controls Active with spam
11
Trojan Steal informations Low performance system Change configuration
Crashing the computer Low performance system Install and work hiddenly
12
Viruses Boot sector File infector Macro virus Encrypted virus
Stealth virus Polymorphic Metamorphic Oligomorphic
13
Symptoms of Malware System Crach always have Poor System Performance
Your system has less available memory than it should Unusual messages or displays on your monitor Settings have changed and I can't change them back to the way they were Some of your files become corrupted or suddenly don't work properly
14
Antivirus How to work How to choose (Full of Free) (File server)
(30% faster) (Multi core) (Wi-Fi network) (P2P file sharing) (Heuristic & Rootkit) (Script and warm) (Personal data & update) (Virus removal)
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.